Our professional essay writing service specializes in writing high-quality academic papers in the shortest periods of time!
  • 1. Place your custom order
  • 2. Our writers do your paper
  • 3. We check its quality level
  • 4. The paper is sent to you

Privacy Issues in Ambient Technology

Table of Contents

Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Discussion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Ambient technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Advantages of ambient technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Disadvantages of ambient technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

Privacy and security issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Ethical issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

Social issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Legal issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Professional issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Application of ACM and BCS professional codes of conduct. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Different perspectives on privacy issues in ambient technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14

References List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

Introduction

Technological growth across the globe has been phenomenal in the past few decades. Scientists and researchers in the field of information technology have continuously sought to improve the existing technologies through innovation besides developing new and increasingly sophisticated technological systems. This has led to the shift in focus to the development of technological interfaces that are both intuitive and intelligence thereby facilitating unobtrusive interaction between the individuals and the new technologies. This has not only improved the manner in which people interact with their environment but it has also enhanced the manner in which individuals undertake their everyday activities. Nevertheless, the increased technological development particularly the advent of ambient technologies has given rise to a wide range of challenges with regard to security and privacy of the users. This is mostly due to the vulnerability of network connections used in ambient technologies to unauthorized access which exposes users to data loss and other privacy related issues (Crutzen C. , n. d). In the light of this background therefore, this paper seeks explore in detail privacy issues related to the use of ambient technology. The paper will seek to understand ambient technology is; its advantages and disadvantages, privacy, security, ethical, legal and professional issues related to its use, examine different perspectives presented on the issue besides applying the ACM and BCS codes of conduct to the issue.

Discussion

Ambient technology

Ambient technology can be understood as a form of technological advancement in which intuitive and intelligent interfaces will be entrenched in the everyday objects surrounding the individuals facilitating the development of an environment that recognizes and responds to the needs and presence of users unobtrusively. Unlike the other technologies therefore, ambient technologies employ interfaces that are intuitive, invisible and unobtrusive, and it thereby appeals more to the feelings and thoughts of the people (Caire & Torre, 2010 pg. 1229). Similarly, ambient technologies can also be viewed as a technology that surrounds human beings with software agents, wireless networking technologies, intelligent interfaces and computerized devices. Ambient technology therefore create a situation where computing services and resources are interconnected and traverse every aspect of human life besides bringing everyday objects in the human environment to life (Crutzen, 2007 pg. 15).

The electronic environment created by ambient technology tends to be sensitive as well as responsive to the existence of human beings in the environment. This provides a circumambient way through which changes in the surrounding as well as the actions of the individuals are monitored through special sensors. As such, the technology is able to establish individual preferences thereby triggering objects in the daily life of the individuals to pre-act or react in a manner that is pleasant or desirable to the user. This is facilitated by increased integration and interconnection of communication devices into the environment leading to the subsequent disappearance of the technology into the surroundings. This creates a situation where the user is only able to perceive the intuitive and unobtrusive interface which provides support in everyday activities (Crutzen, 2007 pg. 15).

Currently, use of ambient technology is evident in such activities as examining of analogue physical processes which are the digitally described and analyzed using interpretation models that are knowledge based. Nevertheless, the permeation of both private and public environments by autonomous but interconnected devices constitutes a new development in ambient technology. This has facilitated the use of artificial intelligent agents that establish routine in the daily lives of the individuals thereby providing automated decisions to these routines (Crutzen, 2007 pg. 15). Despite the benefits associated with this technological development however questions regarding the ability of the artificial agents to cooperate safely and appropriately arise.

Advantages of ambient technology

Ambient technology is associated with a number of advantages. One of the most conspicuous advantages of ambient technology is that it integrates computing, telecommunication and consumer electronics in manner that enables the devices to operate in concert in providing support to individuals (Niebert, 2007 pg. 4). This is achieved through the use of intelligence and information concealed in the network system that interconnects the devices. The ability of the technology to integrate various devices and interconnect them facilitates the creation of an ambient intelligence world where people are able to get support in every aspect of their day to day activities.

