should be to increase the user's comfort (such as personalisation of TV), and use of
less dangerous technology instead.
This paper is based on work done in the context of the SWAMI project [23].
References
1. Aschmoneit, P.; Höbig, M.,eds. (2002). Context-Aware Collaborative Environments for
Next Generation Business Networks: Scenario Document, COCONET deliverable D 2.2.
2. Palmas, G.; Tsapatsoulis, N.; Apolloni, B. et al. (2001). Generic Artefacts Specification
and Acceptance Criteria. Oresteia Deliverable D01. Milan: STMicroelectronics s.r.l
3. Savidis, A. et al. (2001). Report on Key Reference Scenarios. 2WEAR Deliverable D1.
4. Åkesson, K.-P.; Humble, J.; Crabtree, A.; Bullock, A. (2001). Usage and Development
Scenarios for the Tangible Toolbox. ACCORD Deliverable D1.3.
5. Amigo scenarios: http://www.ctit.utwente.nl/research/projects/telematics/other/amigo.doc/
6. Kim, S. W.; Kim, M. C.; Park, S. H. et al. (2004): Gate reminder: a design case of a smart
reminder. In: Benyon, D.; Moody, P. et al. (Eds.): Proceedings of the Conference on De-
signing Interactive Systems, Cambridge, MA, USA, August 1-4, 2004. ACM, pp. 81-90
7. Orr, R. J.; Raymond, R.; Berman, J.; Seay, F. (1999). A System for Finding Frequently
Lost Objects in the Home, Technical Report 99-24, Georgia Tech.
8. Gemmel, J., Williams, L., Wood, K., Lueder, R., Bell, G., (2004) Passive Capture and
Ensuing Issues for a Personal Lifetime Store, CAPRE 04
9. Langheinrich, M. (2001): Privacy by Design – Principles of Privacy-Aware Ubiquitous
Systems. In: Abowd, G. D.; Brumitt, B. et al. (Hrsg.): Proceedings of the Third Interna-
tional Conference on Ubiquitous Computing (UbiComp 2001). Berlin und Heidelberg,:
Springer-Verlag (Lecture Notes in Computer Science, 2201), pp. 273-291.
10. Langheinrich, M. (2003): The DC-Privacy Troubadour – Assessing Privacy Implications of
DC-Projects. In: Designing for Privacy Workshop. DC Tales Conference, Santorini,
Greece.
11. Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M., (2005) Social, Economic,
and Ethical Implications of Ambient Intelligence and Ubiquitous Computing, In: W. We-
ber, J. Rabaey, E. Aarts (Eds.): Ambient Intelligence. Springer-Verlag, pp. 5-29.
12. Friedewald, M., Vildjiounaite, E., Punie, Y., Wright, D., Privacy, identity and security in
ambient intelligence: A scenario analysis, Telematics and Informatics, In Press
13. Hong, J., Ng, J, Lederer, S., Landay, J., Privacy Risk Models for Designing Privacy-
Sensitive Ubiquitous Computing Systems, in DIS 2004
14. Lahlou, S.; Jegou, F. (2003). European Disappearing Computer Privacy Design Guideslines
v1. Ambient Agora Deliverable D15.4. Electricité de France.
15. Nissenbaum, H. (2004), Privacy as Contextual Integrity, Washington Law Review 79, No.1
16. Camenisch, J., ed.,. PRIME Deliverable D16.1, 2005.
17. Bellotti, V., Sellen, A., Design for Privacy in Ubiquitous Comp. Environments, ECSCW'93
18. Nasoz, F., Alvarez, K., Lisetti, C., Finkelstein, N., (2003), Emotion Recognition from
Physiological Signals for User Modelling of Affect, In Proceedings of the 3rd Workshop
on Affective and Attitude User Modelling (Pittsburgh, PA, USA, June 2003)
19. Nabeth, T., et al., FIDIS Deliverable 2.2: Set of use cases and scenarios.
20. Knospe, H.; Pohl, H. (2004): RFID Security. In: Information Security Technical Report 9,
No. 4, pp. 30-41
21. Cranor, L., P3P: Making Privacy Policies More Useful, IEEE Security and Privacy, 2003
22. http://www.aclu.org/safefree/nsaspying/23989res20060131.html
23. http://swami.jrc.es/pages/index.htm
61