Paper@ResearchGate: http://bit.ly/1eM05Mg
PrimeLife/IFIP Summer School 2010
Privacy and Identity Management for Life
3rd of August 2010, Helsingborg, Sweden
This document summarizes Paco Flórez's presentation on ambient assisted living and related projects. It discusses how technologies can help support elderly and disabled individuals' daily living through smart home environments. Specific projects mentioned include the metalTIC smart home, which aims to test ambient assisted living services and human-environment interaction. The presentation also outlines the goals of ambient assisted living to promote independent living and highlights Spain's aging population trends driving the need for such technologies and services.
Microphones Cameras RFID
Monitoring Wearable Implantable Environmental
health, activities sensors sensors sensors
and behaviors.
Safety and Motion Presence Fall detection
emergency detection detection systems
detection.
Energy Smart meters Lighting Temperature
management in and plugs sensors sensors
homes and public
spaces.
Reasoning (1)
- Reasoning is the ability to interpret sensory data and to infer high-level
information and knowledge.
- Reasoning is a key function in AAL systems to provide assistance and
support to users in an intelligent, adaptive and personalized way
Ideagen age friendly sector dundalk 2010 event reportthreesixty
There seems to be some frustration with the level of spending by government agencies like Enterprise Ireland and the HSE on connected health and telehealth initiatives versus the fragmented results that have been achieved so far. Some potential responses are:
- Large initiatives take time to implement properly and yield results at a systemic level. It's still early days for many of these investments and programs.
- Interoperability and standards are challenging issues that require coordination across many stakeholders, from technology providers to healthcare organizations to policymakers. Resolving these problems will help maximize the impact of investments.
- More could potentially be done to facilitate partnerships between funded projects/companies to help integrate solutions and accelerate real-world adoption. Ensuring funded solutions work well together
Presentation at the Workshop on Expectations for AAL and enhanced living environments in 2025/2030, by Francisco Florez-Revuelta, Susanna Spinsante, and Nuno Garcia, all members of the Cost Action IC1303 - AAPELE - Algorithms, Architectures and Platforms for Enhanced Living Environments
Cancer is a dangerous ailment that influences any part of the body and could produce malignant tumors. One feature of cancer is that abnormal cells create quickly and expand beyond their regular bounds. This could attack various parts of the human body and spread to other organs, which is the primary cause of cancer death. Cancer is becoming a more serious worldwide health concern. In the face of these threats, advanced technologies such as Artificial Intelligence (AI), cognitive systems, and the Internet of Things (IoT) may be insufficient to prevent, predict, diagnose, and treat cancer. Digital Twins (DT) with a combination of IoT, AI, cloud computing, and communications technologies such as 5G and 6G have the potential to significant reduce serious cancer threats. Observing data from DT populations may aid in the improvement of some cancer screening, prediction, prevention, detection, treatment, and research investment strategies. Applications of DT medicine specifically cancer, have been studied and analyzed in this paper using both conceptual and statistical analyses. This paper also shows a tree of some ailments where DT is applicable in their study. To the best of our knowledge, there is no literature research on various illnesses and DT specifically cancer disorders. To show the potential of DT, development hurdles of utilizing DT in cancer diseases are discussed, and then, several open research directions will be explained.
The document discusses wireless sensor networks and ambient intelligence. It begins by providing context on ambient intelligence, describing it as smart electronic environments that are sensitive and responsive to people. It then discusses key challenges for ambient intelligence, including social and political concerns about privacy and trust. Finally, it outlines several technological areas important for ambient intelligence, such as ubiquitous computing, and emphasizes the importance of putting users at the center of system design.
This document summarizes Paco Flórez's presentation on ambient assisted living and related projects. It discusses how technologies can help support elderly and disabled individuals' daily living through smart home environments. Specific projects mentioned include the metalTIC smart home, which aims to test ambient assisted living services and human-environment interaction. The presentation also outlines the goals of ambient assisted living to promote independent living and highlights Spain's aging population trends driving the need for such technologies and services.
Microphones Cameras RFID
Monitoring Wearable Implantable Environmental
health, activities sensors sensors sensors
and behaviors.
Safety and Motion Presence Fall detection
emergency detection detection systems
detection.
Energy Smart meters Lighting Temperature
management in and plugs sensors sensors
homes and public
spaces.
Reasoning (1)
- Reasoning is the ability to interpret sensory data and to infer high-level
information and knowledge.
- Reasoning is a key function in AAL systems to provide assistance and
support to users in an intelligent, adaptive and personalized way
Ideagen age friendly sector dundalk 2010 event reportthreesixty
There seems to be some frustration with the level of spending by government agencies like Enterprise Ireland and the HSE on connected health and telehealth initiatives versus the fragmented results that have been achieved so far. Some potential responses are:
- Large initiatives take time to implement properly and yield results at a systemic level. It's still early days for many of these investments and programs.
- Interoperability and standards are challenging issues that require coordination across many stakeholders, from technology providers to healthcare organizations to policymakers. Resolving these problems will help maximize the impact of investments.