Secondly, ambient technologies assist in aligning and adapting the existing computer systems to the needs of human beings in the environment (Caire & Torre, 2010 pg. 1229). This is achieved through the development and use of artificial intelligent agents that monitor activities of the people in a bid to establish patterns in their daily lives. As such, the collected intelligence is used to develop computer systems that are both sensitive as well as responsive to the needs of the people in the surrounding. The ability of ambient technologies to adapt computer system to the human needs ensures that users get the adequate support in accomplishing everyday tasks. Aligning computer systems to human needs also ensures that support provided by the devices appears as natural as possible and hence unobtrusive.

The third advantage of ambient technology is that it enhances the ability of the individuals to express themselves effortlessly, accurately and efficiently. Enhanced individual expression is achieved through creation of personal profiles through ambient intelligence where individual preferences are invisibly tracked and captured by artificial intelligent agents (Caire & Torre, 2010 pg. 1229). Networked devices embedded in the environment detect sounds, tastes, facial expressions and movements of the human beings in the environment thereby creating an accurate profile based on their preferences. This eliminates the need for the individuals to consciously disclose their personal preferences as sensors are used in collecting the required information thereby improving the expression capacity of the users.

Fourth, unlike conventional technologies ambient technologies tend to unobtrusive and transparent. Ambient technology is integrated in the ecology of the users and is hence invisible and non intrusive. This may be embedded in such objects as books, chairs or desks facilitating the creation of an environment where the user is unobtrusively surrounded by interconnected computer systems and devices that monitor their activities and respond to their needs on a daily basis (Riva, 2005 pg. 4). The non-intrusive nature of ambient technology makes it user-friendly as the individual is not always conscious of systems and sensors monitoring their every move enabling the user to lead their lives normally.

Another advantage of ambient technology is that it is ubiquitous. Ambient technology avails computer systems through the physical environment of the people. These are embedded in the physical objects in the work place and homes ensuring that the systems are available to every individual in the environment. Ubiquity is facilitated by wireless networking enabling the individuals to productively interact with their surroundings. As such, interactions are through multiple channels which eliminate the need for constant human intervention as the systems can communicate with one another through the network (Riva, 2005 pg. 4).

Besides being adaptive and context aware, ambient technologies are also anticipatory in nature. Ambient technologies can employ the intelligence and information concealed in the network to anticipate the desires of an individual devoid of conscious intervention (Magnani, 2010 pg. 161). The ability of the technology to anticipate future desires of a person enables it to adapt changes in the environment and tailor them to the needs of the individual. This ensures that the individual is able to adjust their daily activities to suit their ecology based on the anticipated desires thereby eliminating a situation where daily activities are disrupted.

Ambient technology also assists in the creation skills and knowledge for work besides enhancing consumer choice and citizenship. Ambient technologies use multiple sensors that detect sound, movement, shape and scent of the individuals to create skills, knowledge and intelligence database that is concealed in the network (Riva, 2005 pg. 4). The wide knowledge and skills can be used to match individuals to tasks thereby enhancing the quality of work accomplished and increasing productivity. Additionally, the intelligence collected by the systems is used to establish individual preferences and personal profiles that enable the system provide product range likely to appeal to the user leading to improved consumer choice.

Disadvantages of ambient technology

Ambient technology is associated with a number of shortcomings. To begin with, the artificial intelligent agents employed by the technology do not guarantee safe and appropriate cooperation (Riva, 2005 pg. 4). The autonomous devices embedded in the physical environment to unobtrusively monitor individuals and collect information on them, may miss important details on a person's life depending on the type of sensor employed by the artificial intelligent agent. This may lead to production of automated routine decisions that are misleading to the users. Additionally, the devices may fail to cooperate appropriately with the user in terms of activity scheduling resulting in conflicting outputs.

Another disadvantage of ambient technology revolves around the security and privacy issues related to its use. Ambient technology employs numerous active devices that are interconnected and integrated in the physical environment to monitor, react to and support the daily operations of people in that surrounding. As such, the technology employs remote and wireless communication in transmitting the collected intelligence and communicating individual preferences to other devices. This exposes the individuals to loss of personal data to people who may remotely access information stored in the network. Additionally, privacy issues may arise if private data becomes public particularly where the technology uses a network that is insecure (Caire & Torre, 2010 pg. 1229).

