Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
Introduction
The emergence of the internet, and with it the possibilities of distributed computing (i.e. using several computing devices, that are not necessarily located in the same geographic location, for a specific task) has had a profound effect on our way of life. Ubiquitous Computing is the next wave of technology, a paradigm shift from our current relationship with technology, whereby many thousands of wireless computing devices are distributed in the environment in everyday objects around us. This technology is one of the tools which aims to achieve the idealised Ambient Intelligence (AmI) Environment (see section 2.2). However, here the concept is restricted to how the emergence of this potentially invasive technology may become commonplace in the very near future.
Firstly, an example existing scenario will be considered to demonstrate how such invasive technology has already become accepted in our everyday lives.
45 / 69 |