Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- D7.2: Descriptive analysis and inventory of profiling practices.
- D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
- D7.4: Implications of profiling practices on democracy.
- D7.6 Workshop on AmI, Profiling and RFID.
- D7.7: RFID, Profiling, and AmI.
- D7.8: Workshop on Ambient Law.
- D7.9: A Vision of Ambient Law.
- D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
- D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Proposal for a structure of the report
Based on the discussions of the workshop the following general outline is proposed, to be further elaborated in the coming months.
Chapter 1: Introducing BBP and TETs (All partners)
What is BBP? (working definition; difference with physical biometric profiling and with non-biometric behavioural profiling; enabling technologies, like online profiling and sensor technologies; BBP as a species of profiling and data mining; role of interpretation; measures for reliability; objective of BBP either identification in broad or narrow sense; applications online and offline; relevance for AmI and the Internet of Things; potential threats)
What are TETs? (working definition; relationship to PETs; relationship between legal and technological TETs; Ambient Law; examples)
What is the link between BBP and TETs? (first assessment of
Driver Fatigue Detection System (Hildebrandt, VUB) [reference to technical description including reliability; scenario highlighting potential threats]
Web Proiling (Benoist, VIP) [reference to technical description including reliability; scenario highlighting potential threats]
Gait? Emotion-detection? (Andronikou, ICCS) [reference to technical description including reliability; scenario highlighting potential threats]
Autonomy threats
Social sorting
Privacy
Security
Relationship with invisible visibility, impact of group profiling
Summary of findings within D7.3/7/9.
Privacy
Data Protection
Anti-Discrimination
Issues: consent, conflict with intellectual property rights and trade secrets
Chapter 5: The role of TETs in the case of BBP (KAU, ICPP, TUD, ICRI, VUB)
Existing technological TETs, a subset of PETs (reference to D7.9 and other deliverables, PRIME) (KAU, ICPP, TUD)
Existing legal TETs, within the framework of data protection (reference to chapter 3) (ICRI, VUB)
Envisioned technological TETs, not focused on transparency of the processing of ones personal data but on access to applicable profiles (ICCS?VUB? KAU?ICCP?TUD?)
Envisioned legal TETs, not focused on transparency of the processing of personal data but on access to applicable profiles (VUB, ICRI).
Chapter 6: Conclusions
5 / 10 |