You are here: Resources > FIDIS Deliverables > Profiling > D7.3: Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence > 
Conclusions  Title:
ABBREVIATIONS AND GLOSSARY
 Bibliography

 

Abbreviations and Glossary

 

BAN: Body Area Network  

CC/PP: Composite Capabilities / Preferences Profile  

DRM: Digital Rights Management  

IMD: Identity Management Device  

ISDN: Integrated Services Digital Network

LAN: Local Area Network  

PAN: Personal Area Network  

PII: Personally Identifiable Information  

PSTN: Public Switched Telephone Network

RFID: Radio Frequency Identity Tags 

RDF: Resource Description Framework  

UAProf: User Agent Profile  

WAN: Wide Area Network  

WAP: Wireless Access Protocol 

 

 

ambient lawlegal regulation integrated with computer code (for instance on the PDA of a data subject), that regulates the subjects interactions with an AmI environment in accordance with data protection and/or other relevant legal norms

.B.1, .A, .B of this deliverable

 

data controller:     the subject (a natural or legal person) that determines alone or jointly with others the purposes and means of the processing of data

    see also Directive 95/46 EU on Data Protection, concerning processing of personal data, article 2 sub d

 

data mining:    data processing using sophisticated data search capabilities and statistical algorithms to discover patterns and correlations in large pre-existing databases; a way to discover new meaning in data

see http://www.elook.org/dictionary/data-mining.html

 

data subject:        the subject (human or nonhuman), individual or group that data refer to

 

data processing:    

computer science:    a series of operations on data by a computer in order to retrieve or transform or classify information

            see http://www.elook.org/dictionary/data-processing.html

 

legal:    any operation or set of operations which is performed upon personal data, whether or not by automatic means, such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction

Directive 95/46 EU on Data Protection, concerning processing of personal data, article 2 sub b 

 

phishingthe act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft

http://www.webopedia.com/TERM/p/phishing.html

 

personal data:

(common sense):    any data that refer to a person, whether or not identified or identifiable

 

legal:    ‘personal data’ shall mean any information relating to an identified or identifiable natural person (‘data subject’); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity

Directive 95/46 EU on Data Protection, article 2, sub a

 

profile:set of correlated data that identifies and represents a data subject. If the data subject is a group/a category/or a cluster we speak of a group profiles, when the data subject is a single person we speak of a personalised profile.

            See FIDIS deliverable 7.2, chapter 2

 

profiling:    the process of constructing profiles (correlated data), that identify and represent a data subject (either a person or a group/a category/a cluster), and/or the application of profiles (correlated data) to identify and represent a person as a specific person or as member of a specific group/category/cluster, aiming at the assessment of risks and/or opportunities for the data user (inferred from risks and opportunities concerning the data subject)

            See FIDIS deliverable 7.2, chapter 2

 

 

(end) user:    the data subject that uses a service and/or a device (personal digital agent, web, customer loyalty card), whose data are recorded and processed  and/or to whom a profile is applied

 

 

 

 

 

Conclusions  fidis-wp7-del7.3.ami_profiling_02.sxw  Bibliography
61 / 62