The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues

  • Michael Friedewald
  • Elena Vildjiounaite
  • Yves Punie
  • David Wright
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3934)


The success of Ambient Intelligence (AmI) will depend on how secure it can be made, how privacy and other rights of individuals can be protected and how individuals can come to trust the intelligent world that surrounds them and through which they move. This contribution presents an analysis of ambient intelligence scenarios, particularly in regard to AmI’s impacts on and implications for individual privacy. The analysis draws on our review of more than 70 AmI projects, principally in Europe. It notes the visions as well as the specifics of typical AmI scenarios. Several conclusions can be drawn from the analysis, not least of which is that most AmI scenarios depict a rather too sunny view of our technological future. Finally, reference is made to the SWAMI project (Safeguards in a World of Ambient Intelligence) which, inter alia, has constructed ”dark” scenarios, as we term them, to show how things can go wrong in AmI and where safeguards are needed.


Ubiquitous Computing Ambient Intelligence Identity Theft Smart Space Personal Device 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    IST Advisory Group, Ducatel, K., Bogdanovicz, M., Scapolo, F., Leijten, J., Burgelman, J.C.: Scenarios for ambient intelligence in 2010. Institute for Prospective Technological Studies (IPTS), Seville (2001),
  2. 2.
    Punie, Y.: The future of ambient intelligence in Europe: The need for more everyday life. Communications and Strategies 57, 141–165 (2005)Google Scholar
  3. 3.
    Weiser, M.: Some computer science issues in ubiquitous computing. Communications of the ACM 36, 75–85 (1993)CrossRefGoogle Scholar
  4. 4.
    Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M.: Living in a world of smart everyday objects: Social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment 10, 763–786 (2004)CrossRefGoogle Scholar
  5. 5.
    Ackerman, M.S.: Privacy in pervasive environments: Next generation labelling protocols. Personal and Ubiquitous Computing 8, 430–439 (2004)CrossRefGoogle Scholar
  6. 6.
    Åkesson, K.P., Humble, J., Crabtree, A., Bullock, A.: Usage and development scenarios for the tangible toolbox. ACCORD Deliverable D1.3, Swedish Institute of Computer Science (2001),
  7. 7.
    Aschmoneit, P., Höbig, M.: Context-aware collaborative environments for next generation business networks: Scenario document. COCONET Deliverable D 2.2, Telematica Institute (2002),
  8. 8.
    Harrop, P.: Item level RFID: The business benefits of the ”tag everything” scenario. IDTechEx Ltd., Cambridge (2005)Google Scholar
  9. 9.
    ITEA: ITEA technology roadmap for software-intensive systems, 2nd edn. Information Technology for European Advancement (ITEA) Office Association (2004),
  10. 10.
    López de Vallejo, I.L.: E-locus: A clustered view of European ICT for future workspaces. E-Locus Deliverable D5.5, Fundación TEKNIKER (2004),
  11. 11.
    Masera, M., Bloomfeld, R.: A dependability roadmap for the Information Society in Europe. AMSD Delilverable D1.1, Rand Europe (2003),
  12. 12.
    Morganti, F., Riva, G.: Ambient intelligence for rehabilitation. In: Riva, G., Vatalaro, F., Davide, F., Alcaiz, M. (eds.) Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, pp. 281–292. IOS Press, Amsterdam (2005)Google Scholar
  13. 13.
    Palmas, G., Tsapatsoulis, N., Apolloni, B., Malchiodi, D., Delopoulos, A., Beverina, F.: Generic artefacts specification and acceptance criteria. Oresteia Deliverable D01, STMicroelectronics s.r.l. (2001),
  14. 14.
