{"id":31578,"date":"2019-04-30T04:00:53","date_gmt":"2019-04-30T08:00:53","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31578"},"modified":"2019-04-30T04:00:53","modified_gmt":"2019-04-30T08:00:53","slug":"internet-of-things-and-privacy-in-public","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/04\/30\/internet-of-things-and-privacy-in-public\/","title":{"rendered":"Internet of Things and Privacy in Public"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/jsis.washington.edu\/people\/victoria-olaughlin\/\">VICTORIA O&#8217;LAUGHLIN<\/a> &#8211; The increasing ubiquity of <strong>Internet of Things<\/strong> (<strong>IoT<\/strong>) devices has created new risks. <strong>IoT<\/strong> refers to everyday internet-connected objects, devices, and sensors which can collect, store, and transmit data without much human assistance (Rose et al., 2015). Public spaces are increasingly filled with <strong>IoT<\/strong> devices, the purpose of which is to\u00a0enhance the quality and fruitfulness of life (Tietz et al., 2018).<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/04\/computer-1591018__340.jpg\" alt=\"\" class=\"wp-image-31580\" width=\"323\" height=\"208\"\/><\/figure><\/div>\n\n\n\n<p>While the embedding of <strong>IoT<\/strong> devices in public infrastructure is meant to improve efficiency and the general ease of life, <strong>IoT <\/strong>comes with security and privacy concerns (Voas et al., 2018). In large part this is because these information-collecting technologies are being built into public spaces without comprehensive and standardized laws around implementation, maintenance, monitoring, and user rights \u2013 or, more specifically, privacy rights (\u201cQuarterly Compliance Report \u2013 Information Compliance\u201d, 2016).<\/p>\n\n\n\n<p>Individuals cannot expect total privacy in public spaces for obvious reasons, but the information collection capabilities of <strong>IoT<\/strong> in public spaces raises serious, personal privacy concerns. For example, <strong>IoT <\/strong>can surveil and track individuals, it is difficult for individuals to opt out of having their personal private information collected by IoT, and it\u2019s often unclear how their collected information is being used or even sold (Rose et al., 2015). Frighteningly, while the growth and implementation of IoT in public spaces rapidly continues, privacy regulation in most places remains unaddressed.\u00a0By being in public, individuals choose to be seen and, therefore, give up some privacy, but most people do not expect systemic collection of data about them to be recorded in these areas.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/jsis.washington.edu\/news\/internet-of-things-and-privacy-in-public\/&amp;ct=ga&amp;cd=CAEY8gMqEzM0NjE3MzM2ODg0OTAwMTc3MTMyGmEyZDc1YTAxNDlhODIxZDc6Y29tOmVuOlVT&amp;usg=AFQjCNH43WLEhR0abBQnbaMhb4oTHXgk_Q\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By VICTORIA O&#8217;LAUGHLIN &#8211; The increasing ubiquity of Internet of Things (IoT) devices has created new risks. IoT refers to everyday internet-connected objects, devices, and sensors which can collect, store, and transmit data without much human assistance (Rose et al., <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/04\/30\/internet-of-things-and-privacy-in-public\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-31578","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31578"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31578\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}