- More could potentially be done to facilitate partnerships between funded projects/companies to help integrate solutions and accelerate real-world adoption. Ensuring funded solutions work well together
Presentation at the Workshop on Expectations for AAL and enhanced living environments in 2025/2030, by Francisco Florez-Revuelta, Susanna Spinsante, and Nuno Garcia, all members of the Cost Action IC1303 - AAPELE - Algorithms, Architectures and Platforms for Enhanced Living Environments
Cancer is a dangerous ailment that influences any part of the body and could produce malignant tumors. One feature of cancer is that abnormal cells create quickly and expand beyond their regular bounds. This could attack various parts of the human body and spread to other organs, which is the primary cause of cancer death. Cancer is becoming a more serious worldwide health concern. In the face of these threats, advanced technologies such as Artificial Intelligence (AI), cognitive systems, and the Internet of Things (IoT) may be insufficient to prevent, predict, diagnose, and treat cancer. Digital Twins (DT) with a combination of IoT, AI, cloud computing, and communications technologies such as 5G and 6G have the potential to significant reduce serious cancer threats. Observing data from DT populations may aid in the improvement of some cancer screening, prediction, prevention, detection, treatment, and research investment strategies. Applications of DT medicine specifically cancer, have been studied and analyzed in this paper using both conceptual and statistical analyses. This paper also shows a tree of some ailments where DT is applicable in their study. To the best of our knowledge, there is no literature research on various illnesses and DT specifically cancer disorders. To show the potential of DT, development hurdles of utilizing DT in cancer diseases are discussed, and then, several open research directions will be explained.
The document discusses wireless sensor networks and ambient intelligence. It begins by providing context on ambient intelligence, describing it as smart electronic environments that are sensitive and responsive to people. It then discusses key challenges for ambient intelligence, including social and political concerns about privacy and trust. Finally, it outlines several technological areas important for ambient intelligence, such as ubiquitous computing, and emphasizes the importance of putting users at the center of system design.
Engineering Ambient Intelligence Systems using Agent TechnologyNikolaos Spanoudakis
This presentation was given at the nectar session of the 9th Hellenic Conference on Artificial Intelligence (SETN 2016) that took place on May18th- 20th in Thessaloniki.
It is about applying an agent-oriented software engineering (AOSE) methodology, i.e. the Agent Systems Engineering Methodology (ASEME) for building intelligent systems. We present it along with a case study in the Ambient Intelligence (AmI) Application Domain. We discuss the challenges, the ASEME Methodology, the System Architecture and our results.
Ambient intelligence (AmI) refers to electronic environments that are sensitive and responsive to human presence. AmI aims to support users by having devices work together to automatically meet users' needs through context awareness and personalized interactions. Key technologies that enable AmI include ubiquitous computing, ubiquitous communication, and intelligent user interfaces to create a seamless experience between users and their digitally augmented surroundings. While AmI offers benefits like increased convenience, control, and efficiency, open challenges remain regarding privacy, security, complexity of modeling multiple users, and ensuring reliability of networked devices.
This document discusses a study examining digital assisted living (DAL) systems for elderly users through case studies of smart homes. It aims to better understand how information technology can enable assisted living by identifying the IT affordances of DAL systems based on existing home environment affordances. The study was motivated by barriers to adoption of existing DAL systems, which often fail to accurately represent user goals and perceptions. The findings will inform the development of a smart home project to help elderly users live safely at home as they age.
This document discusses the limits of surveillance (veillance) as technology allows for more ubiquitous monitoring. It notes that while embedded sensors have provided benefits, issues arise when these sensors become mobile and able to constantly track people. Prolonged monitoring can lead to "vigilance fatigue" due to information overload and constant pressure. Further, as devices like Google Glass and wearables integrate more deeply into daily life and even people's bodies, they risk reducing privacy and depth of experience in favor of constant connectivity and data collection. Some argue for the need for "digital detox" periods to mitigate the effects of perpetual monitoring.
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinFoCAS Initiative
The document discusses the history and controversies surrounding human microchip implants. It describes some early commercial uses of implants for access control by employees, including cases in Spain and the US. However, implants are controversial as they present privacy and control issues if mandated, as well as technical risks. The document outlines both benefits claimed by proponents and concerns raised by critics regarding emerging implant technologies.
When cameras are placed in homes for eHomecare, three legal mechanisms protect privacy:
1) Personal data protection laws cover patient images but debate exists around covering occasional visitors.
2) Patients are protected by broader privacy rights but occasional visitors may not be.
3) Right to personal portrayal protects recognizable individuals captured by cameras.
Currently, camera use requires patient consent due to these protections. Whether occasional visitor consent is also needed remains open for discussion.
Some futurists and artificial intelligence experts envision credible scenarios in which synthetic brains will, within this century, extend the functionality of our own brains to the point where they will rival and then surpass the power of an or-ganic human brain. At the same time, humans seem to have no limitations when it comes to finding ways to attack the computerized devices that others have invent-ed. Attackers have successfully compromised computers, mobile phones, ATMs, telephone networks, and even networked power grids. If neural devices fulfill the promise of treatment, and enhance our quality of lives and functionality—which appears likely, given the preliminary clinical success demonstrated from neuropros-thetics— their use and adoption will likely grow in the future. When this happens, inevitably, a wide variety of legal, security, and public policy concerns will follow. We will begin this article with an overview of brain implants and neural devic-es and their likely uses in the future. We will then discuss the legal issues that will arise from the intersection among neural devices, information security, cybercrime, and the law.
