SlideShare ist ein Scribd-Unternehmen logo
1 von 46
The Internet of Things & Wearable Technology: 
Unlocking the Next Wave of Data-Driven Innovation 
Presentation at AEI-FCC Conference on “Regulating the 
Evolving Broadband Ecosystem” 
Adam Thierer 
Senior Research Fellow 
Mercatus Center at George Mason University 
September 11, 2014
Outline of Paper & Presentation 
• Definitions 
• Opportunities 
• Key Policy Concerns (Technical vs. Social) 
• A Deeper Dive on Privacy-Related Concerns 
• Constructive Solutions 
• A Word about Adaptation 
• The Growing Conflict of Visions Ahead 
2
Definitions 
3
Definitions of IoT Evolving 
• No consensus definition, but lots of catchphrases! 
– “machine-to-machine” communication 
– “Industrial Internet” (GE) 
– “Internet of Everything” (Cisco) 
– “ThingerNet” / “Thingerverse” 
• “Smart” everything! 
– “smart homes,” “smart buildings,” “smart appliances,” 
“smart health,” “smart mobility,” “smart cities,” “smart 
cars,” etc. 
4
Best Definition of IoT 
Morrison Foerster analysts define IoT as: 
“the network of everyday physical objects which 
surround us and that are increasingly being 
embedded with technology to enable those objects 
to collect and transmit data about their use and 
surroundings.” 
5
Key Components of the IoT 
• Power of IoT comes from combination of: 
– Faster & smaller microprocessors 
– Smaller & better sensors (& cameras) 
– More ubiquitous & robust wireless networks 
– Expanding cloud storage capacity 
– Enhanced “big data” capabilities 
• It’s the miniaturization of everything that matters 
– both in terms of device size & cost 
• = the long-desired “seamless web” of connectivity 
now exists 
6
Just How Connected? 
(by 2020) 
• ABI Research: estimates that there are more than 10 
billion wirelessly connected devices in the market 
today and more than 30 billion devices expected by 
2020 
• Cisco: by 2020, 37 billion intelligent things will be 
connected & communicating 
• IDC: predicts far greater penetration of 212 billion 
installed devices by 2020 
7
8
The Economic Opportunity 
9
Estimated Economic Impact of IoT 
• McKinsey Global: $2.7 trillion to $6.2 trillion 
per year by 2025 
• IDC: compound annual growth rate of 7.9% 
between now & 2020, to reach $8.9 trillion 
• Cisco: IoT will create $14.4 trillion in value 
between 2013 and 2022 
10
Many Subsectors, Many Players 
11
12
“Wearables” = Most 
Important IoT Category 
• = IoT that is worn on body 
• “quantified self” movement growing 
• Unsightly today (think “Google Glass”), but 
will literally be sewn into our clothes in future 
(“sensor-rich fabrics”) & largely invisible 
• Becoming “lifestyle remotes” to automate our 
lives 
13
14
Sectors & Professions That Will Be 
Transformed by Wearable Tech 
• Health Care / Surgery 
• Firefighting 
• Law enforcement 
• Political campaigns 
• Education / Instruction 
• Retailing 
• Entertainment 
• Theme parks 
• Airlines & vacationing 
• Financial Services 
• Sports / Athletics 
15
Health & Fitness Are 
Major Drivers 
Typology of Mobile Health Technologies 
• Connectors: applications that connect smartphones and tablets to FDA-regulated 
devices, thus amplifying the devices’ functionalities. 
• Replicators: applications that turn a smartphone or tablet itself into a medical device by 
replicating the functionality of an FDA-regulated device. 
• Automators & Customizers: apps which use questionnaires, algorithms, formulae, 
medical calculators, or other software parameters to aid clinical decisions. 
• Informers & Educators: medical reference texts and educational apps that primarily aim 
to inform and educate. 
• Administrators: apps that automate office functions, like identifying appropriate 
insurance billing codes or scheduling patient appointments. 
• Loggers & Trackers: apps that allows users to log, record, and make decisions about 
their general health and wellness. 
Source: Nathan Cortez, SMU School of Law 
16
Wearable Market Growth 
• Canalys: 700% growth in wearable smart bands 
market in the second half of 2013 
• IDC: shipment volumes will exceed 19 million units in 
2014, 3x prior year 
• IDC: global market will swell to 112 million units in 
2018, resulting in a CAGR of 78% 
• + major smartphone platforms providers (Apple, 
Google, Microsoft, Samsung) all competing 
aggressively here 
17
The “Sci-Fi” Future of IoT & Wearables 
Will Arrive Shortly 
• “Implantables” = IoT implanted under skin 
• “Ingestibles” = IoT tech that is swallowed 
• “Biohacking”= Body modification to enhance 
or repair human abilities 
– see: http://discuss.biohack.me 
18
Policy Concerns: 
Technical vs. Social 
19
Technical Issues 
