Some socio-technical aspects of intelligent buildings and pervasive computing research

You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and…every movement scrutinized. (George Orwell, 1984) Recent reports from the European Parliament Technology Assessment unit and the UK Information Commissioner's Office have highlighted the need for debate on how society should balance the convenience that new technology affords with the need to preserve privacy. To date, most of the debate has addressed the more visible aspects of technology and privacy such as surveillance cameras, identity/loyalty cards, internet search engines and radio frequency identification (RFID) tags. In this article we seek to use our experience as computer scientists to advance this debate by considering issues arising from our research related to intelligent buildings and environments, such as the deployment of autonomous intelligent agents. Intelligent buildings and environments are based on the use of numerous ‘invisible’, omnipresent, always-on, communicating computers embedded in everyday artefacts and environments. While most current intelligent building technology is based around automated reactive systems, research is under way that uses technology to gather personal information from people and use this information to deliver personalized services to them. While promising great benefits, this technology, by being invisible and autonomous, raises significant new dangers for individuals and society as a whole. Perhaps the most significant issue is privacy—an individual's right to control the collection and use of personal information. Rather than focusing on the ‘here and now’, this article looks forward to where this research could lead, exploring the issues it might involve. It does this by presenting descriptions of current work, interleaved with a set of short vignettes that are intended to provoke thought so that developers and the population at large might consider the personal and regulatory needs involved. We end this article by offering a conceptual framework for situating multidisciplinary socio-technical research in intelligent buildings.

[1]  D. Lyon Surveillance after September 11 , 2001 .

[2]  Katherine Albrecht,et al.  Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID , 2005 .

[3]  Hani Hagras,et al.  Creating an ambient-intelligence environment using embedded agents , 2004, IEEE Intelligent Systems.

[4]  D. Lyon Surveillance Studies: An Overview , 2007 .

[5]  Víctor Zamudio,et al.  Preventing Instability in Rule-Based Multi-Agent Systems; A Challenge to the Ambient Intelligence Vision , 2007 .

[6]  O. Gandy The Surveillance Society: Information Technology and Bureaucratic Social Control , 1989 .

[7]  A. Danna,et al.  All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .

[8]  Kevin Warwick,et al.  An attempt to extend human sensory capabilities by means of implant technology , 2005, 2005 IEEE International Conference on Systems, Man and Cybernetics.

[9]  Celia Lury,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[10]  Bernard Horan The use of capability descriptions in a wireless transducer network , 2005 .

[11]  Walter Peissl,et al.  ICT and Privacy in Europe. Experiences from technology assessment of ICT and Privacy in seven different European countries. Final report October 16, 2006, European Parliamentary Technology Assessment network (EPTA) , 2006 .

[12]  ClarkeRoger Asimov's Laws of Robotics , 1993 .

[13]  Victor Callaghan,et al.  Intelligent Habitats and the Future: The Interaction of People, Agents and Environmental Artifacts , 2000 .

[14]  J. P. Eckert The Integration Of Man And Machine , 1999 .

[15]  Panos E. Kourouthanassis,et al.  Pervasive Information Systems , 2008 .

[16]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[17]  C. Krumhansl Keynote Presentation , 2004 .

[18]  K. Ball,et al.  Situating workplace surveillance: Ethics and computer based performance monitoring , 2001, Ethics and Information Technology.

[19]  Michael C. Mozer,et al.  The Neural Network House: An Environment that Adapts to its Inhabitants , 1998 .

[20]  Victor Callaghan,et al.  Embedded-Internet Devices: A Means of Realising th Pervasive Computing Vision , 2003, ICWI.

[21]  Arthur C. Clarke,et al.  From 2001: A Space Odyssey , 2001 .

[22]  Graham Clarke,et al.  Domestic Pervasive Information Systems : End-user programming of digital homes , 2005 .

[23]  Hani Hagras,et al.  User interaction in a shared information space — A pervasive environment for the home , 2005 .

[24]  Graham Clarke,et al.  An End User Tool for Customising Personal Spaces in Ubiquitous Environments , 2007 .

[25]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[26]  Graham Clarke,et al.  Ubiquitous Computing, Informatization, Urban Structures and Density , 2007 .

[27]  Hani Hagras,et al.  Inhabited Intelligent Environments , 2004 .

[28]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[29]  Perri,et al.  Joined‐up government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II , 2005 .

[30]  Graham Clarke,et al.  A user-independent real-time emotion recognition system for software agents in domestic environments , 2007, Eng. Appl. Artif. Intell..

[31]  D. Burnham The rise of the computer state , 1983 .