Privacy From Your Mobile Devices?

Author(s):  
Tim Dwyer

In a post-Snowden world people tend to be more aware that they are living in times of intensified surveillance and diminishing privacy. There is a widespread assumption that populations are being “watched” and “listened” to by both governments and corporations, and this has been amplified in an era of ubiquitous smartphone ownership. It is argued that the Internet of things, expanding categories of personalized media content, mobile communications in locative social media, apps, and searching all present a range of affordances that complicate and threaten personal privacy. The rise of algorithmic computational processes in the mass scale accumulation of personal data by platform intermediaries requires new responses that must begin with an understanding of the way publics are using mobile devices. A key task is to trace out an account of the implications of digital footprints and the usage of personal data points by governments and corporations for citizens’ and consumers’ everyday lives.

Diagnostics ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 1067
Author(s):  
Karla Jaimes Merazzo ◽  
Joseba Totoricaguena-Gorriño ◽  
Eduardo Fernández-Martín ◽  
F. Javier del Campo ◽  
Eva Baldrich

Smartphones are becoming increasingly versatile thanks to the wide variety of sensor and actuator systems packed in them. Mobile devices today go well beyond their original purpose as communication devices, and this enables important new applications, ranging from augmented reality to the Internet of Things. Personalized diagnostics is one of the areas where mobile devices can have the greatest impact. Hitherto, the camera and communication abilities of these devices have been barely exploited for point of care (POC) purposes. This short review covers the recent evolution of mobile devices in the area of POC diagnostics and puts forward some ideas that may facilitate the development of more advanced applications and devices in the area of personalized diagnostics. With this purpose, the potential exploitation of wireless power and actuation of sensors and biosensors using near field communication (NFC), the use of the screen as a light source for actuation and spectroscopic analysis, using the haptic module to enhance mass transport in micro volumes, and the use of magnetic sensors are discussed.


2019 ◽  
Vol 62 (6) ◽  
pp. 32-34 ◽  
Author(s):  
Thomas Pasquier ◽  
David Eyers ◽  
Jean Bacon

2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Kok-Seng Wong ◽  
Myung Ho Kim

The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the respondents might refuse to contribute their personal data or submit inaccurate data. In this paper, we study a self-awareness data collection protocol to raise the confidence of the respondents when submitting their personal data to the data collector. Our self-awareness protocol requires each respondent to help others in preserving his privacy. The communication (respondents and data collector) and collaboration (among respondents) in our solution will be performed automatically.


2021 ◽  
Vol 4 (2) ◽  
pp. 52-72
Author(s):  
Timur Khusyainov

This work considers the use of digital traces in the educational environment and the specifics of their collection and analysis at the university. One way or another, all participants in the educational process, as well as those who can potentially become them, for example, applicants, leave digital traces in the digital environments of the university and the Global Network in general, and these traces can be analyzed. At the same time, even the university itself as an organization leaves a certain digital footprint on the Internet. At the moment, most researchers are very optimistic, contemplating on what positive changes can be brought by the analysis of digital traces of applicants, students and teachers for the development of the university itself, the educa-tional process, and the formation of individual learning paths. In contrast to this, the author identifies a number of possible prospects for the analysis of Big Data and the use of Artificial Intelligence for education at the university of the future. Attention is focused on how this can affect the safety of the environment and conflict with ethical standards. Participants in the educational process, falling under the analysis of their digital traces, can both suffer because of them, even if their activities have not been in any way connected with the university, and begin to hide their true digital identity, creating «false» digital traces and becoming anon-ymous. The author assumes that an increase in such control covering actions, thoughts and emotions naturally results in the emergence of the concept of a «Dark» University, which distances itself as much as possible from such methods of analyzing personal data.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4053 ◽  
Author(s):  
Andrea Petroni ◽  
Francesca Cuomo ◽  
Leonisio Schepis ◽  
Mauro Biagi ◽  
Marco Listanti ◽  
...  

The Internet of Things (IoT) is by now very close to be realized, leading the world towards a new technological era where people’s lives and habits will be definitively revolutionized. Furthermore, the incoming 5G technology promises significant enhancements concerning the Quality of Service (QoS) in mobile communications. Having billions of devices simultaneously connected has opened new challenges about network management and data exchange rules that need to be tailored to the characteristics of the considered scenario. A large part of the IoT market is pointing to Low-Power Wide-Area Networks (LPWANs) representing the infrastructure for several applications having energy saving as a mandatory goal besides other aspects of QoS. In this context, we propose a low-power IoT-oriented file synchronization protocol that, by dynamically optimizing the amount of data to be transferred, limits the device level of interaction within the network, therefore extending the battery life. This protocol can be adopted with different Layer 2 technologies and provides energy savings at the IoT device level that can be exploited by different applications.


2021 ◽  
Vol 4 ◽  
Author(s):  
Vibhushinie Bentotahewa ◽  
Chaminda Hewage ◽  
Jason Williams

The growing dependency on digital technologies is becoming a way of life, and at the same time, the collection of data using them for surveillance operations has raised concerns. Notably, some countries use digital surveillance technologies for tracking and monitoring individuals and populations to prevent the transmission of the new coronavirus. The technology has the capacity to contribute towards tackling the pandemic effectively, but the success also comes at the expense of privacy rights. The crucial point to make is regardless of who uses and which mechanism, in one way another will infringe personal privacy. Therefore, when considering the use of technologies to combat the pandemic, the focus should also be on the impact of facial recognition cameras, police surveillance drones, and other digital surveillance devices on the privacy rights of those under surveillance. The GDPR was established to ensure that information could be shared without causing any infringement on personal data and businesses; therefore, in generating Big Data, it is important to ensure that the information is securely collected, processed, transmitted, stored, and accessed in accordance with established rules. This paper focuses on Big Data challenges associated with surveillance methods used within the COVID-19 parameters. The aim of this research is to propose practical solutions to Big Data challenges associated with COVID-19 pandemic surveillance approaches. To that end, the researcher will identify the surveillance measures being used by countries in different regions, the sensitivity of generated data, and the issues associated with the collection of large volumes of data and finally propose feasible solutions to protect the privacy rights of the people, during the post-COVID-19 era.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2019 ◽  
Author(s):  
Vaclav Janecek

This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, the article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


2020 ◽  
Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

Building the innovative blockchain-based architecture across the Internet of Things (IoT) platform for the education system could be an enticing mechanism to boost communication efficiency within the 5 G network. Wireless networking would have been the main research area allowing people to communicate without using the wires. It was established at the start of the Internet by retrieving the web pages to connect from one computer to another computer Moreover, high-speed, intelligent, powerful networks with numerous contemporary technologies, such as low power consumption, and so on, appear to be available in today's world to connect among each other. The extension of fog features on physical things under IoT is allowed in this situation. One of the complex tasks throughout the area of mobile communications would be to design a new virtualization framework based on blockchain across the Internet of Things architecture. The goal of this research is to connect a new study for an educational system that contains Blockchain to the internet of things or keeping things cryptographically secure on the internet. This research combines with its improved blockchain and IoT to create an efficient interaction system between students, teachers, employers, developers, facilitators and accreditors on the Internet. This specified framework is detailed research's great estimation.


Sign in / Sign up

Export Citation Format

Share Document