Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
D7.2: Descriptive analysis and inventory of profiling practices.
D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence.
D7.4: Implications of profiling practices on democracy.
D7.6 Workshop on AmI, Profiling and RFID.
D7.7: RFID, Profiling, and AmI.
D7.8: Workshop on Ambient Law.
D7.9: A Vision of Ambient Law.
D7.10: Multidisciplinary literature selection, with Wiki discussion forum on Profiling, AmI, RFID, Biometrics and Identity.
D7.11: Kick-off Workshop on biometric behavioural profiling and Transparency Enhancing Technologies.
Forensic Implications.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
This document presents a preliminary exercise on AmI and profiling. It draws on the existing work done on profiling in FIDIS deliverable 7.2 and adds a first exploration of AmI in the form of simple examples and tentative definitions. The aim of the document is to provide insight into the conditional relationship between profiling and AmI rather than to provide an extensive overview of the field of AmI.
The main issues to be solved for a successfully networked and adaptive environment have been located in the domains of interoperability, privacy and security. Interoperability may seem to warrant technical solutions first, but – as explained in FIDIS deliverable 4.1 – without effective communication and trust these technical solutions will not be conclusive. Solutions to issues of privacy and security have been explored from the perspective of enhancing user control. As chapters and of this deliverable clearly indicate, such solutions need integration of technological and legal tools. Legislation that is technically, socially and/or economically not feasible will not amount to any substantial protection, while privacy enhancing technologies that promote user control may not catch on if the law does not effectively constrain the production and usage of privacy invading design.
60 / 62 |