1 / 16

AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS BY TARYN RICHARSON & MELANIE FLETCHER

AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS BY TARYN RICHARSON & MELANIE FLETCHER. Ambient and pervasive Technology……. pervasive Technology can be defined as technology that is designed to change attitudes or behaviours by using technology.

evonne
Download Presentation

AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS BY TARYN RICHARSON & MELANIE FLETCHER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS BY TARYN RICHARSON & MELANIE FLETCHER

  2. Ambient and pervasive Technology…… pervasive Technology can be defined as technology that is designed to change attitudes or behaviours by using technology. • ‘convergence of information technology and cognitive science’ Verbeek (2009) • ‘smart environments that are able to respond intelligently to what we do’ Verbeek (2009) • ‘even aim to influence our behaviour’ Verbeek (2009) • Ham et al. (2009) research suggests ambient and pervasive technology can influence behaviours and attitudes. AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  3. Examples of Ambient and Pervasive Technology being used today…… Electronic conference tools Electronic communication tools Wikis Blog Internet SMS AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  4. Scenario…… Ellen returns home after a long day's work. At the front door she is recognized by an intelligent surveillance camera, the door alarm is switched off, and the door unlocks and opens. When she enters the hall the house map indicates that her husband Peter is at an art fair in Paris, and that her daughter Charlotte is in the children's playroom, where she is playing with an interactive screen. The remote children surveillance service is notified that she is at home, and subsequently the on-line connection is switched off. When she enters the kitchen the family memo frame lights up to indicate that there are new messages. The shopping list that has been composed needs confirmation before it is sent to the supermarket for delivery. There is also a message notifying that the home information system has found new information on the semantic Web about economic holiday cottages with sea sight in Spain. She briefly connects to the playroom to say hello to Charlotte, and her video picture automatically appears on the flat screen that is currently used by Charlotte. Next, she connects to Peter at the art fair in Paris. He shows her through his contact lens camera some of the sculptures he intends to buy, and she confirms his choice. In the mean time she selects one of the displayed menus that indicate what can be prepared with the food that is currently available from the pantry and the refrigerator. Next, she switches to the videoon demand channel to watch the latest news program. Through the follow me she switches over to the flat screen in the bedroom where she is going to have her personalized workout session. Later that evening, after Peter has returned home, they are chatting with a friend in the living room with their personalized ambient lighting switched on. They watch the virtual presenter that informs them about the programs and the information that have been recorded by the home storage server earlier that day. Wikipedia (2012)

  5. Displays the general whereabouts of family members using cell phone data. • Works by transmitting a SMS from a personal mobile device or a personal computer when a member moves into a registered zone e.g. School or Work. • Easy to read interface, designed to be viewed at a glance. • The display is “always on” and can only be viewed from the home. • It shows only that a family member is at “home”, at “work or school”, or “out”, as precise location isn’t necessary for the purpose of planning a meal, knowing someone is on their way home, or being reassured a child is at school. • Microsoft Corporation 2012, Whereabouts Clock, viewed 25 May 2012, Retrieved from http://research.microsoft.com/en-us/groups/sds/whereabouts_clock.aspx Whereabouts Clock……….. AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  6. Digital Jewellery… Bluetooth wireless technology AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  7. Unobtrusive Hardware: • Smaller Devices • Nano Technology • Smart Devices • Sensors Context Awareness Dependable and Secure Devices Key Technologies Required • Computing Infrastructure: • Networks • Service oriented architecture • Dynamic Device Networks: • Easily controllable • Easily programmable • (End user can program their own device) AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  8. The Development of Ambient…… • Ambient and pervasive devices or systems are increasing in popularity. • New contexts for communication between users. • An example is the eSense project which uses ambient technologies through wireless devices and networks. eg. Mood based servicesand textures. • This new technology imposes increased risks on the users. “The social consequences of a large scale deployment of ambient and pervasive technologies are as yet completely unknown” Clarke (2007) AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  9. The communications architecture of New ambient systems…… • Ambient devices are the new form of communication. • Enables users to share feelings and moods using wearable devices. • Track movements of others, capturing medical and environmental data remotely. “Ambient intelligences is beyond the current 3G mobile communications systems through the use of wireless sensor networks (WSN)” Clarke (2007) AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  10. The potential for misuse of Ambient Technologies…… • People who use this technology may find new and creative uses. • Uses for this technology will go beyond what the developers could ever have imagined. • Through development there is the risk of misuse but this can lead to successful innovation • On the other hand misuse by dysfunctional people can lead to an avenue that provides opportunities to seek or prey on the young and vulnerable.

  11. ETSI: ISSUE AMONG YOUTH…… • ETSI (European Telecommunications Standards Institute) monitors issues related to ICT products and services used by youth. • ETSI along with other companies are concerned of adequate security and safeguard features in ambient and pervasive technology. • The most vulnerable young people were identified at between the ages of 4 and 12. • It was identified that most of the cohort were using products and services aimed at adults. • Therefore ETSI focused on producing new guidelines for designers. AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  12. Added Safeguards for vulnerable user…… • The safeguards for vulnerable users is still in the beginning stages • In order to safeguard these vulnerable users it is essential to be aware of difficulties experienced in the past and learn from this. • In order to do this it is vital that there be heavy encryption of data flows • Additional security features and secure transfer of data between devices. • Prevention of insecure communications AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  13. The risks e.g. Digital Jewellery…… • This allows users to exchange information between two devices. • Adult to adult exchange or parent to child exchange • Opens the door to enormous risks if hackers fraudulently intercept the data flow. • Opens the door to risks of identity theft. • Today our children are a generation of technology so the risk to them being victims of technology misuse is high. • They also can be the instigators of misuse for example bullying peers or abuse of adults such as teachers etc AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  14. Designing Safeguards…… • Make strong safeguards a high priority in the design and development stages. • Don’t rush a prototype make safeguards a priority. • Develop strong encryptions on transmitted data. • Self regulate guidelines to better safeguard young users. • As part of the design process, have technologies tested and have designers undertake a social impact assessment. AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

  15. Conclusion…. • Ambient and pervasive technology could have repercussions on our most vulnerable, children. • But it does provide vital opportunities in the way of quality of life • It is therefore imperative that we focus on ethics, safety, reliability and privacy. • Ethics, safety, reliability and privacy should accompany the development and implementation of new technology. • Designers, programmers, users, and policy makers should have adequate education in perceiving and assessing the impacts of technology.

  16. References…… • Clarke, A 2007, Ambient and Pervasive Technology Designing Safeguards For Vulnerable Users, Interactions, Reading 7, Victoria University, Melbourne, viewed 01 April 2012, retrieved from vu • Ham, J Midden, C Beute, F 2009, Can ambient pervasive technology persuade unconsciously?: using subliminal feedback to influence energy consumption ratings of household appliances, ACM Digital Library, viewed 24th May 2012, http://dl.acm.org/citation.cfm?id=1541988 • Verbeek, P 2009, Ambien Intelligence and pervasive Technology: The Blurring Boundaries Between Human and Technology, Nanoethics, • Springer, viewed 24 May 2012, • http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2837215/ • Wikipedia 2012, Ambient Intelligence, Wikimedia Foundation Inc, viewed 21st May 2012, retrieved from www.en.wikipedia.org/wiki/Ambient_intelligence AMBIENT AND PERVASIVE TECHNOLOGY DESIGNING SAFEGUARDS FOR VULNERABLE USERS

More Related