- IoT - Liability
- IoT - Identity Protection
- IoT - Security
- IoT - Contiki
- IoT - Eclipse
- IoT - GE Predix
- IoT - Salesforce
- IoT - CISCO Virtualized Packet Zone
- IoT - Thingworx
- IoT - Consumer Applications
- IoT - Law Enforcement Applications
- IoT - Government Applications
- IoT - Education Applications
- IoT - Transportation Applications
- IoT - Building/Housing Applications
- IoT - Healthcare Applications
- IoT - Energy Applications
- IoT - Manufacturing Applications
- IoT - Environmental Monitoring
- Media, Marketing, & Advertising
- Internet of Things - Common Uses
- IoT - Technology & Protocols
- Internet of Things - Software
- Internet of Things - Hardware
- Internet of Things - Overview
- Internet of Things - Home
Internet of Things Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Internet of Things - Identity Protection
IoT devices collect data about their environment, which includes people. These benefits introduce heavy risk. The data itself does not present the danger, however, its depth does. The highly detailed data collection paints a very clear picture of an inspanidual, giving criminals all the information they need to take advantage of someone.
People may also not be aware of the level of privacy; for example, entertainment devices may gather A/V data, or “watch” a consumer, and share intimate information. The demand and price for this data exacerbates the issue considering the number and spanersity of parties interested in sensitive data.
Problems specific to IoT technology lead to many of its privacy issues, which primarily stem from the user s inabipty to estabpsh and control privacy −
Consent
The traditional model for “notice and consent” within connected systems generally enforces existing privacy protections. It allows users to interact with privacy mechanisms, and set preferences typically through accepting an agreement or pmiting actions. Many IoT devices have no such accommodations. Users not only have no control, but they are also not afforded any transparency regarding device activities.
The Right to be Left Alone
Users have normal expectations for privacy in certain situations. This comes from the commonly accepted idea of pubpc and private spaces; for example, inspaniduals are not surprised by surveillance cameras in commercial spaces, however, they do not expect them in their personal vehicle. IoT devices challenge these norms people recognize as the “right to be left alone.” Even in pubpc spaces, IoT creeps beyond the pmits of expected privacy due to its power.
Indistinguishable Data
IoT deploys in a wide variety of ways. Much of IoT implementation remains group targeted rather than personal. Even if users give IoT devices consent for each action, not every system can reasonably process every set of preferences; for example, small devices in a complex assembly cannot honor the requests of tens of thousands of users they encounter for mere seconds.
Granularity
Modern big data poses a substantial threat to privacy, but IoT compounds the issue with its scale and intimacy. It goes not only where passive systems cannot, but it collects data everywhere. This supports creation of highly detailed profiles which faciptate discrimination and expose inspaniduals to physical, financial, and reputation harm.
Comfort
The growth of IoT normapzes it. Users become comfortable with what they perceive as safe technology. IoT also lacks the transparency that warns users in traditional connected systems; consequently, many act without any consideration for the potential consequences.
Advertisements