• Access to adequate spectrum to facilitate wireless 
networking capabilities? 
• Technical standards 
– Wi-Fi, Bluetooth, near field communication, GPS 
– Licensed or unlicensed ? 
• Device / platform interoperability 
– Apple vs. Android vs. what else? 
• Device addressing 
– Will rise of IoT & wearables get IPv6 transition moving? 
20
Quick Note on Technical Issues 
• Technical issues were not focus of this 
particular paper 
• That is primarily because I am actually far 
more optimistic we can work those issues out 
relative to… 
21
Social Concerns 
(in order of current severity) 
• Security 
• Privacy 
– reputational issues 
– “discrimination” issues 
Primary focus of paper 
• Safety 
• Automation fears & other ethical objections 
– “cyborg” concerns 
22
Regulatory Interest Growing 
Agencies Already Exploring IoT Tech 
• FTC (general privacy & security) 
• FDA (safety of mobile medical apps & devices) 
• FCC (wireless issues) 
• FAA (commercial drones) 
• NHTSA (intelligent vehicle technology) 
• NTIA (multistakeholder privacy reviews) 
• Various state & local regulators 
• + rapidly growing interest in Europe & Asia 
23
A Deeper Dive on 
Privacy & Security Concerns 
24
The Coming Data Deluge 
• Amount of data generated & collected online today 
pales in comparison to what is coming 
• Recall estimates of 30+ billion devices by 2020 
• And recall defining realities of IoT & wearable tech: 
– always-on 
– always-sensing 
– always-collecting 
– always-communicating 
• The IoT is, at once, a massive data generator & giant 
data vacuum cleaner 
25
Ramifications for Modern Privacy 
& Security Policies 
• “fair information practice principles” (FIPPs) 
will be hard to strictly apply & enforce 
• FTC Chairwoman Ramirez: 
“the difficulties will be exponentially greater with 
the advent of the Internet of Things, as the 
boundaries between the virtual and physical 
worlds disappear.” 
26
How IoT Challenges FIPPS 
• What is “adequate notice” in an always-on, always-sensing 
world of billions of micro devices? 
• What counts as “consent” in a world of peer-to-peer self-surveillance? 
– Ex: How do you get consent when using Google Glass or a “Narrative” 
clip-on camera? 
• Transparency: How to post privacy policies when everything is 
so small? 
• What counts as “respect for context” when everything is 
being collected? 
• How does data minimization work for “always on” IoT & 
wearables 
27
IoT Also Challenges… 
• Health Insurance Portability and 
Accountability Act (HIPAA) 
• COPPA & FERPA (kids & education privacy) 
• GLB financial privacy 
• State privacy & data security laws 
• FDA safety standards 
• + wide variety of workplace issues 
28
Will a Move to Use-Based 
Restrictions Save the Day? 
• Going to be very hard to limit collection, so a move to 
use-based restrictions seems likely 
• But which uses? 
– “discriminatory” uses (how defined?) 
– are existing discrimination statutes applicable? 
• What about database access / correction? 
– think FCRA 
• Problem of overly sweeping use restrictions 
– “privacy paternalism”? 
29
Query: What about the First Amendment? 
• First Amendment likely poses serious roadblock to 
more comprehensive regulation of IoT & wearables 
• Volokh: “We already have a code of ‘fair information 
practices,’ and it is the First Amendment” 
• ACLU of Illinois v. Alvarez (2012): 
– “The act of making an audio or audiovisual recording is 
necessarily included within the First Amendment’s 
guarantee of speech and press rights as a corollary of the 
right to disseminate the resulting recording.” 
• 1A might limit both collection & use-based 
restrictions 
30
Constructive Solutions 
31
A “Layered” Approach to Address Concerns 
1) Developers: Privacy & security “by design” / best practices 
2) Consumers: Education, media literacy & tech etiquette 
3) Social norms, pressure & sanctions will play big role 
– ex: restrictions on phones in theaters & locker rooms 
4) Common law adjudication / other legal standards 
– privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws 
– Products liability: strict liability / negligence, design defects law, failure to 
warn, breach of warranty, etc 
5) FTC (Section 5) “unfair & deceptive practices” 
6) Targeted data use restrictions for sensitive classes of info 
– note: existing discrimination statutes might cover some issues 
32
Developer-Side Solutions 
Elements of Privacy / Security by Design 
• Better security through encryption, 
anonymization / data “de-identification” 
• Rolling security notices / updates / upgrades 
• Proper use guidelines 
• Better transparency re: data use/sharing 
policies 
• Data minimization when possible 
