Pervasive computing
The term Pervasive computing (from English. Pervasive , omnipresent ', in order to cross', and computing , computer science', 'IT') or Rechnerdurchdringung is the all-pervasive networking of everyday life through the use of "smart" objects.
overview
Computer processors and sensors are becoming smaller and cheaper all the time, and wireless communication is already available almost everywhere in Western Europe. By automatically collecting (e.g. using RFID chips) and evaluating (e.g. using KDD and data mining ) data, precise personality profiles can be created.
Demarcation
The term Pervasive computing is the stronghold of the industry view of the Rechnerallgegenwart (English ubiquitous computing ), the Rechnerallgegenwart is a prerequisite for the Rechnerdurchdringung, but the Rechnerdurchdringung nor the condition of the link has all the calculator. With technology, some of which is already available, attempts are made to penetrate business processes and general areas of life. The data obtained are used commercially, for example for e-commerce. Pervasive computing is already in use in this area.
outlook
Pervasive computing has the potential to change society in the long term. However, there is no broad-based social debate. The development is also being driven by the public security debate . However, some security experts see no security gain in the growing control options - surveillance .
Supporters of pervasive computing see new opportunities for users and new mass markets . Opponents criticize the hasty introduction by industry and politics from their point of view.
Consequences
Pervasive computing has far-reaching consequences for society. Essentially, five areas of life or topics are particularly affected:
- Data protection ( Privacy ): Where does the freedom of the individual to collect data end?
- Security : Who is responsible for security deficiencies?
- Unmanageable complexity (Unmastered Complexity): Who is responsible if a technical system failed?
- Freedom of expression (Freedom of Speech) Where comes this fundamental right with other rights in conflict?
- Intellectual property : where is the boundary to information as a public good?
See also
literature
- Mark Weiser: The Computer for the 21st Century (in: Scientific American, 265)
- Daniel Amor: The cell phone against toothache and other business models for the service providers of tomorrow. Galileo 2002, Bonn
- From politics and contemporary history (B 42/2003): Digitization of everyday life
- Siegfried Behrendt, Mathias Binswanger, Arend Bruinink and others: The precautionary principle in the information society: Effects of pervasive computing on health and the environment http://www.ta-swiss.ch/www-remain/projects_archive/information_society/pervasive_d.htm , TA-Swiss 2003
- Uwe Hansmann, Lothar Merk, Martin S. Nicklous and Thomas Stober: Pervasive Computing . The Mobile World. 2nd Ed. Springer 2003, Berlin Heidelberg New York
- Friedemann Mattern : Pervasive / Ubiquitous Computing (technical article in the computer dictionary of the Society for Computer Science )
- Carsten Orwat, Andreas Graefe and Timm Faulwasser: Towards pervasive computing in health care - A literature review , in: BMC Medical Informatics and Decision Making, Vol. 8, 2008, No. 26th
- ULD, HU Berlin: Technology Assessment Ubiquitous Computing and Informational Self-Determination (TAUCIS) , study commissioned by the Federal Ministry of Education and Research, 2006
Web links
- International Conference on Pervasive Computing (English)
- International Conference on Ubiquitous Computing (English)
- Embedded Interaction - Current Research in Pervasive Computing
- Information from the Risk Dialogue Foundation
- Hewlett Packards CeNSE Project (Central Nervous System for the Earth)