1 / 23

Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies

Safeguards in a World of Ambient Intelligence (SWAMI) Conference European Commission, JRC/IPTS, Brussels, March 2006. Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias

guido
Download Presentation

Ambient Intelligence: Promise, Price, Social Disruption A Review of Security and Privacy Strategies in Leading Economies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Safeguards in a World of Ambient Intelligence (SWAMI) Conference European Commission, JRC/IPTS, Brussels, March 2006 Ambient Intelligence:Promise, Price, Social DisruptionA Review of Security and Privacy Strategies in Leading Economies D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Information Security and Critical Infrastructure Protection Research Group Dept. of Informatics, Athens University of Economics and Business, Greece

  2. Structure of the presentation • Agonies and trends • Envisioning the emerging ICT paradigm • Cornerstones and strategic planning • Security and privacy strategies • Plans, conflicts, social disruption and …gudgetry Leading Economies D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  3. Agonies and trends “EU should adopt a holistic view of AmI, considering not just the tech-nology, but the whole of of the innovation supply-chain from scien-ce to end-user, and also the various features of the academic, industrial and administrative environment that facilitate or hinder realisation of the AmI vision” (EU). “AmI does not associate with a spe-cific technology, but focuses on the use of technology” (EU). Source: ISTAG (2004) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  4. Agonies and trends “Industry turned to focus at develop-ing strategic superiority in terms of being different, rather than being fast” (J). “Make the country’s own paradigm different that that of any other coun-try” (J). “The focus is on ensuring Japan’s industrial lead through the establish-ment of the world’s first, only, and best ICT environment” (J). Source: ITU (2006) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  5. Agonies and trends “Progress in shifting towards modern network technologies may establish Japan as the le-ading broadband nation, but it will not necessarily make it the leading ICT nation” (J). “The ubiquitous network is an ICT paradigm that was redis-covered in Japan and not im-ported by the US” (J). D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption Source: ITU (2006)

  6. Agonies and trends “US should have a technological boost ana-logous to the the boost given by the first sa-tellite being into orbit by Soviets” (US). “US have not yet awakened to the central role played by computational science and high-end computing in advanced scientific, social science, biomedical, and engineering research, defense and national security, and industry innovation” (US). “The challenge for US of preserving their technological competitiveness is far more diffuse, complex and long-term than in was 15-20 years ago” (US). Source: PITAC (2005) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  7. Envisioning the emerging ICT paradigm (1/4) Source: NRI (2000) “The highest ideal of the dramatic machine is to make a computer so exciting, so wonderful, so interesting, that we never want to be without it. The highest ideal of the invisible machine is to make a computer so imbedded, so fitting, so natural, that we use it without even thinking about it. Wieser called this notion ubiquitous computing and placed its origins in post-modernism”. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  8. Envisioning the emerging ICT paradigm (2/4) AmI imlies a seamless environment of com-puting, advanced networking technology and specific interfaces, which is aware of the spe-cific characteristics of humans presence and personalities, takes care of needs, is capable of responding intelligently to spoken or gestu-red indications of desire, and can even engage in intelligent dialogue [EU/ISTAG, 2001]. Pervasive Computing denotes the trend to-wards numerous, casually accessible often in-visible, computing devices, frequently mobile or embedded in the environment, connected to an increasingly ubiquitous network infrastructure composed of a wired core and wireless edges [USA/NIST, 2001]. Source: ITU (2006) Ubiquitous Computing ensures connectivity at any time and any place, with anyone or any object [ITU, 2006]. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  9. Envisioning the emerging ICT paradigm (3/4) Network Paradigm Source: NRI (2004) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  10. Envisioning the emerging ICT paradigm (4/4) UbiComp Paradigm Source: NRI (2004)