• Simpler UI 
33
Consumer-Side Education 
• Media literacy / digital citizenship / 
“netiquette” 
• Government can be active here w/o fear of 
First Amendment 
– PSAs / general awareness-building efforts 
• ex: OnGuardOnline.gov 
– Classroom lessons 
• Privacy curriculum (see Fordham CLIP model) 
34
Liability Norms Could Evolve 
• Who is “least-cost avoider” who assumes liability? 
• As developer knowledge of potential misuses grows, 
liability could shift, too 
– Ex: Driverless cars & insurance as cars become a service 
• But will liability norms need a nudge in that 
direction? … 
• … or, will IoT developers need protection from over-eager 
tort lawyers! 
• Bottom line: Let product liability evolve; it has 
happened many times before w/ other tech. 
35
FTC Role Will Continue 
Recent FTC Privacy & Security Enforcement Actions 
• Google 
• Facebook 
• Apple 
• Twitter 
• MySpace 
• HTC 
• Lookout 
• Path 
• Snapchat 
• Fandango 
• Credit Karma 
• TrendNet 
 53 data security-related cases recently 
 20-year privacy audits for some firms + fines 
 = is this an “FTC common law” of IoT privacy & security? 
36
A Word about Social 
Adaptation 
37
What Was True Before… 
• Citizen attitudes about emerging technologies 
follow a familiar cycle: 
1. initial resistance (“technopanic” phase) 
2. gradual adaptation 
3. eventual assimilation 
• we have seen this cycle play out in countless 
other contexts 
38
First We Panic, Then… 
• Recall reaction to camera & photography in late 1800’s… 
“Instantaneous photographs and newspaper enterprise have invaded 
the sacred precincts of private and domestic life; and numerous 
mechanical devices threaten to make good the prediction that ‘what is 
whispered in the closet shall be proclaimed from the house-tops.’” 
— Samuel D. Warren and Louis D. Brandeis, 1890 
• But we got through it! We adjusted our societal norms and 
personal expectations to accommodate photography. 
• Instead of rejecting cameras, we bought a lot of them! (But 
then learned how to use them respectfully, too.) 
39
Key Takeaways 
• There is no end point in debates about data security 
& online privacy; a never-ending challenge 
• IoT & wearables merely extend & exacerbate 
problems we already faced in Web 1.0 & 2.0 world 
• silver bullet solutions don’t exist (never have, never 
will) 
• Need to find creative ways to adapt to each new set 
of challenges 
– individuals, institutions, law & norms all must adapt 
– patience & humility will be crucial policy virtues 
40
The Grand Tech Policy Clash of 
Visions to Come 
41
IoT and 
Future Tech 
Flashpoints 
Internet of Things 
• Wearable Tech 
• Smart Homes 
• Smart Cities 
Robotics 
• Smart cars 
• Private drones 
Health Issues 
• Medical Devices 
• Biohacking 
• Embeddables 
• Genetic issues 
• Mobile medical apps 
• Telemedicine 
3-D Printing 
• A.I.
Which Vision Will Govern? 
IoT foreshadows many other debates about 
emerging tech. The choice: 
• Permissionless Innovation = the general 
freedom to experiment & learn through trial-and- 
error experimentation. 
• Precautionary Principle = Crafting public 
policies to control or limit new innovations 
until their creators can prove that they won’t 
cause any harms. 
43
The Heart of the Debate 
Which Default for Innovation? 
Precautionary Principle Permissionless Innovation 
44 
risk anticipation risk adaptation 
Ex ante enforcement Ex post enforcement 
Preemptive 
top-down controls 
Reactive 
bottom-up remedies 
Innovators have to ask, 
“Mother, May I?” 
Innovation is “innocent 
until proven guilty”
A Range of Responses to Technological Risk 
Prohibition 
Censorship 
Info suppression 
Product bans 
Anticipatory 
Regulation 
Administrative mandates 
Restrictive defaults 
Licensing & permits 
Industry guidance 
Resiliency 
Education & Media Literacy 
Labeling / Transparency 
User empowerment 
Self-regulation 
Adaptation 
Experience / Experiments 
Learning / Coping 
Social norms & pressure 
Top-down 
Solutions 
Bottom-up 
Solutions 
Precautionary Principle 
Permissionless Innovation 
45
Related Mercatus Center Research 
Books, Papers & Filings 
• Book: Permissionless Innovation: The Continuing Case for Comprehensive 
Technological Freedom 
• Filing to FTC on Privacy and Security Implications of the Internet of Things 
• Law review article: Technopanics, Threat Inflation, and the Danger of an 
Information Technology Precautionary Principle 
Articles & Blog Posts 
• Muddling Through: How We Learn to Cope with Technological Change 
• Who Really Believes in “Permissionless Innovation”? 
• “Permissionless Innovation” Offline as Well as On 
• The Third Industrial Revolution Has Only Just Begun 
46