Intimate technology - the battle for our body and behaviourKarlos Svoboda
The document discusses how technology is becoming more intimate through devices that are inside our bodies, between us, that know information about us, and mimic human behaviors and traits. It explores how this is leading to humans being viewed more as machines that can be improved, machines taking on more human-like qualities, and changes to human interactions. Key questions raised include how close technology can and should get to us and whether intimacy and technology can truly be compatible concepts.
SOFIA - A Smart Space Application to Dynamically Relate Medical and Environme...Sofia Eu
This document describes a smart space application that dynamically relates medical and environmental information. The application collects data from physiological sensors on users and environmental sensors in rooms. It calculates a discomfort index based on temperature and humidity readings. An ontology represents the data domains and relationships. Knowledge processors insert, query, and analyze the shared information according to the ontology. The application aims to provide a more complete picture of users' health parameters and surrounding conditions to benefit doctors and other stakeholders.
Article about Digital transformation in healthcare. It's a summary of my presentation at Tokio international congress of the International Federation of Hospital engineering
Kim Solez Technology, the Future of Medicine, and the Bridge between Transpla...Kim Solez ,
Dr. Kim Solez presents "Technology, the Future of Medicine, and the Bridge between Transplantation and Regenerative Medicine" at the Alberta Interprofessional Conference 2015 on Sunday March 22nd, 2015 at the University of Alberta in Edmonton, Canada. Copyright (c) 2015, JustMachines, Inc.
Role play - The internet of things - NanotechnologyNANOYOU
Role play to engage students on a dialogue about the ethical, legal and social aspects of nanotechnologies.
For more resources on nanotechnologies visit: www.nanoyou.eu
This document summarizes privacy issues related to smart living technologies and proposes approaches to address them. It discusses how data collected from smart energy meters, occupancy detection sensors, and other IoT devices can reveal private information about users if not properly addressed. It proposes a hybrid information-centric approach using techniques like k-anonymity and differential privacy to selectively mask or obfuscate sensitive data while maintaining utility. This would involve statistical processing to identify outliers and quantify privacy and utility to allow adaptive techniques like differential privacy with variable sampling or obfuscation. Some initial results on these approaches have been published in conferences. Overall, the document outlines privacy risks with smart home technologies and proposes information-theoretic methods to balance privacy and utility of collected data
The document discusses supporting independent living for the elderly through new care models and technologies. It focuses on a use case of tracking and tracing seniors both indoors and outdoors using wireless sensor networks. The DEUS project developed an integrated solution using a single wearable device, identification of users, an emergency call button, and low energy consumption. The solution includes an architecture based on sensor networks, tools for easy installation and operation, individual tracking and tracing of seniors, and a proof-of-concept demonstration covering part of a residential building and garden area.
Evaluation des iSIPS IP Stack für drahtlose SensornetzePeter Rothenpieler
Vortrag auf dem IPv6-Kongress 2013 in Frankfurt/Main (6./7.06.2013, Cinestar Metropolis) zum Thema "Evaluation des iSIPS IP Stack für Drahtlose Sensornetze"
SmartAssist: Open Infrastructure and Platform for AAL ServicesPeter Rothenpieler
The document describes SmartAssist, an open platform and infrastructure for ambient assisted living (AAL) services. SmartAssist aims to provide interfaces for external service providers to access user profile and sensor data, and integrate their services. It uses an extended OpenSocial API and the Ambient Dynamix framework to connect Android devices. An example application called BikeWars is presented, which is a serious gaming application that adapts its difficulty level based on individual users' social data like age and gender retrieved from the SmartAssist platform.
This document provides an overview of wireless sensor network software architecture. It discusses the key components of WSNs including sensing units, processing units, power suppliers, and communication devices. It then examines various topics related to WSN software architecture, including network topologies, the IEEE 1451 standard for smart sensors, software architecture components like operating systems and middleware, services in sensor networks, and research challenges around security. The goal is to provide a reliable software architecture for WSNs to enable better performance and functionality.
1) The document discusses the opportunity for technology to improve organizational efficiency and transition economies into a "smart and clean world."
2) It argues that aggregate efficiency has stalled at around 22% for 30 years due to limitations of the Second Industrial Revolution, but that digitizing transport, energy, and communication through technologies like blockchain can help manage resources and increase efficiency.
3) Technologies like precision agriculture, cloud computing, robotics, and autonomous vehicles may allow for "dematerialization" and do more with fewer physical resources through effects like reduced waste and need for transportation/logistics infrastructure.
Engineering Ambient Intelligence Systems using Agent TechnologyNikolaos Spanoudakis
This presentation was given at the nectar session of the 9th Hellenic Conference on Artificial Intelligence (SETN 2016) that took place on May18th- 20th in Thessaloniki.
It is about applying an agent-oriented software engineering (AOSE) methodology, i.e. the Agent Systems Engineering Methodology (ASEME) for building intelligent systems. We present it along with a case study in the Ambient Intelligence (AmI) Application Domain. We discuss the challenges, the ASEME Methodology, the System Architecture and our results.
