Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 87))

Abstract

In this work, authors define a set of principles that should be contained in context-aware applications (including biometric sensors) to accomplish the legal aspect in Europe and USA. Paper presents the necessity to consider legal aspect, related with pri-vacy or human rights, into the development of the incipient context based services. Clearly, context based services and Ambient Intelligence (and the most promising work area in Europe that is Ambient Assisted Living, ALL) needs a great effort in research new identification procedures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dey, A.K., Saber, D., Abowd, G.D.: A conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction (HCI) Journal 16, 97–166 (2001)

    Article  Google Scholar 

  2. Chen, G., Kotz, D.: Context Aggregation and Dissemination in Ubiquitous Computing Systems. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, June 20-21, p. 105 (2002)

    Google Scholar 

  3. Hong, J.: The context fabric: An infrastructure for context-aware computing. In: Minneapolis, A.P. (ed.) Extended Abstracts of ACM Conference on Human Factors in Computing Systems (CHI 2002), pp. 554–555. ACM Press, Minneapolis (2002)

    Chapter  Google Scholar 

  4. Burke, R., Hammond, K., Young, B.: Knowledge-based navigation of complex information spaces. In: Proceedings Of The National Conference On Artificial Intelligence, pp. 462–468 (1996)

    Google Scholar 

  5. Abowd, G., Atkeson, C., Hong, J., Long, S., Kooper, R., Pinkerton, M.: Cyber-guide: A mobile context-aware tour guide. Wireless Networks 3(5), 421–433 (1997)

    Article  Google Scholar 

  6. Sanchez-Pi, N., Fuentes, V., Carbo, J., Molina, J.: Knowledge-based system to define context in commercial applications. In: Proceedings of 8th International Conference on Software Engineering, Artificial Intelligence, Networking, and Paraallel/Distributed Computing (SNPD), Qingdao, China (2007)

    Google Scholar 

  7. Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work, Milan, Italy, pp. 77–92 (1993)

    Google Scholar 

  8. Agre, P.: Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction 16(2-4), 177–192 (2001)

    Article  Google Scholar 

  9. Hong, J.I.-A.: An Architecture for Privacy-Sensitive Ubiquitous Computing. PhD. Thesis, University of California, Berkeley (2005)

    Google Scholar 

  10. Weiser, M., Gold, R., Brown, J.S.: The Origins of Ubiquitous Computing Research at PARC in the Late 1980s. IBM Systems Journal 38(4), 693–696 (1999)

    Article  Google Scholar 

  11. Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: Conference on Human Factors in Computing Systems. Extended abstracts on Human factors in computing systems, pp. 724–725 (2003)

    Google Scholar 

  13. Palen, L., Dourish, P.: Unpacking ”privacy” for a networked world. In: Conference on Human Factors in Computing Systems, Florida, USA, pp. 129–136 (2003)

    Google Scholar 

  14. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing 2(1), 46–55 (2003)

    Article  Google Scholar 

  15. That right is enshrined in Article 12 of Universal Declaration of Human Rights, Article 7 the Charter of Fundamental Rights of the European Union (2000/C 364/01) and implicity in Fourth Amendment

    Google Scholar 

  16. See. European Court of Human Rights, López Ostra v. Spain - 16798/90 [1994] ECHR 46 (December 9, 1994). Katz v. United States, 389 U.S 347 (1967) Skinner v. Railway Labor Executives’ Ass’n, 489 U.S. 602 (1989). To see differences between legal systems: Kirtley: Is implementing the EU Data Protection Directive in the United States irreconcilable with the First Amendment? Government Information Quaterly, vol 16 (2), pp. 87-91 (2001)

    Google Scholar 

  17. Jhon, W.: Biometric scanning, law & policy: identifying the concerns-drafting the biometric blueprint. U. Pitt. L. Rev. nº 59, 97–155 (1997)

    Google Scholar 

  18. Beck, U.: La sociedad del riesgo: hacia una nueva modernidad (1998)

    Google Scholar 

  19. Lin, C.-H., Liou, D.-Y., Wu, K.-W.: Opportunities and challenges created by terrorism. Technological Forecasting and Social Change 74(2), 148–164 (2007)

    Article  Google Scholar 

  20. Kennedy, G.: Thumbs up for biometric authentication. Computer Law Review & Tech. Nº 8, 379–407 (2003)

    Google Scholar 

  21. Hustinx, P.: European Data Protection Supervisor. In: Privacy by Design: The Definitive Workshop, Madrid, November 2 (2009), http://www.privacybydesign.ca/

  22. Jain, A.K., Bolle, R.M., Pankanti, S.: Biometrics: Personal Identification in a Net-worked Society. Kluwer, Norwell (1999), ISBN:0792383451

    Google Scholar 

  23. Daugman, J.: Biometric Decision Landscape,Technique Report No. TR482, University of Cambridge Computer Laboratory (1999)

    Google Scholar 

  24. See Regulation (EC) No 444/2009 of the European Parliament and of the Council of 28 May 2009 amending Council Regulation (EC) No 2252/2004 on standards for security features and biometrics in passports and travel documents issued by Member States. OJ L 142, pp. 1–4 (June 6, 2009)

    Google Scholar 

  25. Schouten, B., Jacobs, B.: Biometrics and their use in e-passports. Image and Vision Computing 27, 305–312 (2009)

    Article  Google Scholar 

  26. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data OJ L 281, 23.11.1995, p. 31–50 and Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector OJ L 201, pp. 37–47 (July 31, 2002)

