Cybercrime issues in a future IT environment - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Cybercrime issues in a future IT environment

Description:

Develop a longer term vision of the challenges and opportunities for sustained ... Telepresence hardware suppliers: holographic displays, sound field imaging, sensors ... – PowerPoint PPT presentation

Number of Views:145
Avg rating:3.0/5.0
Slides: 17
Provided by: fleis8
Category:

less

Transcript and Presenter's Notes

Title: Cybercrime issues in a future IT environment


1
Cybercrime issues in a future IT
environment Ambient Intelligence - AmI
JRC Workshop on Cybercrime. Sevilla, 12 january
2001
2
Institutional context of the AmI task
  • DG INFSO
  • ISTAG, the Information Society Technologies
    Advisory Group
  • ICT / LS Unit
  • Experts groups from industry, academics, design,
    etc.

3
ISTAGs request
  • Develop a longer term vision of the challenges
    and opportunities for sustained global
    competitiveness of the European IST industry
    circa 2010
  • On the basis of its Ambient Intelligence Vision
    Statement
  • Start creating an ambient intelligence landscape
    (for seamless delivery of services and
    applications) in Europe relying also upon
    test-beds and open source software, develop
    user-friendliness, and develop and converge the
    networking infrastructure in Europe to
    world-class.
  • Interim reports as input to programme priorities
    definition (FP5)
  • Direct input to specific programme definition
    (FP6)

4
Ambient Intelligence visions
  • Ambient Intelligence Ubiquitous computing,
    ubiquitous communication, intelligent user
    friendly interfaces
  • Ambient Intelligence ubiquity, transparency,
    intelligence (sensing, processing, taking
    decisions,..)
  • Access to large-scale information resources and
    to high-capacity information-processing power in
    any situation, at any time, by means of a range
    of media and devices and by means of
    user-friendly interfaces
  • Third generation ICT mainframe -gt stand alone -gt
    embedded networked ICTs

5
Technological baseline
  • Smart materials with sensors and com capacity
  • Speech, tag and pattern recognition
  • ID authentication
  • Micro-payment systems
  • Seamless interoperability of communication
    networks/ network management
  • Intelligent agents and middleware
  • Distributed databases management/ datamining and
    warehousing
  • Nanotechnology / Cross-technology

6
Four scenarios
7
Dimitrios - D-Me (1)
  • Scenario elements (see text)
  • An individually embedded gateway the D-Me
  • Privacy downloaded and shared sensors
  • One or several versions of oneself
  • An avatar that takes decision and acts on your
    behalf
  • A virtual space for matching people

8
Dimitrios - D-Me (2)
  • Examples of quoted cybercrime issues
  • Emotional bandwidth and authentication
  • Multiple identities and identity definition
  • Criminal networking facilitated
  • Privacy control of, and access to, private data
  • Others?

9
Carmen - Traffic optimization (1)
  • Scenario elements (see text)
  • Optimizing traffic by sharing/integrating private
    and public transportation for people and goods
  • Increasing safety
  • Reducing pollution
  • Transportation of goods
  • All vehicles a node in the network
  • All goods tagged

10
Carmen - Traffic optimization (2)
  • Examples of quoted cybercrime issues
  • Integrated urban transport management system
  • Privacy issues (location, transportation means,
    etc.)
  • Payment issues (authentication, theft, etc..)
  • Others?

11
Cybercrime in an AmI environment
  • 1. Vehicles and targets for cybercrime ?
  • Integrated complex systems
  • Emotional bandwidth
  • Multiple identities
  • Others?
  • 2. Existing or to-be-developed solutions ?

12
Thank you
13
Maria Road Warrior (pt1)
  • Scenario Maria a high pressured sales woman
    thriving on her personal ambient communicator
    system
  • Technology
  • Micro-sized software radio
  • Electronic ID
  • Ad-hoc network management
  • Agent technologies
  • Augmented objects
  • Security, trust technologies

14
Maria Road Warrior (pt2)
  • Economic
  • Hardware markets P-Com, augmented objects
  • ATML start-up explosion
  • Premium service model multiservice vendor
    (personal agent hire and training outlets,
    credit, micropayments and billing)
  • Cross-sectoral alliances/ global partnership
    models
  • Leasing business models
  • Socio-political
  • Privacy, trust security security breaches,
    identity theft and ID-key black outs (lock out).
  • Multiple identities
  • Potential key divide
  • There has to be an Off-switch

15
Ambient for Social Learning (pt1)
  • Scenario An ambient that connects...
  • physical spaces and augmented objects,
  • individuals and groups
  • collaborative tasks and co-design
  • renewal and refreshment
  • seamless interaction - people and places
  • Technology
  • Recognition (tracing and identification) of
    individuals, groups and objects.
  • Interactive aids for negotiating goals and
    challenges.
  • Projection facilities for light and soundfields
  • Aids for reviewing experiences
  • Content design facilities
  • Community memory

16
Ambient for Social Learning (pt2)
  • Economic
  • Telepresence hardware suppliers holographic
    displays, sound field imaging, sensors
  • Content providers and customisation (publishers,
    new media providers, educationalists,
    consultants)
  • Knowledge management systems providers and
    developers (AmI-era educational services)
  • Socio-political
  • High potential for choice and personalisation of
    learning approaches
  • Emphasis on the social side of the Information
    Society
  • Accessibility and availability- zero cost?
Write a Comment
User Comments (0)
About PowerShow.com