Ambient intelligence (AmI) refers to electronic environments that are sensitive and responsive to human presence. AmI aims to support users by having devices work together to automatically meet users' needs through context awareness and personalized interactions. Key technologies that enable AmI include ubiquitous computing, ubiquitous communication, and intelligent user interfaces to create a seamless experience between users and their digitally augmented surroundings. While AmI offers benefits like increased convenience, control, and efficiency, open challenges remain regarding privacy, security, complexity of modeling multiple users, and ensuring reliability of networked devices.
This document discusses a study examining digital assisted living (DAL) systems for elderly users through case studies of smart homes. It aims to better understand how information technology can enable assisted living by identifying the IT affordances of DAL systems based on existing home environment affordances. The study was motivated by barriers to adoption of existing DAL systems, which often fail to accurately represent user goals and perceptions. The findings will inform the development of a smart home project to help elderly users live safely at home as they age.
This document discusses the limits of surveillance (veillance) as technology allows for more ubiquitous monitoring. It notes that while embedded sensors have provided benefits, issues arise when these sensors become mobile and able to constantly track people. Prolonged monitoring can lead to "vigilance fatigue" due to information overload and constant pressure. Further, as devices like Google Glass and wearables integrate more deeply into daily life and even people's bodies, they risk reducing privacy and depth of experience in favor of constant connectivity and data collection. Some argue for the need for "digital detox" periods to mitigate the effects of perpetual monitoring.
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinFoCAS Initiative
The document discusses the history and controversies surrounding human microchip implants. It describes some early commercial uses of implants for access control by employees, including cases in Spain and the US. However, implants are controversial as they present privacy and control issues if mandated, as well as technical risks. The document outlines both benefits claimed by proponents and concerns raised by critics regarding emerging implant technologies.
When cameras are placed in homes for eHomecare, three legal mechanisms protect privacy:
1) Personal data protection laws cover patient images but debate exists around covering occasional visitors.
2) Patients are protected by broader privacy rights but occasional visitors may not be.
3) Right to personal portrayal protects recognizable individuals captured by cameras.
Currently, camera use requires patient consent due to these protections. Whether occasional visitor consent is also needed remains open for discussion.
Some futurists and artificial intelligence experts envision credible scenarios in which synthetic brains will, within this century, extend the functionality of our own brains to the point where they will rival and then surpass the power of an or-ganic human brain. At the same time, humans seem to have no limitations when it comes to finding ways to attack the computerized devices that others have invent-ed. Attackers have successfully compromised computers, mobile phones, ATMs, telephone networks, and even networked power grids. If neural devices fulfill the promise of treatment, and enhance our quality of lives and functionality—which appears likely, given the preliminary clinical success demonstrated from neuropros-thetics— their use and adoption will likely grow in the future. When this happens, inevitably, a wide variety of legal, security, and public policy concerns will follow. We will begin this article with an overview of brain implants and neural devic-es and their likely uses in the future. We will then discuss the legal issues that will arise from the intersection among neural devices, information security, cybercrime, and the law.
Intimate technology - the battle for our body and behaviourKarlos Svoboda
The document discusses how technology is becoming more intimate through devices that are inside our bodies, between us, that know information about us, and mimic human behaviors and traits. It explores how this is leading to humans being viewed more as machines that can be improved, machines taking on more human-like qualities, and changes to human interactions. Key questions raised include how close technology can and should get to us and whether intimacy and technology can truly be compatible concepts.
SOFIA - A Smart Space Application to Dynamically Relate Medical and Environme...Sofia Eu
This document describes a smart space application that dynamically relates medical and environmental information. The application collects data from physiological sensors on users and environmental sensors in rooms. It calculates a discomfort index based on temperature and humidity readings. An ontology represents the data domains and relationships. Knowledge processors insert, query, and analyze the shared information according to the ontology. The application aims to provide a more complete picture of users' health parameters and surrounding conditions to benefit doctors and other stakeholders.
Article about Digital transformation in healthcare. It's a summary of my presentation at Tokio international congress of the International Federation of Hospital engineering
Kim Solez Technology, the Future of Medicine, and the Bridge between Transpla...Kim Solez ,
Dr. Kim Solez presents "Technology, the Future of Medicine, and the Bridge between Transplantation and Regenerative Medicine" at the Alberta Interprofessional Conference 2015 on Sunday March 22nd, 2015 at the University of Alberta in Edmonton, Canada. Copyright (c) 2015, JustMachines, Inc.
Role play - The internet of things - NanotechnologyNANOYOU
Role play to engage students on a dialogue about the ethical, legal and social aspects of nanotechnologies.
For more resources on nanotechnologies visit: www.nanoyou.eu
This document summarizes privacy issues related to smart living technologies and proposes approaches to address them. It discusses how data collected from smart energy meters, occupancy detection sensors, and other IoT devices can reveal private information about users if not properly addressed. It proposes a hybrid information-centric approach using techniques like k-anonymity and differential privacy to selectively mask or obfuscate sensitive data while maintaining utility. This would involve statistical processing to identify outliers and quantify privacy and utility to allow adaptive techniques like differential privacy with variable sampling or obfuscation. Some initial results on these approaches have been published in conferences. Overall, the document outlines privacy risks with smart home technologies and proposes information-theoretic methods to balance privacy and utility of collected data
The document discusses supporting independent living for the elderly through new care models and technologies. It focuses on a use case of tracking and tracing seniors both indoors and outdoors using wireless sensor networks. The DEUS project developed an integrated solution using a single wearable device, identification of users, an emergency call button, and low energy consumption. The solution includes an architecture based on sensor networks, tools for easy installation and operation, individual tracking and tracing of seniors, and a proof-of-concept demonstration covering part of a residential building and garden area.