Weitere ähnliche Inhalte

Was ist angesagt?

IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringPotato
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Vivian Motti
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoTJason Hong
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoTW. David Stephenson
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117Maria Correia
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 DocumentAjith Kumar Ravi
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceAltoros
 

Was ist angesagt? (20)

IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoT
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoT
 
Big data and information privacy 20190117
Big data and information privacy 20190117Big data and information privacy 20190117
Big data and information privacy 20190117
 
Internet of things New Version 2017 Document
Internet of things New Version 2017 DocumentInternet of things New Version 2017 Document
Internet of things New Version 2017 Document
 
Io t whitepaper_5_15_17
Io t whitepaper_5_15_17Io t whitepaper_5_15_17
Io t whitepaper_5_15_17
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Future of IoT: Key Challenges to Face
Future of IoT: Key Challenges to FaceFuture of IoT: Key Challenges to Face
Future of IoT: Key Challenges to Face
 

Andere mochten auch

Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
Internet of Things: Opportunities for designing new experiences, capabilities...
Internet of Things: Opportunities for designing new experiences, capabilities...Internet of Things: Opportunities for designing new experiences, capabilities...
Internet of Things: Opportunities for designing new experiences, capabilities...Claro Partners Inc.
 
An Introduction to Internet of things
An Introduction to Internet of thingsAn Introduction to Internet of things
An Introduction to Internet of thingsRoby Rock
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things HardwareDaniel Eichhorn
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundationBernard Kufluk
 
Introduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open DataIntroduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open DataCharalampos Doukas
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Reactive Programming Models for IoT
Reactive Programming Models for IoTReactive Programming Models for IoT
Reactive Programming Models for IoTTodd Montgomery
 
IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116Economic Strategy Institute
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-IntroductionNirnay Banagar
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Mostafa Arjmand
 
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Julien Vermillard
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsAlexandru Radovici
 
IoT = device + cloud. how to architect an iot solution slideshare
IoT = device + cloud. how to architect an iot solution slideshareIoT = device + cloud. how to architect an iot solution slideshare
IoT = device + cloud. how to architect an iot solution slideshareGuy Vinograd ☁
 
Business models for IoT and Wearables
Business models for IoT and WearablesBusiness models for IoT and Wearables
Business models for IoT and WearablesJoseph Wei
 
Actuators Complete
Actuators CompleteActuators Complete
Actuators CompleteNoah Hurst
 
Sensors And Actuators
Sensors And ActuatorsSensors And Actuators
Sensors And ActuatorsJinesh Patel
 
Zigbee Based Patient Monitoring System
Zigbee Based Patient Monitoring SystemZigbee Based Patient Monitoring System
Zigbee Based Patient Monitoring SystemAmeer Khan
 

Andere mochten auch (20)

Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
Internet of Things: Opportunities for designing new experiences, capabilities...
Internet of Things: Opportunities for designing new experiences, capabilities...Internet of Things: Opportunities for designing new experiences, capabilities...
Internet of Things: Opportunities for designing new experiences, capabilities...
 