    Riva, G.: Ambient intelligence in health care. CyberPsychology and Behavior 6, 295–300 (2003)CrossRefGoogle Scholar
  15. 15.
    Savidis, A., Lalis, S., Karypidis, A., Georgalis, Y., Pachoulakis, Y., Gutknecht, J., Egger, B., Kramer, P., Tafra, M., Majoe, D., Lieu, V., Hunt, N., Gredmaier, L., Roberts, D.: Report on key reference scenarios. 2WEAR Deliverable D1, Foundation for Research and Technology Hellas, Institute of Computer Science (2001),
  16. 16.
    Lessig, L.: Code and other laws of cyberspace. Basic Books, New York (2000)Google Scholar
  17. 17.
    Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review 79, 101–139 (2004)Google Scholar
  18. 18.
    Singer, I.J.: Privacy and human nature. Ends and Means 5, 1 (2001)Google Scholar
  19. 19.
    Michahelles, F., Matter, P., Schmidt, A., Schiele, B.: Applying wearable sensors to avalanche rescue: First experiences with a novel avalanche beacon. Computers & Graphics 27, 839–847 (2003)CrossRefGoogle Scholar
  20. 20.
    Friedewald, M., Vildjiounaite, E., Wright, D., Maghiros, I., Verlinden, M., Alahuhta, P., Delaitre, S., Gutwirth, S., Schreurs, W., Punie, Y.: Safeguards in a world of ambient intelligence (SWAMI): The brave new world of ambient intelligence – A state-of-the-art review. Deliverable D1 (2005),
  21. 21.
    Friedewald, M., Da Costa, O., Punie, Y., Alahuhta, P., Heinonen, S.: Perspectives of ambient intelligence in the home environment. Telematics and Informatics 22, 221–238 (2005)CrossRefGoogle Scholar
  22. 22.
    Elbirt, A.J.: Who are you? How to protect against identity theft. IEEE Technology and Society Magazine 24, 5–8 (2005)CrossRefGoogle Scholar
  23. 23.
    Winters, N.: Personal privacy and popular ubiquitous technology. In: Proceedings of Ubiconf 2004, April 19, 2004, Gresham College, London (2004)Google Scholar
  24. 24.
    Albrecht, K.: Supermarket cards: The tip of the retail surveillance iceberg. Denver University Law Review 79, 534–539 (2002)Google Scholar
  25. 25.
    Farrell, N.: Sony gives rootkits for christmas. The Inquirer (December 26, 2005),
  26. 26.
    Borrus, A.: The privacy war of Richard Smith. Businessweek Online (February 14, 2000),
  27. 27.
    Associated Press: Spy agency removes illegal tracking files. The New York Times (December 29, 2005),
  28. 28.
    Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), pp. 77–92. Kluwer, Dordrecht (1993)Google Scholar
  29. 29.
    Nasoz, F., Alvarez, K., Lisetti, C., Finkelstein, N.: Emotion recognition from physiological signals for user modelling of affect. In: Proceedings of the 3rd Workshop on Affective and Attitude User Modelling, Pittsburgh, PA, USA, June 2003 (2003)Google Scholar
  30. 30.
    Punie, Y., Delaitre, S., Maghiros, I., Wright, D., Friedewald, M., Alahuhta, P., Gutwirth, S., de Hert, P., Lindner, R., Moscibroda, A., Schreurs, W., Verlinden, M., Vildjiounaite, E.: Safeguards in a world of ambient intelligence (SWAMI): Dark scenarios on ambient intelligence - Higlighting risks and vulnerabilities. SWAMI Deliverable 2 (2005),
  31. 31.
    Wright, D.: The dark side of ambient intelligence. Info - The journal of policy, regulation and strategy for telecommunications 7(6), 33–51 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Michael Friedewald
    • 1
  • Elena Vildjiounaite
    • 2
  • Yves Punie
    • 3
  • David Wright
    • 4
  1. 1.Fraunhofer Institute for Systems and Innovation ResearchKarlsruheGermany
  2. 2.VTT ElectronicsTechnical Research Centre of FinlandOuluFinland
  3. 3.Institute for Prospective Technological StudiesEuropean Commission/DG JRCSevilleSpain
  4. 4.Trilateral Research & ConsultingLondonUnited Kingdom

Personalised recommendations