Evaluation des iSIPS IP Stack für drahtlose SensornetzePeter Rothenpieler
Vortrag auf dem IPv6-Kongress 2013 in Frankfurt/Main (6./7.06.2013, Cinestar Metropolis) zum Thema "Evaluation des iSIPS IP Stack für Drahtlose Sensornetze"
SmartAssist: Open Infrastructure and Platform for AAL ServicesPeter Rothenpieler
The document describes SmartAssist, an open platform and infrastructure for ambient assisted living (AAL) services. SmartAssist aims to provide interfaces for external service providers to access user profile and sensor data, and integrate their services. It uses an extended OpenSocial API and the Ambient Dynamix framework to connect Android devices. An example application called BikeWars is presented, which is a serious gaming application that adapts its difficulty level based on individual users' social data like age and gender retrieved from the SmartAssist platform.
This document provides an overview of wireless sensor network software architecture. It discusses the key components of WSNs including sensing units, processing units, power suppliers, and communication devices. It then examines various topics related to WSN software architecture, including network topologies, the IEEE 1451 standard for smart sensors, software architecture components like operating systems and middleware, services in sensor networks, and research challenges around security. The goal is to provide a reliable software architecture for WSNs to enable better performance and functionality.
1) The document discusses the opportunity for technology to improve organizational efficiency and transition economies into a "smart and clean world."
2) It argues that aggregate efficiency has stalled at around 22% for 30 years due to limitations of the Second Industrial Revolution, but that digitizing transport, energy, and communication through technologies like blockchain can help manage resources and increase efficiency.
3) Technologies like precision agriculture, cloud computing, robotics, and autonomous vehicles may allow for "dematerialization" and do more with fewer physical resources through effects like reduced waste and need for transportation/logistics infrastructure.
Privacy in Business Processes - Disclosure of Personal Data to 3rd PartiesSven Wohlgemuth
This document discusses privacy issues related to the disclosure of personal data to third parties. It proposes a method called DETECTIVE that uses digital watermarking of data to preserve data provenance and enable patients to monitor how their personal medical data is used after being disclosed. DETECTIVE was implemented in a proof-of-concept case study of telemedicine where a patient consults a clinic abroad. The document advocates for usage control mechanisms that can track data flows after disclosure through data provenance to give patients more control over their personal information.
Ambient Intelligence is a future vision where technology is integrated into people's environments and can understand and respond to their needs and behaviors. This report examines how Ambient Intelligence could impact healthcare. It identifies five levels of increasing intelligence - from embedding sensors to anticipating needs. Interviews with healthcare stakeholders explored opportunities and challenges around personalized care, like who has access to health data and for what purposes. Collective agreements are needed to ensure Ambient Intelligence enhances rather than threatens patient interests. The report aims to start a debate on these issues.
The document discusses Alzheimer's disease and opportunities for digital innovation in managing the condition. It describes how Alzheimer's is a progressive brain disorder that destroys memory and thinking skills, and how current drug trials have largely failed. It then outlines several digital solutions being developed, including passive wearable monitors that track location and activity, interactive monitors and apps, tools for cognitive assessment and stimulation, and platforms to better connect patients and caregivers. The document emphasizes the need to look beyond drug therapies alone and consider a broader ecosystem of digital tools and services to help manage Alzheimer's.
International Journal of Biometrics and Bioinformatics(IJBB) Volume (2) Issue...CSCJournals
An intelligent agent has been developed using Java Expert System Shell (JESS) rules engine. The agent
acts as an assistant that interacts with the user through voice prompts and SMS. It guides the user in case of an
emergency by asking relevant questions to determine the emergency level and provide appropriate response.
Web Interface: A simple web interface has been developed using PHP and MySQL to allow users to login and
access basic features of the system. The interface provides options to select language and report an emergency.
SMS Server: A SMS server has been implemented using PHP and the Twilio API. The server listens for incoming
SMS, processes them and sends responses back. It interacts with the agent to get appropriate responses.
Initial Testing
Researchers are developing an interactive system called an eXperience Induction Machine (XIM) that uses virtual reality to help users efficiently make sense of large and complex datasets. The XIM monitors a user's physical reactions as they examine data and constantly adapts the data presentation in real-time to prevent brain overload and guide the user's exploration. Several museums and universities have expressed interest in using the technology to help students learn more efficiently or allow researchers to gain new insights from large datasets. The EU-funded CEEDs project involves 16 partners across Europe working to optimize human understanding of big data through tools like the XIM.
Late lessons from early warnings: the precautionary principle 1896–2000 morosini1952
Late lessons from early warnings: the precautionary principle 1896–2000
1. Introduction ................................................... 11
1.1. Late lessons from early warnings: an approach to learning from history 11
1.2. Whatisthe‘precautionaryprinciple’? .......................... 13
1.3. An early use of the precautionary principle: London, 1854 . . . . . . . . . . 14
1.4. Forestalling disasters: integrating science and public policy . . . . . . . . . 15
1.5. References............................................... 16
1. Advances in technology like artificial intelligence, machine learning, and big data are transforming medicine and how patients receive care. Virtual assistants and digital tools powered by AI may replace many routine doctor tasks in the future.