An Introduction to Internet of things
An Introduction to Internet of thingsAn Introduction to Internet of things
An Introduction to Internet of things
 
Introduction to Internet of Things Hardware
Introduction to Internet of Things HardwareIntroduction to Internet of Things Hardware
Introduction to Internet of Things Hardware
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
 
Introduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open DataIntroduction to the Internet of Things and Open Data
Introduction to the Internet of Things and Open Data
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Reactive Programming Models for IoT
Reactive Programming Models for IoTReactive Programming Models for IoT
Reactive Programming Models for IoT
 
IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-Introduction
 
Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions Internet of Things A Vision, Architectural Elements, and Future Directions
Internet of Things A Vision, Architectural Elements, and Future Directions
 
IoT Business Models & Patent Eligibility
IoT Business Models & Patent EligibilityIoT Business Models & Patent Eligibility
IoT Business Models & Patent Eligibility
 
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Stream iot-x iot forum 2015
Stream iot-x iot forum 2015Stream iot-x iot forum 2015
Stream iot-x iot forum 2015
 
IoT = device + cloud. how to architect an iot solution slideshare
IoT = device + cloud. how to architect an iot solution slideshareIoT = device + cloud. how to architect an iot solution slideshare
IoT = device + cloud. how to architect an iot solution slideshare
 
Business models for IoT and Wearables
Business models for IoT and WearablesBusiness models for IoT and Wearables
Business models for IoT and Wearables
 
Actuators Complete
Actuators CompleteActuators Complete
Actuators Complete
 
Sensors And Actuators
Sensors And ActuatorsSensors And Actuators
Sensors And Actuators
 
Zigbee Based Patient Monitoring System
Zigbee Based Patient Monitoring SystemZigbee Based Patient Monitoring System
Zigbee Based Patient Monitoring System
 

Ähnlich wie [SLIDES] Internet of Things presentation at AEI (Sept 2014)

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestLilian Edwards
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptMuhammadHashamKhanBI
 

Ähnlich wie [SLIDES] Internet of Things presentation at AEI (Sept 2014) (20)

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)
 
The connected utility
The connected utilityThe connected utility
The connected utility
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
Tech trends
Tech trendsTech trends
Tech trends
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Internet de las Cosas: del Concepto a la Realidad
Internet de las Cosas: del Concepto a la RealidadInternet de las Cosas: del Concepto a la Realidad
Internet de las Cosas: del Concepto a la Realidad
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
IT law : the middle kingdom between east and West
IT law : the middle kingdom between east and WestIT law : the middle kingdom between east and West
IT law : the middle kingdom between east and West
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Business with Big data
Business with Big dataBusiness with Big data
Business with Big data
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 

Mehr von Adam Thierer

AI Worldviews: Similarities & Differences
AI Worldviews: Similarities & DifferencesAI Worldviews: Similarities & Differences
AI Worldviews: Similarities & DifferencesAdam Thierer
 
AI and Robotics policy overview - Adam Thierer (Aug 2022)
AI and Robotics policy overview - Adam Thierer (Aug 2022)AI and Robotics policy overview - Adam Thierer (Aug 2022)
AI and Robotics policy overview - Adam Thierer (Aug 2022)Adam Thierer
 
The Future of Innovation of Policy - Adam Thierer - Mercatus Center
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterThe Future of Innovation of Policy - Adam Thierer - Mercatus Center
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterAdam Thierer
 
Tips & Best Practices for Aspiring Policy Scholars
Tips & Best Practices for Aspiring Policy ScholarsTips & Best Practices for Aspiring Policy Scholars
Tips & Best Practices for Aspiring Policy ScholarsAdam Thierer
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
 
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Adam Thierer
 
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
 

Mehr von Adam Thierer (7)

AI Worldviews: Similarities & Differences
AI Worldviews: Similarities & DifferencesAI Worldviews: Similarities & Differences
AI Worldviews: Similarities & Differences
 
AI and Robotics policy overview - Adam Thierer (Aug 2022)
AI and Robotics policy overview - Adam Thierer (Aug 2022)AI and Robotics policy overview - Adam Thierer (Aug 2022)
AI and Robotics policy overview - Adam Thierer (Aug 2022)
 
The Future of Innovation of Policy - Adam Thierer - Mercatus Center
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterThe Future of Innovation of Policy - Adam Thierer - Mercatus Center
The Future of Innovation of Policy - Adam Thierer - Mercatus Center
 
