slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies PowerPoint Presentation
Download Presentation
Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies

Loading in 2 Seconds...

play fullscreen
1 / 23

Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies - PowerPoint PPT Presentation


  • 143 Views
  • Uploaded on

Safeguards in a World of Ambient Intelligence (SWAMI) Conference European Commission, JRC/IPTS, Brussels, March 2006. Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies' - guido


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

Safeguards in a World of Ambient Intelligence (SWAMI) Conference

European Commission, JRC/IPTS, Brussels, March 2006

Ambient Intelligence:Promise, Price, Social DisruptionA Review of Security and Privacy Strategies in Leading Economies

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Information Security and Critical Infrastructure Protection Research Group

Dept. of Informatics, Athens University of Economics and Business, Greece

structure of the presentation
Structure of the presentation
  • Agonies and trends
  • Envisioning the emerging ICT paradigm
  • Cornerstones and strategic planning
  • Security and privacy strategies
  • Plans, conflicts, social disruption and …gudgetry

Leading Economies

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide3

Agonies and trends

“EU should adopt a holistic view of AmI, considering not just the tech-nology, but the whole of of the innovation supply-chain from scien-ce to end-user, and also the various features of the academic, industrial and administrative environment that facilitate or hinder realisation of the AmI vision” (EU).

“AmI does not associate with a spe-cific technology, but focuses on the use of technology” (EU).

Source: ISTAG (2004)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide4

Agonies and trends

“Industry turned to focus at develop-ing strategic superiority in terms of being different, rather than being fast” (J).

“Make the country’s own paradigm different that that of any other coun-try” (J).

“The focus is on ensuring Japan’s industrial lead through the establish-ment of the world’s first, only, and best ICT environment” (J).

Source: ITU (2006)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide5

Agonies and trends

“Progress in shifting towards modern network technologies may establish Japan as the le-ading broadband nation, but it will not necessarily make it the leading ICT nation” (J).

“The ubiquitous network is an ICT paradigm that was redis-covered in Japan and not im-ported by the US” (J).

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

Source: ITU (2006)

slide6

Agonies and trends

“US should have a technological boost ana-logous to the the boost given by the first sa-tellite being into orbit by Soviets” (US).

“US have not yet awakened to the central role played by computational science and high-end computing in advanced scientific, social science, biomedical, and engineering research, defense and national security, and industry innovation” (US).

“The challenge for US of preserving their technological competitiveness is far more diffuse, complex and long-term than in was 15-20 years ago” (US).

Source: PITAC (2005)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide7

Envisioning the emerging ICT paradigm (1/4)

Source: NRI (2000)

“The highest ideal of the dramatic machine is to make a computer so exciting, so wonderful, so interesting, that we never want to be without it. The highest ideal of the invisible machine is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it. Wieser called this notion ubiquitous computing and placed its origins in post-modernism”.

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide8

Envisioning the emerging ICT paradigm (2/4)

AmI imlies a seamless environment of com-puting, advanced networking technology and specific interfaces, which is aware of the spe-cific characteristics of humans presence and personalities, takes care of needs, is capable of responding intelligently to spoken or gestu-red indications of desire, and can even engage in intelligent dialogue [EU/ISTAG, 2001].

Pervasive Computing denotes the trend to-wards numerous, casually accessible often in-visible, computing devices, frequently mobile or embedded in the environment, connected to an increasingly ubiquitous network

infrastructure composed of a wired core and wireless edges [USA/NIST, 2001].

Source: ITU (2006)

Ubiquitous Computing ensures connectivity at any time and any place, with anyone or any object [ITU, 2006].

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide9

Envisioning the emerging ICT paradigm (3/4)

Network Paradigm

Source: NRI (2004)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide10

Envisioning the emerging ICT paradigm (4/4)

UbiComp Paradigm

Source: NRI (2004)

slide11

Cornerstones and strategic planning: EU

Source: ISTAG (2002)

Opportunities: Improve civil security; New leisure, learning and work opportunities;

Facilitate community building and social groupings; New forms of healthcare and social support;

Tackle environmental threats; Support democratic process and delivery of public services.

Requirements: Seamless mobile and fixed communications infrastructure; Dynamic and massively distributed device networks; Very unobtrusive hardware; Natural feeling human interfaces; Dependability and security.

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide12

Cornerstones and strategic planning: USA

National priorities are: (a) Leader-ship in Science and Technology, (b) National/Homeland Security, (c) Health and Environment, (d) Economic Prosperity, (e) Well-Educated Populace, and (f) Vib-rant Civil Society.

UbiCom R&D challenges include: Predictability and manageability, adaptive self-configuration, moni-toring and system health, computa-tional models, network geometry, interoperability, enabling technolo-gies, integration of technical, soci-al, ethical, and public policy issues.