  11. Cornerstones and strategic planning: EU Source: ISTAG (2002) Opportunities: Improve civil security; New leisure, learning and work opportunities; Facilitate community building and social groupings; New forms of healthcare and social support; Tackle environmental threats; Support democratic process and delivery of public services. Requirements: Seamless mobile and fixed communications infrastructure; Dynamic and massively distributed device networks; Very unobtrusive hardware; Natural feeling human interfaces; Dependability and security. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  12. Cornerstones and strategic planning: USA National priorities are: (a) Leader-ship in Science and Technology, (b) National/Homeland Security, (c) Health and Environment, (d) Economic Prosperity, (e) Well-Educated Populace, and (f) Vib-rant Civil Society. UbiCom R&D challenges include: Predictability and manageability, adaptive self-configuration, moni-toring and system health, computa-tional models, network geometry, interoperability, enabling technolo-gies, integration of technical, soci-al, ethical, and public policy issues. Source: NITRD (2004) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  13. Cornerstones and strategic planning: Japan National ICT Policy (e-Japan II) is bas-ed on five strategies: (a) Development of the world’s most advanced ICT infra-structure, (b) construction of an Asian-wide platform for electronic bulletin board systems and content distribution, (c) concentrated investment on security and privacy protection, (d) establish-ment of business platdorm that connects ICT and services as new players, (e) realization of specific types of solutions (every-day life, business, government, social systems). Source: NRI (2005) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  14. Cornerstones and strategic planning: eu Source: NRI (2005) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  15. Security and privacy strategies (1/5) 7th FP: Securityis a major pylon for the Cooperation priority. The main objective of this pylon is: (a) to develop the technologies and knowledge for building ca-pabilities needed to ensure the security of citizens, while respe-cting fundamental human rights, (b) to ensure optimal and conce-rted use of available technologi-es to the benefit of European se-curity, and (c) to stimulate the cooperation of providers and us-ers for security solutions”. Source: ISTAG (2004) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  16. Security and privacy strategies (2/5) US ICT infrastructure is highly vulner-able to deliberate attacks with potential disastrous effects. The goal is cyberse-curity. Its most important facets inclu-de: (a) Domestic and international law enforcement, (b) Education, (c) Infor-mation security, (d) Sociological issu-es. Basic security and privacy prin-ciples should focus on: (a) privacy and civil liberties, (b) regulation and mar-ket forces, (c) accountability and res-ponsibility, (d) ensure flexibility, and (e) multi-year planning. Coordinated approach to Homeland Security Source: DHS (2006) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  17. Security and privacy strategies (3/5) Source: NRI (2005) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  18. Security and privacy strategies (4/5) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption Source: NRI (2005)

  19. Security and privacy strategies (5/5) Source: NRI (2005) D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  20. Plans, conflicts, social disruption and …gudgetry European Union …is optimistic of AmI, but does not disregard that people will participate in a multiplicity of parallel, overlapping, inter-leaved and evolving one-to-one, one-to-many and many-to-many relationships, some short-lived, and some established temporarily and instantaneously. …is oriented towards addressing different security aspects, such as security related to the in-dividual, to communities and social groups, to the industry or to critical infrastructures. …builds citizens’ confidence in AmI spaces, by facing privacy issues, unfair or illegal com-mercial practices, unsolicited communications, and harmful content distribution. …has adopted AmI as its emerging ICT paradigm and aims to exploit its considered leading position in wireless and mobile technology. …wishes to adopt a holistic view of AmI, considering “not just the technology, but the who-le of the innovation supply-chain from science to end-user, and also the various features of the academic, industrial, abd administrative environment that facilitate or hinder realisation of the AmI vision”. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  21. Plans, conflicts, social disruption and …gudgetry United States …consider that it is important to analyze not only technological issues, but social, as well as ethical issues. …aims at promoting interdisciplinary approaches to research on UbiComp, which tie computer science with other sciences and disciplines. …consider that UbiComp introduces a new security paradigm, regarding how we can deal with novel and sophisticated security and privacy requirements, recognizing that technical approaches will be insufficient for the protection of privacy and security in UbiComp. …, from the national security perspective, are probably the most organized nation in the world, in terms of strategies adopted and actions taken. …aim at keeping their leadership in the ICT sector, while preserving the national security, through concepts such as cybersecurity and critical infrastructure protection. …initiatives often address issues, such as patient safety and health, quality, prediction of health effects of pollutants, and participation to the digital society, but with no high priority. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  22. Plans, conflicts, social disruption and …gudgetry Japan …aims at “being different” with UbiNet, while it envisions a new “Oscar” award for digital content/animation production, a local “Hollywood” city, as well as it expects to “lean from the advanced and comprehensive” security-related approaches taken in the US. …adopted UbiNet not only as its emerging ICT paradigm, but also as a main means for making the country the “leading ICT nation in the world”. …aims at being the “most safe and secure” nation in the world in the next decade or so, and to take fine care of - inter alia - the elderly, the disabled and the working women. …does not focus on pressing victims to take appropriate preventive measures but on punish-ing perpetrators of attacks. Thus the focus should be on the prosecution of offenders. …follows the tradition of the “three sacred treasures of the digital home appliances”, envisioning ubiquitous home appliances, ubiquitous offices, and ubiquitous cars. … currently utillizes Chinese resources, as bases for outsourcing and system development, responds to consolidations and company break-ups, and ensures business continuity in an emergency. D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

  23. Contact us:Prof. Dr. Dimitris Gritzalis (dgrit@aueb.gr) Information Security and Critical Infrastructure Protection Research GroupDepartment of Informatics Athens University of Economics and Business (Greece)website: www.cis.aueb.gr D. Gritzalis, M. Theoharidou, S. Dritsas, G. Marias Security and Privacy in AmI: Promise, Price, Social Disruption

More Related