Tips & Best Practices for Aspiring Policy Scholars
Tips & Best Practices for Aspiring Policy ScholarsTips & Best Practices for Aspiring Policy Scholars
Tips & Best Practices for Aspiring Policy Scholars
 
Artificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump yearsArtificial intelligence governance in the Obama & Trump years
Artificial intelligence governance in the Obama & Trump years
 
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)
 
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
 

[SLIDES] Internet of Things presentation at AEI (Sept 2014)

  • 1. The Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation Presentation at AEI-FCC Conference on “Regulating the Evolving Broadband Ecosystem” Adam Thierer Senior Research Fellow Mercatus Center at George Mason University September 11, 2014
  • 2. Outline of Paper & Presentation • Definitions • Opportunities • Key Policy Concerns (Technical vs. Social) • A Deeper Dive on Privacy-Related Concerns • Constructive Solutions • A Word about Adaptation • The Growing Conflict of Visions Ahead 2
  • 4. Definitions of IoT Evolving • No consensus definition, but lots of catchphrases! – “machine-to-machine” communication – “Industrial Internet” (GE) – “Internet of Everything” (Cisco) – “ThingerNet” / “Thingerverse” • “Smart” everything! – “smart homes,” “smart buildings,” “smart appliances,” “smart health,” “smart mobility,” “smart cities,” “smart cars,” etc. 4
  • 5. Best Definition of IoT Morrison Foerster analysts define IoT as: “the network of everyday physical objects which surround us and that are increasingly being embedded with technology to enable those objects to collect and transmit data about their use and surroundings.” 5
  • 6. Key Components of the IoT • Power of IoT comes from combination of: – Faster & smaller microprocessors – Smaller & better sensors (& cameras) – More ubiquitous & robust wireless networks – Expanding cloud storage capacity – Enhanced “big data” capabilities • It’s the miniaturization of everything that matters – both in terms of device size & cost • = the long-desired “seamless web” of connectivity now exists 6
  • 7. Just How Connected? (by 2020) • ABI Research: estimates that there are more than 10 billion wirelessly connected devices in the market today and more than 30 billion devices expected by 2020 • Cisco: by 2020, 37 billion intelligent things will be connected & communicating • IDC: predicts far greater penetration of 212 billion installed devices by 2020 7
  • 8. 8
  • 10. Estimated Economic Impact of IoT • McKinsey Global: $2.7 trillion to $6.2 trillion per year by 2025 • IDC: compound annual growth rate of 7.9% between now & 2020, to reach $8.9 trillion • Cisco: IoT will create $14.4 trillion in value between 2013 and 2022 10
  • 11. Many Subsectors, Many Players 11
  • 12. 12
  • 13. “Wearables” = Most Important IoT Category • = IoT that is worn on body • “quantified self” movement growing • Unsightly today (think “Google Glass”), but will literally be sewn into our clothes in future (“sensor-rich fabrics”) & largely invisible • Becoming “lifestyle remotes” to automate our lives 13
  • 14. 14
  • 15. Sectors & Professions That Will Be Transformed by Wearable Tech • Health Care / Surgery • Firefighting • Law enforcement • Political campaigns • Education / Instruction • Retailing • Entertainment • Theme parks • Airlines & vacationing • Financial Services • Sports / Athletics 15
  • 16. Health & Fitness Are Major Drivers Typology of Mobile Health Technologies • Connectors: applications that connect smartphones and tablets to FDA-regulated devices, thus amplifying the devices’ functionalities. • Replicators: applications that turn a smartphone or tablet itself into a medical device by replicating the functionality of an FDA-regulated device. • Automators & Customizers: apps which use questionnaires, algorithms, formulae, medical calculators, or other software parameters to aid clinical decisions. • Informers & Educators: medical reference texts and educational apps that primarily aim to inform and educate. • Administrators: apps that automate office functions, like identifying appropriate insurance billing codes or scheduling patient appointments. • Loggers & Trackers: apps that allows users to log, record, and make decisions about their general health and wellness. Source: Nathan Cortez, SMU School of Law 16
  • 17. Wearable Market Growth • Canalys: 700% growth in wearable smart bands market in the second half of 2013 • IDC: shipment volumes will exceed 19 million units in 2014, 3x prior year • IDC: global market will swell to 112 million units in 2018, resulting in a CAGR of 78% • + major smartphone platforms providers (Apple, Google, Microsoft, Samsung) all competing aggressively here 17
