You are here: Resources > FIDIS Deliverables > Profiling > D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence > 
Privacy Enhanced Ambient Intelligence Profiling  Title:
THE TENSION BETWEEN END USER CONTROL AND AN INTELLIGENT ENVIRONMENT
 Case study of end user control: Ronny goes to Tokyo

 

The tension between end user control and an intelligent environment

Two types of end user control

End user control can take shape in two forms:  

1. The end user constructs her own profile (data set) as input into her personal digital assistant (PDA) that is used as a privacy enhanced identity management device (IDM). Depending on the way the IMD is programmed, information is communicated to a specific environment. This environment can read the information and match it with its own predefined profile (data set), after which action will or will not be taken. In this case the profiles involved are not the result of profiling technologies, forming simple data sets. 

 

2. The end user does not create predefined profiles, but allows itself to be profiled by intelligent device in the environment. However the profiles that are constructed are stored in the PDA of the data subject, thus creating a dynamic profile in the course of time. Neither behavioural data, nor the profile itself are stored at the level of the intelligent device in the environment (so, not at the level of the data controller, not at the level of the service provider), expect if permission is granted by the data subject (a decision that can be delegated for trusted environments to the PDA). In this case the profiles involved are the result of profiling technologies, forming correlated data sets. 

 

The case study below will illustrate the use of both types of profiles. 

 

Privacy Enhanced Ambient Intelligence Profiling  fidis-wp7-del7.3.ami_profiling_02.sxw  Case study of end user control: Ronny goes to Tokyo
24 / 62