SlideShare ist ein Scribd-Unternehmen logo
1 von 47
The Internet of Things & Wearable Technology:
An Overview of Key Issues & Policy Concerns
Adam Thierer
Senior Research Fellow
Mercatus Center at George Mason University
Last updated September 2015
Outline of Paper & Presentation
• Definitions
• Opportunities
• Key Policy Concerns (Technical vs. Social)
• A Deeper Dive on Privacy-Related Concerns
• Constructive Solutions
• A Word about Adaptation
• The Growing Conflict of Visions Ahead
2
Definitions
3
Definitions of IoT Evolving
• No consensus definition, but lots of catchphrases!
– “machine-to-machine” communication
– “Industrial Internet” (GE)
– “Internet of Everything” (Cisco)
– “ThingerNet” / “Thingerverse”
• “Smart” everything!
– “smart homes,” “smart buildings,” “smart appliances,”
“smart health,” “smart mobility,” “smart cities,” “smart
cars,” etc.
4
Best Definition of IoT
Morrison Foerster analysts define IoT as:
“the network of everyday physical objects which
surround us and that are increasingly being
embedded with technology to enable those objects
to collect and transmit data about their use and
surroundings.”
• More simply, it’s a world were the Internet is baked
into all our stuff!
5
Key Components of the IoT
• Power of IoT comes from combination of:
– Faster & smaller microprocessors
– Smaller & better sensors (& cameras)
– More ubiquitous & robust wireless networks
– Expanding cloud storage capacity
– Enhanced “big data” capabilities
• It’s the miniaturization of everything that matters
– both in terms of device size & cost
• = the long-desired “seamless web” of connectivity
now exists
6
Just How Connected?
• ABI Research: estimates that there are more than 10
billion wirelessly connected devices in the market
today and more than 35 billion devices expected by
2019
• Cisco: by 2019, 40 billion intelligent things will be
connected & communicating
• IDC: predicts far greater penetration of 212 billion
installed devices by 2020
7
8
The Economic Opportunity
9
Estimated Economic Impact of IoT
• McKinsey Global: $3.9 trillion to $11.1 trillion
potential economic impact per year by 2025
• IDC: compound annual growth rate of 7.9%
between now & 2020, to reach $8.9 trillion
• Cisco: IoT will create $14.4 trillion in value
between 2013 and 2022
10
11
Many Subsectors, Many Players
12
13
“Wearables” = Most
Important IoT Category
• = IoT that is worn on body
• “quantified self” movement growing
• Unsightly today (think “Google Glass”), but
will literally be sewn into our clothes in future
(“sensor-rich fabrics”) & largely invisible
• Becoming “lifestyle remotes” to automate our
lives
14
15
Sectors & Professions That Will Be
Transformed by Wearable Tech
• Health Care / Surgery
• Firefighting
• Law enforcement
• Political campaigns
• Education / Instruction
• Retailing
• Entertainment
• Theme parks
• Airlines & vacationing
• Financial Services
• Sports / Athletics
16
Health & Fitness Are
Major Drivers
Typology of Mobile Health Technologies
• Connectors: applications that connect smartphones and tablets to FDA-regulated
devices, thus amplifying the devices’ functionalities.
• Replicators: applications that turn a smartphone or tablet itself into a medical device by
replicating the functionality of an FDA-regulated device.
• Automators & Customizers: apps which use questionnaires, algorithms, formulae,
medical calculators, or other software parameters to aid clinical decisions.
• Informers & Educators: medical reference texts and educational apps that primarily aim
to inform and educate.
• Administrators: apps that automate office functions, like identifying appropriate
insurance billing codes or scheduling patient appointments.
• Loggers & Trackers: apps that allows users to log, record, and make decisions about
their general health and wellness.
Source: Nathan Cortez, SMU School of Law
17
Wearable Market Growth
• Canalys: 700% growth in wearable smart bands
market in the second half of 2013
• IDC: shipment volumes will exceed 19 million units in
2014, 3x prior year
• IDC: global market will swell to 112 million units in
2018, resulting in a CAGR of 78%
• + major smartphone platforms providers (Apple,
Google, Microsoft, Samsung) all competing
aggressively here
18
The “Sci-Fi” Future of IoT & Wearables
Will Arrive Shortly
• “Implantables” = IoT implanted under skin
• “Ingestibles” = IoT tech that is swallowed
• “Biohacking”= Body modification to enhance
or repair human abilities
– see: http://discuss.biohack.me
19
Policy Concerns:
Technical vs. Social
20
Technical Issues
• Access to adequate spectrum to facilitate wireless
networking capabilities?
• Technical standards
– Wi-Fi, Bluetooth, near field communication, GPS
– Licensed or unlicensed ?
• Device / platform interoperability
– Apple vs. Android vs. what else?
• Device addressing
– Will rise of IoT & wearables get IPv6 transition moving?
