Space according to a well-defined data model. A
trusted environment provides the features for
executing applications accessing PD (e.g., through
APIs) and processing them to offer basic capabilities
(e.g., data visualization, search, retrieval) and added-
value features to persons (e.g., self-tracking
applications). Finally, the architecture includes
functions for controlled access to the data space by
3
rd
parties, integrated with IdM functions to
authenticate the 3
rd
parties. We are considering all
the open source resources that fit our architecture
(Miemis, 2011) in order to choose those that can be
easily adapted and integrated in our first prototype.
We are planning to experiment an initial version
of this architecture within the “Trentino Mobile
Territorial Lab”, a project in the context of the
“Italian EIT KIC ICT Node” initiative. The Lab will
involve about 100 people receiving a mobile phone
and providing their usage and sensors’ data for
investigating and validating new ways to conceive,
develop and test applications/services provided by
public entities, based on this new model of data
ownership and exploitation.
5 FINAL REMARKS
The availability of a BID is of extreme interest for
those entities handling PD but its creation must face
several challenges on the technical side as well as on
the standardization and regulation side. In particular,
from the technical side, the introduction of PDSs
requires a deep refinement of the policies on
privacy, to take into account the enhanced
possibilities for people to control their PD.
Moreover, “the more value is secured in only one
bank” the more are the risks arising from security
flaws and, thus, the more are the “security
measures” required. Other technical challenges
concern the scalability in term of both users and data
amount, and the automation of the PD collection and
management in order to reduce the effort required to
individuals. From the social and regulative sides,
challenges lay in a required change of perspective:
first, individuals must be supported in understanding
the advantages of managing their data exploiting the
BIDs; second, the governments should be pushed to
provide the necessary regulation supporting the new
user-centric model. Accordingly, standardization
must be considered: a basic set of common functions
for control/negotiate the PD, and standard interfaces
ensuring interoperability among BIDs and PD-
portability are a key issue.
Even if the role of BID is outside the traditional
framework of services offered by Telcos, they are in
a good position for exploiting their technical assets,
and expertise to deploy a reliable infrastructure for
delivering PD services: which range from pervasive
connectivity to public cloud, from Application Store
to device management, etc. At the moment, Telcos
enjoy high level of consumer trustiness, but they
have to comply strict regulatory policies in handling
data about their customers (WEForum, 2011b),
which can prevent them in developing the BID.
Therefore, in the short term, on one side, Telcos
should cooperate in re-shaping regulatory policies
on PD promoting data exploitation instead of data
protection, and, on the other side, they could start
playing the role of platform provider in initiatives
promoting the user-centric model, possibly
sponsored by public organizations.
REFERENCES
Acquisti, A., 2010. The Economics of Personal Data and
the Economics of Privacy. In Conference on
Economics of Personal Data and Privacy.
Bradwell, P., 2010. Private Lives: A people’s inquiry into
personal information, Retrieved Feb. 15, 2012, from:
www.demos.co.uk/publications/privatelives.
Miemis, V., 2011. 88+ Projects & Standards for Data
Ownership, Identity, & A Federated Social Web.
Retrieved Feb. 15, 2012, from: emergentbydesign.
com.
NSTIC. Web Site. www.nist.gov/nstic/.
Pentland, A., 2012. Society's Nervous System: Building
Effective Government, Energy, and Public Health
Systems. To appear in IEEE Computer.
PDEC. Web Site. personaldataecosystem.org.
Stephen, D., 2011. Vodafone’s perspective on creating
value through end-user control, transparency and trust,
Retrieved Feb. 15, 2012, from: www.vodafone.com/
content/dam/vodafone/about/privacy/vodafone_rethink
ing_personaldata.pdf.
Tucker, C., 2010. The Economics Value of Online
Customer Data. Retrieved Feb. 15, 2012, from: www.
oecd.org/dataoecd/8/53/46968839.pdf.
VRM Project. Web Site. cyber.law.harvard.edu/project
vrm.
WEForum, 2011a. Personal Data - The Emergence of a
New Asset Class. Retrieved Feb. 15, 2012, from:
www.weforum.org/issues/rethinking-personal-data.
WEForum, 2011b. The Emergence of a New Asset Class -
Opportunities for the telecommunications industry.
Retrieved Feb. 15, 2012, from: www.weforum.org.
W3C, 2010. A Standards-based, Open and Privacy-aware
Social Web. Retrieved Feb. 15, 2012, from: www.w3.
org/2005/Incubator/socialweb/XGR-socialweb/.
AA nternational onference on ata echnoloies and Applications