Similarly, use of ambient technology exposes individuals in an environment to identity theft and manipulation (Caire & Torre, 2010 pg. 1229). As aforementioned, ambient technology thrive on increased integration and interconnection of communication devices in both the public and private environments. This requires creation of a system that clearly distinguishes between personal or private and public information (Maña, Gómez, & Rudolph, 2008 pg. 52). As such, private data is secured and can only be accessed by the owner while public data is shared with other users in the network. In the event that, the system fails to make a distinction between the two the network may send notifications containing personal data such as identification details to other users exposing the individual to identify theft. This may lead to financial losses where the stolen identity is used to withdraw funds or make purchases by malicious people in the network.

Ambient technology also exposes individual in an environment to exploitation by marketing firms and charity groups. Marketers and producers may for instance gain access to individual profiles stored in the network and use them to send unsolicited marketing messages to individuals identified as potential consumers of their products. Additionally, marketers of high-end products such as automobiles may use such parameters as wealth levels to identify clients likely to afford the products thereby exposing individuals to exploitation. Similarly, individuals identified as wealthy may also be targeted by charity organization soliciting for funds hence exposing them to financial exploitation. It is therefore imperative that the ambient technology guarantees the users against unintended misuse of personal data (Wright, 2010 pg. 176).

Privacy and security issues

Privacy and security concerns constitute the most significant concerns with regard to the use of ambient technology. The concerns stem from the fact that the technology employs special sensors that collects personal information without alerting the user. For instance, artificial intelligent agents incorporated in a motor vehicle collect and stores information on destinations an individual visits, roads used, favorite speed, type of music listened to and temperature levels preferred in certain weather among others. While this information may enable the user to navigate the roads based on their preferences it may also fall into malicious hands or advertisers exposing the user to spamming and other privacy problems. Additionally, the preferences may be altered to exploit the user through inclusion of a preference for paid parking areas where the user prefers free parking (Caire & Torre, 2010 pg. 1240).

Additionally, use of ambient technology leads to loss of control over personal data collected and stored in the network (Zaad & Allouch, 2008 pg. 58). This compromises the protection of the user privacy as the data may be released or shared with third parties. For instance, personal profiles created based on personal preferences and other finer details of a person's life may sold to marketers or advertisers leading to loss of privacy. Additionally, the ability of the technology to continuously and permanently observe individuals is also a source of privacy concern. Continuous observation though unobtrusive may lead to violation of personal privacy which is guaranteed with the use of conventional technologies. Privacy is therefore a major source of concern among communities using ambient technology and measures that guarantee privacy protection should be incorporated to win the trust of the users (Tavani, 2009 pg. 362).

Ambient technologies are also give rise to security concerns particularly with regard to safe execution of business transactions by the individuals. Devices employed in ambient technology tend to have communication capabilities that are expanded and far-reaching (Caire & Torre, 2010 pg. 1240). As such, devices within the network can easily be wirelessly accessed by other active devices in the system exposing users to information hijacking and other security threats. For example, sensitive personal data of a user executing a bank transaction in the network may be hijacked by mischievous people in the network where adequate security measures have not been put in place leading to identity theft and subsequent financial losses.

Similarly, an insecure network may also expose the users to physical harm especially when their itineraries fall into the hands of robbers and other criminals. Personal preferences such as driving routes and home arrival times may be used by the criminals to plan physical attacks on an individual or their home. Ambient technology should therefore offer security assurances with regard to the protection of personal information and profiles to avert instances where loss of the same exposes individuals to security risks. This can be achieved through use of a network that integrates a complex data encryption system to ensure the security of personal data during transfer from one device to another. Additionally, the technology may employ a restrictive network as well as limiting communication capabilities of some devices to prevent unauthorized access of network databases by criminals. Device to a device during a sensitive transaction should also be restricted to avert data hijacking (Jurjens, 2009 pg. 21).

Ethical issues

Ethical issues associated with the use of ambient technology revolve around surveillance of the users, privacy threats and identity theft (Caire & Torre, 2010 pg. 1231). Devices used in ambient technologies monitor individuals in the physical environment without first seeking their approval which leads to the question of privacy intrusion. Though the individual may in some cases be aware of what the system is doing, the fact that the devices through their enhanced sensing capabilities are able to monitor movements, detect scent, sound and shape and collect information based on these elements leads to loss of personal privacy. The system does not seek consent before collecting, compiling and storing sensitive data on an individual which is immoral.