Source: NITRD (2004)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide13

Cornerstones and strategic planning: Japan

National ICT Policy (e-Japan II) is bas-ed on five strategies: (a) Development of the world’s most advanced ICT infra-structure, (b) construction of an Asian-wide platform for electronic bulletin board systems and content distribution, (c) concentrated investment on security and privacy protection, (d) establish-ment of business platdorm that connects ICT and services as new players, (e) realization of specific types of solutions (every-day life, business, government, social systems).

Source: NRI (2005)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide14

Cornerstones and strategic planning: eu

Source: NRI (2005)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide15

Security and privacy strategies (1/5)

7th FP: Securityis a major pylon for the Cooperation priority. The main objective of this pylon is: (a) to develop the technologies and knowledge for building ca-pabilities needed to ensure the security of citizens, while respe-cting fundamental human rights, (b) to ensure optimal and conce-rted use of available technologi-es to the benefit of European se-curity, and (c) to stimulate the cooperation of providers and us-ers for security solutions”.

Source: ISTAG (2004)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide16

Security and privacy strategies (2/5)

US ICT infrastructure is highly vulner-able to deliberate attacks with potential disastrous effects. The goal is cyberse-curity. Its most important facets inclu-de: (a) Domestic and international law enforcement, (b) Education, (c) Infor-mation security, (d) Sociological issu-es. Basic security and privacy prin-ciples should focus on: (a) privacy and civil liberties, (b) regulation and mar-ket forces, (c) accountability and res-ponsibility, (d) ensure flexibility, and (e) multi-year planning.

Coordinated approach

to

Homeland Security

Source: DHS (2006)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide17

Security and privacy strategies (3/5)

Source: NRI (2005)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide18

Security and privacy strategies (4/5)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

Source: NRI (2005)

slide19

Security and privacy strategies (5/5)

Source: NRI (2005)

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide20

Plans, conflicts, social disruption and …gudgetry

European Union

…is optimistic of AmI, but does not disregard that people will participate in a multiplicity of parallel, overlapping, inter-leaved and evolving one-to-one, one-to-many and many-to-many relationships, some short-lived, and some established temporarily and instantaneously.

…is oriented towards addressing different security aspects, such as security related to the in-dividual, to communities and social groups, to the industry or to critical infrastructures.

…builds citizens’ confidence in AmI spaces, by facing privacy issues, unfair or illegal com-mercial practices, unsolicited communications, and harmful content distribution.

…has adopted AmI as its emerging ICT paradigm and aims to exploit its considered leading position in wireless and mobile technology.

…wishes to adopt a holistic view of AmI, considering “not just the technology, but the who-le of the innovation supply-chain from science to end-user, and also the various features of the academic, industrial, abd administrative environment that facilitate or hinder realisation of the AmI vision”.

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide21

Plans, conflicts, social disruption and …gudgetry

United States

…consider that it is important to analyze not only technological issues, but social, as well as ethical issues.

…aims at promoting interdisciplinary approaches to research on UbiComp, which tie computer science with other sciences and disciplines.

…consider that UbiComp introduces a new security paradigm, regarding how we can deal with novel and sophisticated security and privacy requirements, recognizing that technical approaches will be insufficient for the protection of privacy and security in UbiComp.

…, from the national security perspective, are probably the most organized nation in the world, in terms of strategies adopted and actions taken.

…aim at keeping their leadership in the ICT sector, while preserving the national security, through concepts such as cybersecurity and critical infrastructure protection.

…initiatives often address issues, such as patient safety and health, quality, prediction of health effects of pollutants, and participation to the digital society, but with no high priority.

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide22

Plans, conflicts, social disruption and …gudgetry

Japan

…aims at “being different” with UbiNet, while it envisions a new “Oscar” award for digital content/animation production, a local “Hollywood” city, as well as it expects to “lean from the advanced and comprehensive” security-related approaches taken in the US.

…adopted UbiNet not only as its emerging ICT paradigm, but also as a main means for making the country the “leading ICT nation in the world”.

…aims at being the “most safe and secure” nation in the world in the next decade or so, and to take fine care of - inter alia - the elderly, the disabled and the working women.

…does not focus on pressing victims to take appropriate preventive measures but on punish-ing perpetrators of attacks. Thus the focus should be on the prosecution of offenders.

…follows the tradition of the “three sacred treasures of the digital home appliances”, envisioning ubiquitous home appliances, ubiquitous offices, and ubiquitous cars.

… currently utillizes Chinese resources, as bases for outsourcing and system development, responds to consolidations and company break-ups, and ensures business continuity in an emergency.

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption

slide23

Contact us:Prof. Dr. Dimitris Gritzalis (dgrit@aueb.gr)

Information Security and Critical Infrastructure Protection Research GroupDepartment of Informatics

Athens University of Economics and Business (Greece)website: www.cis.aueb.gr

D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

Security and Privacy in AmI: Promise, Price, Social Disruption