Cyber Infrastructure Protection: Vol. III by U.S. Department of Defense
Author:U.S. Department of Defense
Language: eng
Format: azw3
Publisher: UNKNOWN
Published: 2017-06-21T04:00:00+00:00
Table 4-2. Big Data Characteristics in Relation to Security and Privacy in Smart Cities.92 DISCUSSION AND IMPLICATIONS Some of the emerging and alarming trends discussed above indicate that cyberattacks on smart cities are likely to have dangerous consequences. Smart cities are likely to be ideal targets for cyberterrorists and hostile foreign governments. Traditional devices owned by businesses and consumers have been the most popular target for financially motivated cybercriminals. However, as cities become smarter and more connected, it is likely that such cybercriminals will perceive a change in the cost/benefit calculus and target them. Likewise, the development and deployment of directed, automated, and networked technologies have led to a surge in surveillance activities and programs. Smart city developers and policymakers thus need to make sure that privacy and security concerns are adequately addressed and clearly resolved. No less important is the implementation of measures to educate consumers so that they understand the potential value of various categories of information belonging to them. It is also important to take into account the influence of perception as well as reality in consumers’ assessment of privacy and security issues.
Equally important is the need to understand the desired level of privacy of consumers. For example, an intriguing aspect of the development of South Korea’s New Songdo City is that most of the core technologies were developed in the United States rather than in Korea. Supportive formal and informal institutions including lower privacy concerns are arguably the primary reason why the U.S.-developed smart city technologies were first implemented in Korea rather than anywhere else.93 While the use of RFID to automate tracking and monitoring the movements of people is a big concern in the West, privacy concerns are less prominent in Asia.94 As a research director of Palo Alto described, “There is an historical expectation of less privacy [in Korea].”95 Observers have also noted that, whereas ubiquitous computing is controversial in the West due to privacy concerns and fears of turning into a surveillance society, in Korea and other Asian nations the concept is viewed as an opportunity to attract foreign investment by showing off technological prowess.96 Ubiquitous computing is arguably viewed more as gaining technology expertise in Asia rather than an invasion of privacy.97
Whereas strong legal protections for the privacy of personal information exist in the European Union and clear laws exist as to how data can be collected, stored, and reused, privacy is a new luxury in most cities in Asia and other parts of the world.98 Likewise, authoritarian regimes of the Persian Gulf view surveillance and data mining as a means to increase their power and control over terrorists, criminal outfits, minority groups, and migrant workers.99
With respect to privacy issues, it is important to note the existence of heterogeneous laws, views, interests, and opinions internationally. A “one size fits all” approach to the design and development of smart cities may be ill advised and likely to be ineffective in terms of meeting the privacy needs of different
‐ groups of people. Alternative utopias of smart cities have been offered.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6578)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6298)
Machine Learning Security Principles by John Paul Mueller(6271)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5944)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5905)
Solidity Programming Essentials by Ritesh Modi(4042)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3680)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3411)
Future Crimes by Marc Goodman(3351)
Mastering Python for Networking and Security by José Manuel Ortega(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3305)
Learn Computer Forensics - Second Edition by William Oettinger(3172)
Incident Response with Threat Intelligence by Roberto Martínez(2898)
Mobile App Reverse Engineering by Abhinav Mishra(2886)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2832)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2783)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2760)