Moreover, ethical issues may also arise where network administrators do not safeguard users against identity thefts and privacy threats by allowing third parties such as advertisers and marketers to personal data stored in the network. Such behavior would be unethical as the administrators have an ethical responsibility to ensure the safety of their clients by protecting them against any form of harm that may result from unauthorized access to private information (Aarts, Crowley, & Ruyter, 2008 pg. 343).

Social issues

Privacy threats and permanent surveillance of users also give rise to social issues related to trust. Ambient technology users may lose trust in the network especially when their private data is shared with third parties or accessed by criminals. As such, the individuals may find it difficult to interact cooperatively with the technology due to lack of trust in the network (Caire & Torre, 2010 pg. 1231). Distrust among the users of ambient technology may also stem from the inability of the network to guarantee confidentiality to the people in the created electronic environment. Additionally, ambient technology may also affect the manner in which individuals interact with one another and their surroundings thereby creating a dependency on the technological devices embedded in the environment.

Legal issues

Legal issues revolving around sale of private data to advertisers and the responsibility of the network operator to ensure safety and privacy of the users may also arise. This may lead to filing of lawsuits by users seeking compensation for security and privacy risks that the technology exposes them to (Caire & Torre, 2010 pg. 1231). Moreover, legal issues may also stem from the institution of laws that are not enforceable and that do not respect privacy of the users. Adoption of dysfunctional laws may expose users to privacy and confidentiality violation (Caire & Torre, 2010 pg. 1241).

Professional issues

Similarly, professional issues involving the obligations and conduct of the network administrators may also arise especially when some professionals allow unauthorized access to the network database or fail to adequately protect network user against privacy threats. It is therefore critical that adequate regulatory mechanisms be put in place to safeguard users against abuse (Ruyter, 2010 pg. 265).

Application of ACM and BCS professional codes of conduct

According to the British Computer Society code of conduct provisions for instance, professionals are not supposed to disclose confidential information belonging to a client and acquired during professional practice to third parties or use it for personal gain. Additionally, professionals are supposed to disclose all details concerning the capability of the system to users to enhance their understanding on the risks the technology can pose (Rahanu, 2001).

Similarly, the ACM code of conduct advices professionals against engaging in behaviors that could cause harm to clients through undesirable loss of personal data. The ACM code of conduct also emphasizes the need for the professionals to put into consideration potential negative implications that may be posed decisions made when designing and implementing the technology (Rahanu, 2001). Enforcement of these guidelines would go a long way into ensuring the privacy of ambient technology users.

Different perspectives on privacy issues in ambient technology

Different perspectives and arguments have been advanced by other scholars with regard to the security and privacy issues related to the use of ambient technology. Langheinrich (2005) advances several guidelines that can be employed in addressing privacy issues related to ambient technology. To begin with, Langheinrich proposes the enforcement of locality which limits the reaching capabilities of a message in the network. While this would help reduce privacy threats associated with the technology, it would also undermine the primary goals of the technology which is to create a broad but integrated electronic environment.

The second proposal by Langheinrich concerns limiting the proximity of devices in the network with regard to surveillance of users. Simple proximity particularly with regard to personal devices is viewed as critical in preventing unwanted monitoring of people within the environment. Additionally, Langheinrich proposes development of communication protocols that ensure baseline anonymity so as to protect the identity of the users through the use of a form of identification that is both random and temporary (Langheinrich, 2005). Those these guidelines may help in ensuring the privacy of the users in the network, their implementation may prove challenging. In an effort to ensure baseline anonymity for instance, new security systems may have to be developed a process that may in turn call for security requirements that are different from the existing ones. This may also require the adoption of access technologies and databases that are privacy-aware further complicating the implementation process.

Langheinrich also proposes the adoption of codes of practice, laws and infrastructures that are privacy-respecting. To achieve this, Langheinrich proposes changing of laws that are not enforceable as well as adoption of other procedural and technological solutions to the privacy issue. Technological solutions to these privacy issues may comprise proper implementation of identification and authentication systems to protect users against credit fraud and identity theft risks (Caire & Torre, 2010 pg. 1241).

