March 2006HFT2006 - Sophia Antipolis, France The social impact of pervasive technologies Anne Clarke

Slides:



Advertisements
Similar presentations
22nd October 2004 Digital Home & HF Workshop - STF266 In a digital world, children still need protection as they are encouraged to learn Anne Clarke STF266.
Advertisements

March 2006HFT2006, ETSI Sophia 1 Children and ICTs Anne M Clarke things we need to know.
Social Media for Business IFSA March Considering Your Options.
The Role of Environmental Monitoring in the Green Economy Strategy K Nathan Hill March 2010.
Course: e-Governance Project Lifecycle Day 1
Teaching Hacker Ethics with a Common Curriculum for “Information Ethics” H2K2 Presentation July 12, 2002 Greg Newby
SANE: A Protection Architecture for Enterprise Networks Offense by: Amit Mondal Bert Gonzalez.
Learning Goals Be able to identify the major forces shaping the new digital age. Understand how companies have responded to the Internet with e-business.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
Lecture 11 Reliability and Security in IT infrastructure.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
IT:Network:Microsoft Applications
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Software Reliability: The “Physics” of “Failure” SJSU ISE 297 Donald Kerns 7/31/00.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 20 Slide 1 Integration testing l Tests complete systems or subsystems composed of integrated.
NetSim ZigBee Simulation Code Walkthrough in 10 steps
1 WEB Engineering Introduction to Electronic Commerce COMM1Q.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
WEB DESIGN FOR CHILDREN AND YOUNG ADULT LIBRARIES Ross J. Todd School of Communication, Information and Library Studies Rutgers, the State University of.
1 WEB Engineering E-Commerce Strategy & Management COM350.
Socio-technical Systems (Computer-based System Engineering)
Security in autonomic communication Shuping Liu Networking Lab HUT.
89 th Annual Meeting & Exposition March 21 – 24, 2010 Denver, Colorado Avoid Being a Case Study: How to Make the Right eProcurement Decisions Now.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
CSC 480 Software Engineering Lecture 15 Oct 21, 2002.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Software Project Management Lecture # 2 Originally shared for: mashhoood.webs.com.
Phil Van Etten CEO, GOING TO THE CLOUD. INTRODUCTION Former CEO, President of Sygate and Azaleos currently CEO of Netmail - Netmail cloud Cloud Adaption.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Change Management Objectives of this session To create awareness of change management.
1 5/18/2007ã 2007, Spencer Rugaber Architectural Styles and Non- Functional Requirements Jan Bosch. Design and Use of Software Architectures. Addison-Wesley,
Adaptive Integrated Framework (AIF): a new methodology for managing impacts of multiple stressors in coastal ecosystems A bit more on AIF, project components.
Describe the potential of IT to improve internal and external communications By Jim Green.
Install, configure and test ICT Networks
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Initiatives for FP6 A few thoughts on flip chart about: Open Infrastructures Paulo E. Veríssimo LaSIGe-FCUL, Univ. Lisboa
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Digital opportunities in Technology-Enabled Care
Large Distributed Systems
Living in a Network Centric World
Living in a Network Centric World
Social Protection in South Asia
Failures of Technological Systems
Network Survivability
Living in a Network Centric World
Living in a Network Centric World
PREPARED BY: RIDDHI PATEL (09CE085)
Living in a Network Centric World
Living in a Network Centric World
Wenyu Ren, Timothy Yardley, Klara Nahrstedt
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
A New Concept for Laboratory Quality Management Systems
Living in a Network Centric World
Presentation transcript:

March 2006HFT Sophia Antipolis, France The social impact of pervasive technologies Anne Clarke

March 2006HFT Sophia Antipolis, France Current systems engineering models have failed the users Spam, virus, worm Insecurity access, data, personal information Digital divide(s) Lack of adequate security features Misuse happy slapping Bluejacking Abuse of vulnerable users especially naïve users

March 2006HFT Sophia Antipolis, France Why has current systems engineering failed users? A protocol for packet network interconnection V G Cerf, R E Kahn, 1974 USERS NOT MENTIONED EVEN ONCE!!!! User Centered Design processes not fully implemented poorly understood economically challenging

March 2006HFT Sophia Antipolis, France The Next Generation - Pervasive Networking "An interconnection of all things" Always on ad hoc subnetworking ambient and pervasive technologies new channels and modes of communication location based push paradigms multimedia - data, video, etc on the street inside premises greater range and larger scale of interaction possibilities and misuse opportunities

March 2006HFT Sophia Antipolis, France Social Consequences? New digital divides on a larger scale than before creating an even smaller domains of technological literate users A wider range of security issues loss of personal control of private data what will user guidelines look like? a very large book!

March 2006HFT Sophia Antipolis, France Socially Inclusive Systems Engineering - 1 Default status protects naïve and vulnerable users default = all features off there must be no way to avoid this clear guidance about the consequences of enabling specific features proof of competence required if safeguards are to be lowered

March 2006HFT Sophia Antipolis, France Autonomous control systems must act instantaneously to block access by rogue elements, and to repair any system degradation Feedback loop damping prevent propagation of faults, errors and failures slow down the spiral of system degradation not reinforce it Socially Inclusive Systems Engineering - 2

March 2006HFT Sophia Antipolis, France Socially inclusive social impact assessment for all new systems and system components BEFORE large scale deployment with clear strategies to deal with any negative social consequences this means suppliers being responsible for their products and services Socially Inclusive Systems Engineering - 3

March 2006HFT Sophia Antipolis To avoid the pitfalls of technologically led systems development and deployment, Next Generation processes must be socially inclusive. This means it must be led by the user