Ubiquitous computing: An overview of technology impacts

Ubiquitous computing is considered as a promising technological path of innovation. Intensive R&D activities and political strategies are addressing the objective to foster marketable technologies and applications. This article explores the state-of-the-art on the way towards the ''Internet of things''. Which application fields have already proved their potential for realising the vision and promises related to the new technology? What are the technical, legal and social challenges that have to be addressed - and how can policy-makers contribute? We deal with these questions in the light of recent developments in research and business, illustrating the findings by examples in retail, logistics and health care. The article concludes that further efforts by all stakeholders from businesses, society and politics are necessary to make ubiquitous computing applications economically sustainable and socially compatible in order to tap its full potential.

[1]  Alexander Roßnagel,et al.  Informationelle Selbstbestimmung in der Welt des Ubiquitous Computing , 2007 .

[2]  Antoinette Rouvroy,et al.  Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence , 2007 .

[3]  Anand Ranganathan,et al.  Towards fault tolerance pervasive computing , 2005, IEEE Technology and Society Magazine.

[4]  Emile H. L. Aarts,et al.  True Visions: The Emergence of Ambient Intelligence , 2008 .

[5]  Pedro M. Reyes,et al.  RFID: the state of the union between promise and practice , 2007 .

[6]  J.M. Conrad,et al.  A survey of energy harvesting sources for embedded systems , 2008, IEEE SoutheastCon 2008.

[7]  Balaji Kumar Broadband Communications , 1995 .

[8]  Margot Gräfin Von Westerholt,et al.  Datenschutzrechtliche Aspekte der Radio Frequency Identification , 2004 .

[9]  Luc Martens,et al.  User-driven innovation? Challenges of user involvement in future technology analysis , 2010 .

[10]  Sunil Chopra,et al.  Looking for the Bang from the RFID Buck , 2007 .

[11]  Sarah Spiekermann,et al.  RFID and privacy: what consumers really want and fear , 2009, Personal and Ubiquitous Computing.

[12]  A. A. Adams,et al.  The ethical challenges of ubiquitous healthcare , 2007 .

[13]  Tom O'Regan,et al.  Telematics and informatics , 2005 .

[14]  Claudia Som,et al.  The Precautionary Principle as a Framework for a Sustainable Information Society , 2009 .

[15]  Moritz Strasser,et al.  Influence of ubiquitous computing on organizational structure , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[16]  Sang M. Lee,et al.  Ubiquitous computing and its effects on small businesses , 2008 .

[17]  Ahti Salo,et al.  Proceedings of the EU-US Scientific Seminar: New Technology Foresight, Forecasting Assessment Methods, Seville, May 13-14, 2004 , 2005 .

[18]  Elgar Fleisch,et al.  The Business Value of Ubiquitous Computing Technologies , 2006 .

[19]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[20]  Mary Lou Ingeholm,et al.  RFID in healthcare. , 2006, Journal of AHIMA.

[21]  Wolfgang Wahlster,et al.  Multi-modal human–environment interaction , 2006 .

[22]  Francesco Vatalaro,et al.  Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction , 2005 .

[23]  Lorenz Hilty Lorenz Erdmann Einfluss von RFID-Tags auf die Abfallentsorgung , 2009 .

[24]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[25]  Roger Clarke,et al.  Privacy impact assessment: Its origins and development , 2009, Comput. Law Secur. Rev..

[26]  Deborah Estrin,et al.  Embedded Every-where: A Research Agenda for Networked Systems of Embedded Computers , 2001 .

[27]  Michael Friedewald,et al.  Ubiquitäres Computing - das Internet der Dinge: Grundlagen, Anwendungen, Folgen , 2010, Studien des Büros für Technikfolgen-Abschätzung beim Deutschen Bundestag.

[28]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[29]  J E Bardram,et al.  Pervasive Healthcare as a Scientific Discipline , 2008, Methods of Information in Medicine.

[30]  Simson L. Garfinkel,et al.  RFID: Applications, Security, and Privacy , 2005 .

[31]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[32]  David Wright,et al.  Should privacy impact assessments be mandatory? , 2011, Commun. ACM.

[33]  Ehl Emile Aarts,et al.  Into Ambient Intelligence , 2006 .

[34]  Jöran Beel,et al.  ePassport - The World's New Electronic Passport: A Report about the ePassport's Benefits, Risks and its Security , 2007 .

[35]  Bill C. Hardgrave,et al.  RFID in Healthcare: A Framework of Uses and Opportunities , 2009, Int. J. Adv. Pervasive Ubiquitous Comput..

[36]  A. Ghiroldi,et al.  Ambient Intelligence-from vision to reality , 2003 .

[37]  Larry Lapide,et al.  Rfid: What's in It for the Forecaster? , 2004 .

[38]  Andrew F. Monk,et al.  Telecare, telehealth and assistive technologies: do we know what we're talking about? , 2008 .

[39]  Frédéric Thiesse,et al.  Adoption and Diffusion of RFID Technology in the Automotive Industry , 2007 .

[40]  Michael Rohs,et al.  Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.

[41]  Constantine Stephanidis Designing for All in Ambient Intelligence Environments: The Interplay of User, Context, and Technology , 2009, Int. J. Hum. Comput. Interact..

[42]  Birgit Gampl,et al.  The RFID Roadmap: The Next Steps for Europe , 2008 .

[43]  Lorenz M. Hilty,et al.  The Precautionary Principle in the Information Society Effects of Pervasive Computing on Health and Environment , 2005 .

[44]  Elgar Fleisch,et al.  Business Impact of Pervasive Technologies: Opportunities and Risks , 2004 .

[45]  Mandy Scheermesser,et al.  Adopting Pervasive Computing for Routine Use in Healthcare , 2010, IEEE Pervasive Computing.

[46]  Zhaohui Wu,et al.  Intelligent Transportation Systems , 2006, IEEE Pervasive Computing.

[47]  Zdenek Ríha An Overview of Electronic Passport Security Features , 2008, FIDIS.

[48]  Pervasive Computing: Trends and Impacts , 2006 .

[49]  George Roussos,et al.  Ubiquitous and Pervasive Commerce , 2006 .

[50]  Ari Juels The Vision of Secure RFID , 2007 .