    Google Scholar 

  27. Wrighta, D., Gutwirthb, S., Friedewaldc, M., De Hertb, P., Langheinrichd, M., Moscibrodab, A.: Privacy, trust and policy-making: Challenges and responses. Computer law & security review 25, 69–83 (2009)

    Article  Google Scholar 

  28. Grijpink, J.: Privacy Law. Biometrics and Privacy. Computer Law & Security Report 17(3) (2001)

    Google Scholar 

  29. Alfonso, P.: Luciano: Seguridad pública y policía administrativa de seguridad. Valencia (2008)

    Google Scholar 

  30. To see examples (August 4, 2009), http://www.biometrics.gov/Documents/FAQ.pdf

  31. hat rights are enshrined in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data OJ L 281, 23.11.1995, p. 31–50 and Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector OJ L 201, 31.7.2002, p. 37–47. In the United States doesn’t exist general regulation for data protection. Kuner, C: An international legal framework for data protection: issues and prospects. In: Computer Law & Security Review nº 25, pp. 307-317 (2009)

    Google Scholar 

  32. Haas, E.: Back to the future? The use of biometrics, its impact on airport security, and how this technology should be governed. Journal of Air Law and Commerce (69), 459 (2004)

    Google Scholar 

  33. de Santiago, R.: J.Ma La ponderación de bienes e intereses en el Derecho Administrativo. Madrid (2000)

    Google Scholar 

  34. Hustinx, P.: European Data Protection Supervisor. In: Third Joint Parliamentary Meeting on Security: Which technologies and for what security? The new instruments of internal and civil security, Maison de la Chimie, Paris, March 23 (2010)

    Google Scholar 

  35. See, EDPS Video-surveillance Guidelines, March 17, 2010, Guidelines concerning the processing of health data in the workplace by Community institutions and bodies (September 28, 2009)

    Google Scholar 

  36. Kennedy. Note 20

    Google Scholar 

  37. Star, G.: Airport security technology: is the use of biometric identification technology valid under the Fourth Amendment? Law & Technology Journal (251) (2001-2002)

    Google Scholar 

  38. Luther, J.: Razonabilidad y dignidad humana. Revista de derecho constitucional europeo Nº 7, 295–326 (2007)

    Google Scholar 

  39. Opinion of the European Data Protection Supervisor on the Communication from the Commission to the European Parliament and the Council on an area of freedom, security and justice serving the citizen (2009/C 276/02) OJC 276/8 (November 17, 2009)

    Google Scholar 

  40. Schmidt, A.: Interactive context-aware systems interacting with ambient intelligence. IOS Press, Amsterdam (2005)

    Google Scholar 

  41. Emiliani, P., Stephanidis, C.: Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities. IBM Systems Journal 44(3), 605–619 (2005)

    Article  Google Scholar 

  42. World population prospects: The 2006 revision and world urbanization prospects: The, revision. Technical report, Population Division of the Department of Economic and Social Affairs of the United Nations Secretariat (last access: Saturday, February 28, 2009; 12:01:46 AM)

    Google Scholar 

  43. Rentto, K., Korhonen, I., Vaatanen, A., Pekkarinen, L., Tuomisto, T., Cluitmans, L., Lappalainen, R.: Users’ preferences for ubiquitous computing applications at home. In: First European Symposium on Ambient Intelligence 2003, Veldhoven, The Netherlands (2003)

    Google Scholar 

  44. Becker, M., Werkman, E., Anastasopoulos, M., Kleinberger, T.: Approaching ambient intelligent home care system. In: Pervasive Health Conference and Workshops 2006, pp.1–10 (2006)

    Google Scholar 

  45. Floeck, M., Litz, L.: Integration of home automation technology into an assisted living concept. Assisted Living Systems-Models, Architectures and Engineering Approaches (2007)

    Google Scholar 

  46. Fraile, J., Bajo, J., Corchado, J.: Amade: Developing a multi-agent architecture for home care environments. In: 7th Ibero-American Workshop in Multi-Agent Systems (2008)

    Google Scholar 

  47. Cilla, R., Patricio, M. A., Berlanga, A., García, J., Molina, J. M.: Non-supervised Discovering of User Activities in Visual Sensor Networks for Ambient Intelligence applications. Special session Challenges in Ubiquitous Personal Healthcare and Ambient Assisted Living, ISABEL (2009)

    Google Scholar 

  48. Sánchez, N., Molina, J.M.: A Smart Solution for Elders in Ambient Assisted Living. In: Mira, J., Ferrández, J.M., Álvarez, J.R., de la Paz, F., Toledo, F.J. (eds.) IWINAC 2009. LNCS, vol. 5602, pp. 95–103. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  49. Sánchez, N., Molina, J.M.: A Centralized Approach to an Ambient Assisted Living Application: An Intelligent Home. In: Omatu, S., Rocha, M.P., Bravo, J., Fernández, F., Corchado, E., Bustillo, A., Corchado, J.M. (eds.) IWANN 2009. LNCS, vol. 5518, pp. 706–709. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pedraza, J., Patricio, M.A., de Asís, A., Molina, J.M. (2011). Regulatory Model for AAL. In: Corchado, E., Snášel, V., Sedano, J., Hassanien, A.E., Calvo, J.L., Ślȩzak, D. (eds) Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011. Advances in Intelligent and Soft Computing, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19644-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19644-7_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19643-0

  • Online ISBN: 978-3-642-19644-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics