Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
In FIDIS deliverable 7.2, profiling is described as a tool used by service providers (group profiling at the level of the AmI environment), whereas the data subject or end user seems to have little control over the construction and the use of those (group) profiles. In this section we will discuss attempts to develop technologies to redirect the control over profiles to the end users. There are two reasons to emphasise end user control in relation to ambient intelligence:
1. To begin with - like in the case of any other type of profiling - some of the privacy and security risks discussed in chapter could be mitigated by means of end user control (use of partial profiles (pseudonyms) and/or local storage of personal information).
2. A second reason for end user control by means of local storage of the personal profile is that it would allow a person to move from one AmI environment into another, without the need to build up a personal profile all over again. Below we will work out two scenarios that could facilitate such local storage. Of course the more commonly envisioned option to achieve the same goal is the construction of a networked environment that makes different environments interoperable without access to data stored on the personal digital assistant of the end user. According to the ISTAG report of 2003 ‘AmI cannot be achieved piecemeal: it requires coherent application of resources European wide’. The scenarios worked out below seem to indicate otherwise.
22 / 62 |