  • 18. The “Sci-Fi” Future of IoT & Wearables Will Arrive Shortly • “Implantables” = IoT implanted under skin • “Ingestibles” = IoT tech that is swallowed • “Biohacking”= Body modification to enhance or repair human abilities – see: http://discuss.biohack.me 18
  • 19. Policy Concerns: Technical vs. Social 19
  • 20. Technical Issues • Access to adequate spectrum to facilitate wireless networking capabilities? • Technical standards – Wi-Fi, Bluetooth, near field communication, GPS – Licensed or unlicensed ? • Device / platform interoperability – Apple vs. Android vs. what else? • Device addressing – Will rise of IoT & wearables get IPv6 transition moving? 20
  • 21. Quick Note on Technical Issues • Technical issues were not focus of this particular paper • That is primarily because I am actually far more optimistic we can work those issues out relative to… 21
  • 22. Social Concerns (in order of current severity) • Security • Privacy – reputational issues – “discrimination” issues Primary focus of paper • Safety • Automation fears & other ethical objections – “cyborg” concerns 22
  • 23. Regulatory Interest Growing Agencies Already Exploring IoT Tech • FTC (general privacy & security) • FDA (safety of mobile medical apps & devices) • FCC (wireless issues) • FAA (commercial drones) • NHTSA (intelligent vehicle technology) • NTIA (multistakeholder privacy reviews) • Various state & local regulators • + rapidly growing interest in Europe & Asia 23
  • 24. A Deeper Dive on Privacy & Security Concerns 24
  • 25. The Coming Data Deluge • Amount of data generated & collected online today pales in comparison to what is coming • Recall estimates of 30+ billion devices by 2020 • And recall defining realities of IoT & wearable tech: – always-on – always-sensing – always-collecting – always-communicating • The IoT is, at once, a massive data generator & giant data vacuum cleaner 25
  • 26. Ramifications for Modern Privacy & Security Policies • “fair information practice principles” (FIPPs) will be hard to strictly apply & enforce • FTC Chairwoman Ramirez: “the difficulties will be exponentially greater with the advent of the Internet of Things, as the boundaries between the virtual and physical worlds disappear.” 26
  • 27. How IoT Challenges FIPPS • What is “adequate notice” in an always-on, always-sensing world of billions of micro devices? • What counts as “consent” in a world of peer-to-peer self-surveillance? – Ex: How do you get consent when using Google Glass or a “Narrative” clip-on camera? • Transparency: How to post privacy policies when everything is so small? • What counts as “respect for context” when everything is being collected? • How does data minimization work for “always on” IoT & wearables 27
  • 28. IoT Also Challenges… • Health Insurance Portability and Accountability Act (HIPAA) • COPPA & FERPA (kids & education privacy) • GLB financial privacy • State privacy & data security laws • FDA safety standards • + wide variety of workplace issues 28
  • 29. Will a Move to Use-Based Restrictions Save the Day? • Going to be very hard to limit collection, so a move to use-based restrictions seems likely • But which uses? – “discriminatory” uses (how defined?) – are existing discrimination statutes applicable? • What about database access / correction? – think FCRA • Problem of overly sweeping use restrictions – “privacy paternalism”? 29
  • 30. Query: What about the First Amendment? • First Amendment likely poses serious roadblock to more comprehensive regulation of IoT & wearables • Volokh: “We already have a code of ‘fair information practices,’ and it is the First Amendment” • ACLU of Illinois v. Alvarez (2012): – “The act of making an audio or audiovisual recording is necessarily included within the First Amendment’s guarantee of speech and press rights as a corollary of the right to disseminate the resulting recording.” • 1A might limit both collection & use-based restrictions 30
  • 32. A “Layered” Approach to Address Concerns 1) Developers: Privacy & security “by design” / best practices 2) Consumers: Education, media literacy & tech etiquette 3) Social norms, pressure & sanctions will play big role – ex: restrictions on phones in theaters & locker rooms 4) Common law adjudication / other legal standards – privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws – Products liability: strict liability / negligence, design defects law, failure to warn, breach of warranty, etc 5) FTC (Section 5) “unfair & deceptive practices” 6) Targeted data use restrictions for sensitive classes of info – note: existing discrimination statutes might cover some issues 32