2. A Japanese patient's rare form of leukemia was successfully diagnosed by IBM's Watson after it analyzed the patient's genetic data compared to 20 million studies. This shows how AI can outperform doctors in certain areas.
3. For doctors to remain relevant, they will need to embrace new technologies, focus on skills like complex problem-solving that AI cannot yet match, and reinvent their roles in the changing healthcare system.
1. Advances in technology like artificial intelligence, machine learning, and big data are transforming medicine and how patients receive care. Virtual assistants and digital tools powered by AI may replace many routine doctor tasks in the future.
2. A Japanese patient's rare form of leukemia was successfully diagnosed by IBM's Watson after it analyzed the patient's genetic data compared to 20 million studies, leading to more effective treatment.
3. Exponential increases in computing power and data according to Moore's Law and Kurzweil's Law of Accelerating Returns mean that medicine and health information will be subject to these trends of rapid technological change. This will further reduce the need for routine doctor involvement in patient care over time.
The document describes a Living Lab project that aims to contribute to the health and well-being of aging populations in remote communities through the development of mobile ICT products and services. The project focuses on safety, well-being, and social networks. It uses a human-centric approach to co-create and test innovations with users in real-world settings. The project aims for openness, realistic testing, influence from all stakeholders including elderly users, and sustainability of the services developed.
This document discusses the use of technology in psychology. It describes how virtual reality, computers, the internet and devices that integrate persuasive and ubiquitous computing can be used as therapeutic tools. Virtual reality can improve exposure therapy techniques. Computerized treatments have been shown to be effective for various disorders. The internet provides flexibility but also risks to privacy and confidentiality. The document also discusses experiences using these technologies in the Dominican Republic and Spain.
The SENSACTION-AAL project aimed to assist older adults in maintaining independent mobility and reducing fall injuries through physical activity interventions using wearable sensors. It developed three main applications: a virtual trainer for home rehabilitation exercises providing audio feedback, a smart monitor for tracking daily mobility, and a remote assistant for detecting falls and alerting caregivers. An initial clinical trial with 18 older adults found the system feasible and that it increased adherence to exercises, awareness, and reduced falls. However, further validation is still needed including improved methods for simulating falls versus detecting real falls.
The document provides an overview of a 12-lesson course on radiation and life. It focuses specifically on Lesson 7, which discusses how health studies are conducted to research issues like risks from lifestyles and the health benefits of medicines. The lesson objectives are to understand how health studies are carried out fairly and the information they provide, and how scientists conduct research in health studies. It provides examples of true/false questions and activities to rank risks and understand sample sizes, populations, and independent research.
This panel at CPDP 2020 discussed emotional AI and empathic technologies, focusing on rights, children, and domestication. The panelists were Ben Bland, Frederike Kaltheuner, Giovanna Mascheroni, and Gilad Rosner, moderated by Andrew McStay. They addressed issues such as how children interact with social robots, the liveliness ascribed to such technologies, and concerns about affect recognition capabilities.
The EMuRgency project aims to decrease the time between cardiac arrest and the start of resuscitation through new approaches for resuscitation support and training. It involves developing a notification system using smartphones and public displays to quickly alert nearby trained volunteers and professionals when cardiac arrest occurs. The goal is to recruit more volunteers and increase public knowledge of CPR to improve survival rates. The project is a collaboration between universities and hospitals in Belgium, Netherlands, and Germany.
The document summarizes the design of an interactive system to assist people with dementia. It discusses conducting user research and iterative design cycles to develop prototypes of a home system and bracelet to help patients, as well as a caretaker app. The system aims to promote patient safety, independence and reminders through sensors, alerts and customizable interfaces. Future work could improve memory support and interface customization based on evaluations with simulated dementia patients and caretakers.
Educational Model to Illustrate HIV Infection Cyclekcmurphy3
This is the final poster for my Fall 2009 design project. We created a model that was used for teaching students the difference between HIV and other viruses, and the ensuing immunological consequences of HIV are.