Conclusion

From the analysis, the significance of privacy issue in the use of ambient technologies is clearly evident. Privacy concerns among the users derive from the capability of the technology to unobtrusively monitor and collect personal data among users in the network. The inability of the technology to guarantee the protection of the large amount of sensitive private data retained in the network is a cause for alarm among users and hence the need for incorporation of adequate security measures to guard against information loss and unauthorized access. There is also need to guarantee privacy by protecting users against unwanted surveillance by limiting the proximity of the artificial intelligent agents employed by ambient technology.

References List

Aarts, E, H, Crowley, J, L, & Ruyter, B, d, 2008, Ambient Intelligence: European Conference, AmI 2008, Nuremberg, Germany. Springer, New York

Caire, P, & Torre, L, v, 2010, Convivial Ambient Technologies: Requirements, Ontology and Design. The Computer Journal , 53 (8), 1229-1258.

Crutzen, C, K, 2007, Ambient Intelligence, between Heaven and Hell. In I. Zorn, Gender designs IT: construction and deconstruction of information society technology (pp. 15-17). VS Verlag, Munich

Crutzen, C, n. d, Trusting our Trust? Retrieved January 10, 2012, from https://www. ics. uci. edu/~jen/Papers/Crutzen.pdf

Jurjens, J, 2009, Security and Dependability Engineering. In G. Spanoudakis, Security and Dependability for Ambient Intelligence (pp. 21-32). Springer, New York

Langheinrich, M, 2005, Personal privacy in ubiquitous computing-tools and system support. PhD Thesis ETH, Zurich

Magnani, L, 2010, Model-Based Reasoning in Science and Technology: Abduction, Logic, and. Springer, New York

Maña, A, Gómez, A, M, & Rudolph, C, 2008, Developing ambient intelligence: proceedings of the International Conference on Ambient Intelligence Developments (AmI. d'07). Springer, New York

Niebert, N, 2007, Ambient networks: co-operative mobile networking for the wireless world. John Wiley and Sons, New Jersey

Rahanu, H, 2001, Evaluating Codes of Conduct: ACM and BCS . Retrieved January 10, 2012, from https://www. eis. mdx. ac. uk/staffpages/hrahanu/bis2060week10.htm#BCS%20CODE%20OF%20PRACTICE

Riva, G, 2005, Ambient intelligence: the evolution of technology, communication and cognition towards the future of human-computer interaction. IOS Press, Amsterdam

Ruyter, B, D, 2010, Ambient Intelligence: First International Joint Conference, AmI 2010 Malaga, Spain, November 10-12, 2010 Proceedings. Springer, New York

Tavani, H, T, 2009, Ethics and Technology: Controversies, Questions, and Strategies for Ethical. John Wiley and Sons, New Jersey

Wright, D, 2010, Safeguards in a World of Ambient Intelligence. Springer, New York

Zaad, L, & Allouch, S, B, 2008, Influence of Control on the Acceptance of Ambient Technology by Elderly People: An Explorative Study. Ambient Intelligence , 58-74.


Place your order
Type of document:
Urgency:
Number of pages:
Total price:
Save 22% on your first order | use discount code RUSH22
Our customers say
Alana Scott
Australia
Rating:
I was really tensed because I had to submit my research paper within one day but I am really thankful to rushmyessay.com. I was impressed by the way writer gave special attention to my requirements and demands.
Emma Geller
UK
Rating:
The work provided was professional. The writer did care of all the special requirements I wanted to see in the research paper. I was overwhelmed with work, and rushmyessay.com saved my grade!
Zoe Pratt
US
Rating:
They got my work done on time, which is all I needed. I wanted a passing grade and I got one. The prices were just right, and the customer support people were nice. I will use this service again and I have told my closest friends about it.
Chris Saldana
US
Rating:
Thank you for keeping your confidentiality promise. I was genuinely worried that your service was some sort of trap, or that you may leak the fact I used your service. You kept my secret, thank you!
View all testimonials
Best prices
  • Standard
    Standard quality
    Basic good quality
    $19.99/page
  • Premium
    Premium quality
    Most popular quality
    $21.99/page
  • Platinum
    Platinum quality
    For comlex projects
    $23.99/page
Check prices →
+ Free features
Free outline $5
Free title page $5
Free bibliography $10
Free formatting $10
Free email delivery $10
Free amendments $30
Total saving $65