Distributed Sewer System RTC in Öhringen – On the Way to the Internet of Things

Author(s):  
Manfred Schütze ◽  
Nico Suchold ◽  
Horst Geiger
Economies ◽  
2018 ◽  
Vol 6 (2) ◽  
pp. 36 ◽  
Author(s):  
Milos Maryska ◽  
Petr Doucek ◽  
Lea Nedomova ◽  
Pavel Sladek

Author(s):  
Clinton Fernandes ◽  
Vijay Sivaraman

This article examines the implications of selected aspects of the Telecommunications (Interception and Access) Amendment (Data Retention) Act 2015, which was passed by the Australian Parliament in March 2015. It shows how the new law has strengthened protections for privacy. However, focusing on the investigatory implications, it shows how the law provides a tactical advantage to investigators who pursue whistleblowers and investigative journalists. The article exposes an apparent discrepancy in the way ‘journalist’ is defined across different pieces of legislation. It argues that although legislators’ interest has been overwhelmingly focused on communications data, the explosion of data generated by the so-called Internet-of-Things (IoT) is as important or more. It shows how the sensors in selected IoT devices lead to a loss of user control and will enable non-stop, involuntary and ubiquitous monitoring of individuals. It suggests that the law will need to be amended further once legislators and investigators’ knowledge of the potential of IoT increases. 


2017 ◽  
Vol 5 (1) ◽  
pp. 488
Author(s):  
Elena Samoylova

This paper is dedicated to the analysis of the phenomenon of virtual narrative and its connection to the phenomenon of Internet of things. Modern virtual narrative is a complex, syncretic phenomenon, alludes to the different cultural, historical and even mythological subjects and objects. But with the development of new technologies, such as the Internet of Things, virtual narrative became to be some kind of independent phenomenon. Moreover, the Internet of things (which is not clerly identified phenomen itself from the philosophic point of view) uses the virtual narrative as one of the components, for example applaying some methond of virtual narrative in creating advertisments, creating messages in musiams, exposititions etc. So, in our paper we will analyze this both phenomena, their connections and the way of its development.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4724
Author(s):  
Enrico Buzzoni ◽  
Fabio Forlani ◽  
Carlo Giannelli ◽  
Matteo Mazzotti ◽  
Stefano Parisotto ◽  
...  

This paper discusses the design and prototype implementation of a software solution facilitating the interaction of third-party developers with a legacy monitoring and control system in the airfield environment. By following the Internet of Things (IoT) approach and adopting open standards and paradigms such as REpresentational State Transfer (REST) and Advanced Message Queuing Protocol (AMQP) for message dispatching, the work aims at paving the way towards a more open world in the airfield industrial sector. The paper also presents performance results achieved by extending legacy components to support IoT standards. Quantitative results not only demonstrate the feasibility of the proposed solution, but also its suitability in terms of prompt message dispatching and increased fault tolerance.


Author(s):  
Matt Zwolenski ◽  
Lee Weatherill

The Digital Universe, which consists of all the data created by PC, Sensor Networks, GPS/WiFi Location, Web Metadata, Web-Sourced Biographical Data, Mobile, Smart-Connected Devices and Next-Generation Applications (to name but a few) is altering the way we consume and measure IT and disrupting proven business models. Unprecedented and exponential data growth is presenting businesses with new and unique opportunities and challenges. As the ‘Internet of Things’ (IoT) and Third Platform continue to grow, the analysis of structured and unstructured data will drive insights that change the way businesses operate, create distinctive value, and deliver services and applications to the consumer and to each other. As enterprises and IT grapple to take advantage of these trends in order to gain share and drive revenue, they must be mindful of the Information Security and Data Protection pitfalls that lay in wait ─ hurdles that have already tripped up market leaders and minnows alike.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1928
Author(s):  
Franco Cicirelli ◽  
Antonio Guerrieri ◽  
Carlo Mastroianni ◽  
Andrea Vinci

The Internet of Things, together with its related emerging solutions and technologies, is driving a revolution with respect to the way people perceive and interact with the surrounding environment [...]


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Sign in / Sign up

Export Citation Format

Share Document