SlideShare a Scribd company logo
1 of 4
Applications and Privacy
Issues with Sensor Nets
Jason Hong
Carnegie Mellon University
Some Applications
• 911.net
– Rapidly deployable sensor net for firefighters
– Rapid response when an individual in danger
• Families
– Am I leaving with everything I came with?
• Personal motivation
– Help me be more green / more active
– Combine with social web sites (FootPrints)
• Smart Homes
– Home monitoring of elderly (CMU QoLT)
– Just moved, where’s my stuff?
– Drunk again?
Privacy and Sensor Nets
• Two separate notions
– Privacy with respect to owners of sensor net vs users
• For owners:
– Transparency and accountability
– Privacy policies
– Protection at physical layer for plausible deniability
• For users:
– “Did you get there safely?” vs “Where are you?”
– Pessimistic vs optimistic privacy
• Will we trade privacy for safety, fairness, public good?
Other Issues to Consider
• How do mobile phones fit in?
– Are people part of sensor nets too? (Gawker Stalker)
• What is the deployment model / business model?
– Home Depot model? Paid service? Public city infrastructure?
• How to maximize public good?
– Small percentage with Lojack decreases overall car thefts
• What is the user interaction like?
– Is it working? Broken? Dead batteries everywhere?
– Don’t forget sense of play (De-Tour Guide)
– Need rapid prototyping tools to assess utility before deploy
– Please, no more smart fridges!!!

More Related Content

What's hot

Internet of Things: Social Applications
Internet of Things: Social ApplicationsInternet of Things: Social Applications
Internet of Things: Social ApplicationsJun Hu
 
ROOF Quick Reference
ROOF Quick ReferenceROOF Quick Reference
ROOF Quick Referencenishantpro
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big databis_foresight
 
What Is Digital Social Innovation?
What Is Digital Social Innovation?What Is Digital Social Innovation?
What Is Digital Social Innovation?Crowdsourcing Week
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Graeme Wood
 

What's hot (7)

Io t an insight
Io t an insightIo t an insight
Io t an insight
 
Internet of Things: Social Applications
Internet of Things: Social ApplicationsInternet of Things: Social Applications
Internet of Things: Social Applications
 
ROOF Quick Reference
ROOF Quick ReferenceROOF Quick Reference
ROOF Quick Reference
 
Making sense of big data
Making sense of big dataMaking sense of big data
Making sense of big data
 
What Is Digital Social Innovation?
What Is Digital Social Innovation?What Is Digital Social Innovation?
What Is Digital Social Innovation?
 
Semantic Computing Executive Briefing
Semantic Computing Executive Briefing Semantic Computing Executive Briefing
Semantic Computing Executive Briefing
 
Ethics and Personal Data
Ethics and Personal DataEthics and Personal Data
Ethics and Personal Data
 

Viewers also liked

Search filterquery databases
Search filterquery databasesSearch filterquery databases
Search filterquery databasescrystalpullen
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSSRachel Andrew
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsShelly Sanchez Terrell
 
How to Battle Bad Reviews
How to Battle Bad ReviewsHow to Battle Bad Reviews
How to Battle Bad ReviewsGlassdoor
 
Activism x Technology
Activism x TechnologyActivism x Technology
Activism x TechnologyWebVisions
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back KidEthos3
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaChris Lema
 

Viewers also liked (7)

Search filterquery databases
Search filterquery databasesSearch filterquery databases
Search filterquery databases
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
How to Battle Bad Reviews
How to Battle Bad ReviewsHow to Battle Bad Reviews
How to Battle Bad Reviews
 
Activism x Technology
Activism x TechnologyActivism x Technology
Activism x Technology
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 

Similar to Applications and Privacy Issues with Sensor Networks

Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Locus Charter Presentation
Locus Charter Presentation Locus Charter Presentation
Locus Charter Presentation Suchith Anand
 
Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...
Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...
Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...welingtonms
 
Big Data, Open Data, Big Costs - tim willoughby
Big Data, Open Data, Big Costs  - tim willoughbyBig Data, Open Data, Big Costs  - tim willoughby
Big Data, Open Data, Big Costs - tim willoughbyTim Willoughby
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesHongseok Kim
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Larry Smith
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interactionYavuz Paksoy
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big DataMatti Vesala
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxMuhammadAbdullah311866
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
 
Ethical by Design - A Manifesto
Ethical by Design - A ManifestoEthical by Design - A Manifesto
Ethical by Design - A ManifestoUlster University
 

Similar to Applications and Privacy Issues with Sensor Networks (20)

Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Locus Charter Presentation
Locus Charter Presentation Locus Charter Presentation
Locus Charter Presentation
 
Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...
Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...
Status Report - A COGNITIVE PRIVACY FRAMEWORK TO A SMART CITY ARCHITECTURE BA...
 
Big Data, Open Data, Big Costs - tim willoughby
Big Data, Open Data, Big Costs  - tim willoughbyBig Data, Open Data, Big Costs  - tim willoughby
Big Data, Open Data, Big Costs - tim willoughby
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...Digital Transformation Major tech trends through the customer lens and relati...
Digital Transformation Major tech trends through the customer lens and relati...
 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interaction
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
Ethical Questions for Producing Pervasive Media
Ethical Questions for Producing Pervasive MediaEthical Questions for Producing Pervasive Media
Ethical Questions for Producing Pervasive Media
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
It concerns 2014
It concerns 2014It concerns 2014
It concerns 2014
 
Ethical by Design - A Manifesto
Ethical by Design - A ManifestoEthical by Design - A Manifesto
Ethical by Design - A Manifesto
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Applications and Privacy Issues with Sensor Networks

  • 1. Applications and Privacy Issues with Sensor Nets Jason Hong Carnegie Mellon University
  • 2. Some Applications • 911.net – Rapidly deployable sensor net for firefighters – Rapid response when an individual in danger • Families – Am I leaving with everything I came with? • Personal motivation – Help me be more green / more active – Combine with social web sites (FootPrints) • Smart Homes – Home monitoring of elderly (CMU QoLT) – Just moved, where’s my stuff? – Drunk again?
  • 3. Privacy and Sensor Nets • Two separate notions – Privacy with respect to owners of sensor net vs users • For owners: – Transparency and accountability – Privacy policies – Protection at physical layer for plausible deniability • For users: – “Did you get there safely?” vs “Where are you?” – Pessimistic vs optimistic privacy • Will we trade privacy for safety, fairness, public good?
  • 4. Other Issues to Consider • How do mobile phones fit in? – Are people part of sensor nets too? (Gawker Stalker) • What is the deployment model / business model? – Home Depot model? Paid service? Public city infrastructure? • How to maximize public good? – Small percentage with Lojack decreases overall car thefts • What is the user interaction like? – Is it working? Broken? Dead batteries everywhere? – Don’t forget sense of play (De-Tour Guide) – Need rapid prototyping tools to assess utility before deploy – Please, no more smart fridges!!!