90 likes | 405 Views
Ubiquitous Computing. Applications, Ownership, Ethics and Security in the Internet of Things Era. Ubiquitous Computing. What is Ubiquitous Computing? Post-Desktop computing Computing deeply integrated into everyday things or processes Requires cost-efficient networked devices.
E N D
Ubiquitous Computing Applications, Ownership, Ethics and Security in the Internet of Things Era
Ubiquitous Computing • What is Ubiquitous Computing? • Post-Desktop computing • Computing deeply integrated into everyday things or processes • Requires cost-efficient networked devices
Internet of Things • What is the Internet of Things? • Refers to uniquely identifiable things and their virtual representations in an internet like structure • Can use identification to query for information about a given object • Requires Ubiquitous Computing
Example • A user enters a building • Automatically inventories devices in the building using unique identifier (IOT) • User wants to perform an action (e.g. Turn on lights) • User switches on lights through some interface, which accesses item through network (UbiComp) • Status of object is updated in representation (IOT)
Applications • Inventory Control • Personal, Industrial, City-Wide? Nationwide? • Automation • Home, Office, Public Space? • Data Mining • Interactions of objects to create ontology • New genre of data object representation and accessibility • Others?
Ownership • What defines ownership? • “Real” life? • “Internet” life? • Access to non-owned items? • Borrowing, Renting, Sharing • Theft • What defines theft in an online sense?
Ethics • Similar real ethical code • Differs by culture, religion, other factors • Abandoned on the Web? • Trolls, Forum Elitism • Piracy?
Security • DRM • Current State of DRM • Other Solutions?