Cyber Infrastructure Protection: Vol. III by U.S. Department of Defense

Cyber Infrastructure Protection: Vol. III by U.S. Department of Defense

Author:U.S. Department of Defense
Language: eng
Format: azw3
Publisher: UNKNOWN
Published: 2017-06-21T04:00:00+00:00


Table 4-2. Big Data Characteristics in Relation to Security and Privacy in Smart Cities.92 DISCUSSION AND IMPLICATIONS Some of the emerging and alarming trends discussed above indicate that cyberattacks on smart cities are likely to have dangerous consequences. Smart cities are likely to be ideal targets for cyberterrorists and hostile foreign governments. Traditional devices owned by businesses and consumers have been the most popular target for financially motivated cybercriminals. However, as cities become smarter and more connected, it is likely that such cybercriminals will perceive a change in the cost/benefit calculus and target them. Likewise, the development and deployment of directed, automated, and networked technologies have led to a surge in surveillance activities and programs. Smart city developers and policymakers thus need to make sure that privacy and security concerns are adequately addressed and clearly resolved. No less important is the implementation of measures to educate consumers so that they understand the potential value of various categories of information belonging to them. It is also important to take into account the influence of perception as well as reality in consumers’ assessment of privacy and security issues.

Equally important is the need to understand the desired level of privacy of consumers. For example, an intriguing aspect of the development of South Korea’s New Songdo City is that most of the core technologies were developed in the United States rather than in Korea. Supportive formal and informal institutions including lower privacy concerns are arguably the primary reason why the U.S.-developed smart city technologies were first implemented in Korea rather than anywhere else.93 While the use of RFID to automate tracking and monitoring the movements of people is a big concern in the West, privacy concerns are less prominent in Asia.94 As a research director of Palo Alto described, “There is an historical expectation of less privacy [in Korea].”95 Observers have also noted that, whereas ubiquitous computing is controversial in the West due to privacy concerns and fears of turning into a surveillance society, in Korea and other Asian nations the concept is viewed as an opportunity to attract foreign investment by showing off technological prowess.96 Ubiquitous computing is arguably viewed more as gaining technology expertise in Asia rather than an invasion of privacy.97

Whereas strong legal protections for the privacy of personal information exist in the European Union and clear laws exist as to how data can be collected, stored, and reused, privacy is a new luxury in most cities in Asia and other parts of the world.98 Likewise, authoritarian regimes of the Persian Gulf view surveillance and data mining as a means to increase their power and control over terrorists, criminal outfits, minority groups, and migrant workers.99

With respect to privacy issues, it is important to note the existence of heterogeneous laws, views, interests, and opinions internationally. A “one size fits all” approach to the design and development of smart cities may be ill advised and likely to be ineffective in terms of meeting the privacy needs of different

‐ groups of people. Alternative utopias of smart cities have been offered.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.