Chapter 11 Health Informatics EthicsKen Masters PhD.docxketurahhazelhurst
Chapter 11: Health Informatics Ethics
Ken Masters PhD
Learning Objectives
After reviewing the presentation, viewers should be able to:
Describe the 20th century medical and computing background to health informatics ethics
Identify the main sections of the IMIA Code of Ethics for Health Information Professionals
Describe the complexities in the relationship between ethics, law, culture and society
Describe different views of ethics in different countries
Summarize the most pertinent principles in health informatics ethics
Discuss the application of health informatics ethics to research into pertinent areas of health informatics
Discuss appropriate health informatics behavior by medical students
Introduction
The Nuremberg Code
Related to the Holocaust (death of 11 million people by the Nazis)
Medical crimes against humanity were committed
Code established voluntary consent and right to withdraw from experiment and right to qualified medical experimenter
World Medical Associations (WMA) Declaration of Helsinki
Added the right to privacy and confidentiality of personal information of research subjects to the Nuremberg Code
Informatics Ethics
International Medical Informatics Association’s (IMIA) Code of Ethics. Very expansive. Duties include:
Patient-centered
Healthcare professionals centered
Institution centered
Society centered
Self centered
Profession centered
International Considerations:
Ethics, Laws and Culture
Influenced by a country’s laws and culture
The relationship between ethics, law, culture and society is unclear, is not fixed internationally, and may be fluid even within a given country over time
Three Different Views of Ethics
Ethics does not exist outside the law, and exists only for the good of a properly ordered and legal society
Ethics is usually strongly informed by the law, society, and the prevailing culture, and are extensions of these
Ethics exists entirely outside of the law, and is a matter of personal conscience. Where there is conflict the ethical viewpoint must prevail
Pertinent Ethical Principles
Right to privacy
Guard against excessive personal data collection
Security of data
Integrity of data ; must be kept current and accurate
Informed consent for patients
Awareness of existing laws
Medical ethics applies to health informatics ethics
Sharing data only when appropriate
Clinicians have broad responsibilities towards entire community
Clinicians must practice beneficence
This responsibility can not be transferred
Difficulties Applying Medical Ethics
in the Digital World
How to obtain informed consent for the use of patient data in large databases?
Obtain broad informed consent
One should guard against corporate ownership of databases
Research on electronic postings: privacy and disclosure depends on which model is adopted
Human subject model-extension of the medical view
Textual object model -only rules of plagiarism and copyright ...
Wearables - Nothing new but it's time to build engaging experiences. | Mobile...Mobile Convention
Presentation of Steven Palmaers and Christophe Benoit from the Erasmus Hogeschool Brussel and PXL. They did a research of the wearable privacy/security, the wearable jungle and how to build the ultimate User Experience for Apps.
This document contains an agenda for parallel sessions on the topic of blockchain applications in education. There are two time blocks listed, with sessions occurring from 13:30-14:30 and 15:00-16:00. Each time block contains 7 concurrent sessions taking place in different rooms. The sessions will discuss topics such as using blockchain to store learning outcomes, educational financing via blockchain, legal aspects of blockchain in education, credentialing and open badges, using semantic blockchain for diplomas, determining if blockchain answers educational questions, and paving the way from eportfolios to blockchain. Presenters include specialists from various universities and organizations.
Similar to Privacy concerns in a remote monitoring and social networking platform for assisted living (20)
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Privacy concerns in a remote monitoring and social networking platform for assisted living
1. Privacy concerns in a remote monitoring and social networking
platform for assisted living
PrimeLife/IFIP Summer School 2010
Privacy and Identity Management for Life
3rd
of August 2010, Helsingborg, Sweden
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
Institute of Telematics, University of Lübeck, Germany
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
2. Overview
Motivation
SmartAssist
Overview
Concept
System components
Privacy/Security
Sensitive Information
Concerns/Issues
Future Work
More questions than answers in this talk!
Slide 2
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
3. Motivation
Population ageing
Demographics of Germany
Increasing Life expectancy & Declining birth rate (~1.4 children born / woman)
Next 50 years: Increase of people aged over 65 from 19% to over 30% [1]
Next 20 years: Increase of people in need of medical care by 58% [1]
Not limited to Germany, e.g. Japan, Italy, Spain
Increase in healthcare cost and annuity
More people in need for medical care, less people to provide medical care
Ambient Assisted Living (AAL)
Increase quality of life, safety and social integration of elderly people
Technologies for providing unobtrusive support in everyday life situations
Reduce cost of health care
[1] Statistisches Bundesamt (2006): “11. Koordinierte Bevölkerungsvorausberechnung – Annahmen
und Ereignisse” https://www-ec.destatis.de/csp/shop/sfg/vollanzeige.csp?ID=1019439
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 3
4. SmartAssist Project
Started in late 2009, duration: 3 years (2012)
Funded by the Federal Ministry of Education and Research (BMBF support code: 16KT0942)
Partners
Lübecker Wachunternehmen (Security company)
Vorwerker Diakonie (Charitable organization of the Protestant church)
coalesenses GmbH (Hardware company)
University of Lübeck
Institute of Telematics
Institute for Signal Processing
Centre for Social Medicine and Health Services Research
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 4
5. SmartAssist Service Platform
Platform to support a self-determined and safe life for elderly people / Seniors
Needs-based care in their own home through personal Patrons
Instead of (early) submission to a nursing home
Basic Idea
Social Network
Remote monitoring through in-home wireless sensor network
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 5
6. Seniors
Age: 65 years+ and retired
Spend large amount of time in their own apartment