  • 33. Developer-Side Solutions Elements of Privacy / Security by Design • Better security through encryption, anonymization / data “de-identification” • Rolling security notices / updates / upgrades • Proper use guidelines • Better transparency re: data use/sharing policies • Data minimization when possible • Simpler UI 33
  • 34. Consumer-Side Education • Media literacy / digital citizenship / “netiquette” • Government can be active here w/o fear of First Amendment – PSAs / general awareness-building efforts • ex: OnGuardOnline.gov – Classroom lessons • Privacy curriculum (see Fordham CLIP model) 34
  • 35. Liability Norms Could Evolve • Who is “least-cost avoider” who assumes liability? • As developer knowledge of potential misuses grows, liability could shift, too – Ex: Driverless cars & insurance as cars become a service • But will liability norms need a nudge in that direction? … • … or, will IoT developers need protection from over-eager tort lawyers! • Bottom line: Let product liability evolve; it has happened many times before w/ other tech. 35
  • 36. FTC Role Will Continue Recent FTC Privacy & Security Enforcement Actions • Google • Facebook • Apple • Twitter • MySpace • HTC • Lookout • Path • Snapchat • Fandango • Credit Karma • TrendNet  53 data security-related cases recently  20-year privacy audits for some firms + fines  = is this an “FTC common law” of IoT privacy & security? 36
  • 37. A Word about Social Adaptation 37
  • 38. What Was True Before… • Citizen attitudes about emerging technologies follow a familiar cycle: 1. initial resistance (“technopanic” phase) 2. gradual adaptation 3. eventual assimilation • we have seen this cycle play out in countless other contexts 38
  • 39. First We Panic, Then… • Recall reaction to camera & photography in late 1800’s… “Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” — Samuel D. Warren and Louis D. Brandeis, 1890 • But we got through it! We adjusted our societal norms and personal expectations to accommodate photography. • Instead of rejecting cameras, we bought a lot of them! (But then learned how to use them respectfully, too.) 39
  • 40. Key Takeaways • There is no end point in debates about data security & online privacy; a never-ending challenge • IoT & wearables merely extend & exacerbate problems we already faced in Web 1.0 & 2.0 world • silver bullet solutions don’t exist (never have, never will) • Need to find creative ways to adapt to each new set of challenges – individuals, institutions, law & norms all must adapt – patience & humility will be crucial policy virtues 40
  • 41. The Grand Tech Policy Clash of Visions to Come 41
  • 42. IoT and Future Tech Flashpoints Internet of Things • Wearable Tech • Smart Homes • Smart Cities Robotics • Smart cars • Private drones Health Issues • Medical Devices • Biohacking • Embeddables • Genetic issues • Mobile medical apps • Telemedicine 3-D Printing • A.I.
  • 43. Which Vision Will Govern? IoT foreshadows many other debates about emerging tech. The choice: • Permissionless Innovation = the general freedom to experiment & learn through trial-and- error experimentation. • Precautionary Principle = Crafting public policies to control or limit new innovations until their creators can prove that they won’t cause any harms. 43
  • 44. The Heart of the Debate Which Default for Innovation? Precautionary Principle Permissionless Innovation 44 risk anticipation risk adaptation Ex ante enforcement Ex post enforcement Preemptive top-down controls Reactive bottom-up remedies Innovators have to ask, “Mother, May I?” Innovation is “innocent until proven guilty”
  • 45. A Range of Responses to Technological Risk Prohibition Censorship Info suppression Product bans Anticipatory Regulation Administrative mandates Restrictive defaults Licensing & permits Industry guidance Resiliency Education & Media Literacy Labeling / Transparency User empowerment Self-regulation Adaptation Experience / Experiments Learning / Coping Social norms & pressure Top-down Solutions Bottom-up Solutions Precautionary Principle Permissionless Innovation 45
  • 46. Related Mercatus Center Research Books, Papers & Filings • Book: Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom • Filing to FTC on Privacy and Security Implications of the Internet of Things • Law review article: Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle Articles & Blog Posts • Muddling Through: How We Learn to Cope with Technological Change • Who Really Believes in “Permissionless Innovation”? • “Permissionless Innovation” Offline as Well as On • The Third Industrial Revolution Has Only Just Begun 46