Mentally fit
(Still) Capable of independent and self-determined living
Two groups (taken from [5])
People interested in preventive care (Group 1.1.3 in [5])
Early detection & diagnosis of diseases and disabilities
People in need of assistance (Group 1.2 in [5])
Use of third party services
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
[5] Birgid Eberhardt, 2009: Zielgruppen für AAL-Technologien und Dienstleistungen,
AAL Kongress- und Fachbeiträge, BMBF/VDE Innovationspartnerschaft AAL
Slide 6
7. Patrons
Care for Seniors provided through personal Patrons
Relatives
Friends
Medical Personnel (Doctors, Ambulances)
Third Party Service Providers
Three groups (taken from [5])
Caregivers or Healthcare assistants (Group 2.1.1 in [5])
Children, grandchildren, siblings, close friends and neighbours
Medical personnel (Group 2.2 in [5])
Doctors, Physicians, Paramedics
Third Party Service Providers (Group 2.4 and 3.8 in [5]
Security companies, home care providers, ambulance services
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
[5] Birgid Eberhardt, 2009: Zielgruppen für AAL-Technologien und Dienstleistungen,
AAL Kongress- und Fachbeiträge, BMBF/VDE Innovationspartnerschaft AAL
Slide 7
8. Existing Health Websites
Eons.com
Social Network for elderly people: Photo and Video sharing
Interviews and Articles on Topics like Health, Relationships, Fitness, Dept, Retirement,
Insurance, …
PatientsLikeMe.com / DailyStrength.com
User User: Emotional Support & Strategies
Sharing same diseases / disabilities / problems in life
Symptoms & Experiences with Treatments
MedHelp.org
Discussion board on health related topics
Cooperates with Doctors
Visited by 10 million people each month (self proclaimed)
…
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 8
9. SmartAssist Platform Components
Monitoring
Unobtrusive environmental/ambient sensors
Sensor readings forwarded to a central server
Signal processing and pattern recognition: Daily routine and activities
Social Network
Communication between the users and their patrons
Stronger social integration (across distances)
Knowledge transfer between seniors (Interest groups, local community events, …)
Social data used to augment sensor data for medical (e.g. Status messages about feelings, stress,
tiredness, headache, …)
Services
Extensions to the platform through „Plugins“
Comparable to “Android Market” / “App Store” for mobile phones
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 9
11. Power consumption
Coffee machine
TV
Computer
Reading lamp
Water consumption
Bathroom
Kitchen
Temperature & Humidity
Living Room
Study
Bathroom
Bedroom
Tracking
Motion detectors
Door ajar sensors
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 11
12. Power consumption
Coffee machine
TV
Computer
Reading lamp
Water consumption
Bathroom
Kitchen
Temperature & Humidity
Living Room
Study
Bathroom
Bedroom
Tracking
Motion detectors
Door ajar sensors
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 12
13. Power consumption
Coffee machine
TV
Computer
Reading lamp
Water consumption
Bathroom
Kitchen
Temperature & Humidity
Living Room
Study
Bathroom
Bedroom
Tracking
Motion detectors
Door ajar sensors
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 13
14. Power consumption
Coffee machine
TV
Computer
Reading lamp
Water consumption
Bathroom
Kitchen
Temperature & Humidity
Living Room
Study
Bathroom
Bedroom
Tracking
Motion detectors
Door ajar sensors
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 14
15. Examples (from sensor readings)
Low room temperature in Winter: Is the Senior feeling hot? (Fever, Shivering)
How much time does the Senior spend in the bedroom? Is he very sleepy?
Does the Senior forget to turn off the lights? The coffee machine?
How often does he use the bathroom?
Does he wash is hands after using the toilet?
(Lowered personal hygiene can be an indicator for Alzheimer Disease)
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 15
16. What we try to do
Combine Social and Sensor information
Monitor and analyse the daily routine
Help Patrons watch over Seniors
Help diagnose subtle changes in behaviour
Try to detect dangerous/emergency situations and send help (Third Party/Patrons)
What we can’t do
Prevent the user from admission to a nursing home
Guarantee for Emergency assistance
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 16
17. Lots of Sensitive Information
Generation
Seniors enter private information in the social networking component
Sensors automatically generate private information
Signal processing generates sensitive information (e.g. activities)
Transmission
All information needs to be transferred using encryption
Protection against eavesdropping and man-in-the-middle attacks
Integrity and Authenticity protection
Storage & Access
Availability
Integrity and Authenticity
Access Control
Logging
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 17
18. Issues to deal with
The Senior is in control of all of his information
View all data, Edit and Delete all data
Sensors can be switched on and off at any time (and scheduled)
Seniors need to be in control who has access to their data (restrictive by default)
Controllable on user and patron/group level
Accessible and understandable
Possibility to provide different and even forged information
“Who has accessed my information?”
Sharing of information needs to be voluntary
No monetary or legal force
No disadvantages for insurances
Information Sparseness
Only necessary information needs to be collected and stored
Resolution, sample rate, Fuzziness
Similar to “Selective Availability” in GPS (Global Positioning System)
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 18
19. Future Work
Illegal access to sensor data
Analyse when the user is not at home, plan a burglary accordingly (www.pleaserobme.com)
Identity Theft: Taking names, addresses, photos
Sensor Data Theft: Pretend to be a healthy senior and commit insurance fraud
The right of Not-Knowing / nescience
Given: Diagnosis of a serious disease
Should the Senior be informed?
Should the patrons (a doctor) inform the Senior?
Make information unavailable to insurance companies
Alteration / Deletion of data
Interfere in the detection of a disease (Inheritance / Life insurance)
Protection against physical tampering
Maintain the right for virtual tampering (fuzziness), but detectable
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler
Slide 19
20. Thank you for your attention!
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
Institute of Telematics, University of Lübeck, Germany
Dipl.-Inf. Peter Rothenpieler
rothenpieler@itm.uni-luebeck.de
http://www.itm.uni-luebeck.de/users/rothenpieler