21
Quick Note on Technical Issues
• Technical issues were not focus of this
particular paper
• That is primarily because I am actually far
more optimistic we can work those issues out
relative to…
22
Social Concerns
(in order of current severity)
• Security
• Privacy
– reputational issues
– “discrimination” issues
– data ownership
• Safety
• Automation fears & other ethical objections
– “cyborg” concerns
23
Regulatory Interest Growing
Policymakers Already Exploring IoT Tech
• FTC (general privacy & security)
• FDA (safety of mobile medical apps & devices)
• FCC (wireless issues)
• FAA (commercial drones)
• NHTSA (intelligent vehicle technology)
• NTIA (multistakeholder privacy reviews)
• Congress
• Various state, local & int’l regulators (esp. in EU)
24
A Deeper Dive on
Privacy & Security Concerns
25
The Coming Data Deluge
• Amount of data generated & collected online today
pales in comparison to what is coming
• Recall estimates of 30+ billion devices by 2020
• And recall defining realities of IoT & wearable tech:
– always-on
– always-sensing
– always-collecting
– always-communicating
• The IoT is, at once, a massive data generator & giant
data vacuum cleaner
26
Ramifications for Modern Privacy
& Security Policies
• “fair information practice principles” (FIPPs)
will be hard to strictly apply & enforce
• FTC Chairwoman Ramirez:
“the difficulties will be exponentially greater with
the advent of the Internet of Things, as the
boundaries between the virtual and physical
worlds disappear.”
27
How IoT Challenges FIPPS
• What is “adequate notice” in an always-on, always-sensing
world of billions of micro devices?
• What counts as “consent” in a world of peer-to-peer self-
surveillance?
– Ex: How do you get consent when using Google Glass or a “Narrative”
clip-on camera?
• Transparency: How to post privacy policies when everything is
so small?
• What counts as “respect for context” when everything is
being collected?
• How does data minimization work for “always on” IoT &
wearables
28
IoT Also Challenges…
• Health Insurance Portability and
Accountability Act (HIPAA)
• COPPA & FERPA (kids & education privacy)
• GLB financial privacy
• State privacy & data security laws
• FDA safety standards
• + wide variety of workplace issues
29
Will a Move to Use-Based
Restrictions Save the Day?
• Going to be very hard to limit collection, so a move to
use-based restrictions seems likely
• But which uses?
– “discriminatory” uses (how defined?)
– are existing discrimination statutes applicable?
• What about database access / correction?
– think FCRA
• Problem of overly sweeping use restrictions
– “privacy paternalism”?
30
Query: What about the First Amendment?
• First Amendment likely poses serious roadblock to
more comprehensive regulation of IoT & wearables
• Volokh: “We already have a code of ‘fair information
practices,’ and it is the First Amendment”
• ACLU of Illinois v. Alvarez (2012):
– “The act of making an audio or audiovisual recording is
necessarily included within the First Amendment’s
guarantee of speech and press rights as a corollary of the
right to disseminate the resulting recording.”
• 1A might limit both collection & use-based
restrictions
31
Constructive Solutions
32
A “Layered” Approach to Address Concerns
1) Developers: Privacy & security “by design” / best practices
2) Consumers: Education, media literacy & tech etiquette
3) Social norms, pressure & sanctions will play big role
– ex: restrictions on phones in theaters & locker rooms
4) Common law adjudication / other legal standards
– privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws
– Products liability: strict liability / negligence, design defects law, failure to
warn, breach of warranty, etc
5) FTC (Section 5) “unfair & deceptive practices”
6) Targeted data use restrictions for sensitive classes of info
– note: existing discrimination statutes might cover some issues
33
Developer-Side Solutions
Elements of Privacy / Security by Design
• Better security through encryption,
anonymization / data “de-identification”
• Rolling security notices / updates / upgrades
• Proper use guidelines
• Better transparency re: data use/sharing
policies
• Data minimization when possible
• Simpler UI
34
Consumer-Side Education
• Media literacy / digital citizenship /
“netiquette”
• Government can be active here w/o fear of
First Amendment
– PSAs / general awareness-building efforts
• ex: OnGuardOnline.gov
– Classroom lessons
• Privacy curriculum (see Fordham CLIP model)
35
Liability Norms Could Evolve
• Who is “least-cost avoider” who assumes liability?
• As developer knowledge of potential misuses grows,
liability could shift, too
– Ex: Driverless cars & insurance as cars become a service
• But will liability norms need a nudge in that
direction? …
• … or, will IoT developers need protection from over-
eager tort lawyers!
• Bottom line: Let product liability evolve; it has
happened many times before w/ other tech.
36
FTC Role Will Continue
Recent FTC Privacy & Security Enforcement Actions
• Google
• Facebook
• Apple
• Twitter
• MySpace
• HTC
• Lookout
• Path
• Snapchat
• Fandango
• Credit Karma
• TrendNet
 53 data security-related cases recently
 20-year privacy audits for some firms + fines
 = is this an “FTC common law” of IoT privacy & security?
37
A Word about Social
Adaptation
38
What Was True Before…
• Citizen attitudes about emerging technologies
follow a familiar cycle:
1. initial resistance (“technopanic” phase)
2. gradual adaptation
3. eventual assimilation
• we have seen this cycle play out in countless
other contexts
39
First We Panic, Then…
• Recall reaction to camera & photography in late 1800’s…
“Instantaneous photographs and newspaper enterprise have invaded
the sacred precincts of private and domestic life; and numerous
mechanical devices threaten to make good the prediction that ‘what is
whispered in the closet shall be proclaimed from the house-tops.’”
— Samuel D. Warren and Louis D. Brandeis, 1890
• But we got through it! We adjusted our societal norms and
personal expectations to accommodate photography.
• Instead of rejecting cameras, we bought a lot of them! (But
then learned how to use them respectfully, too.)
40
Key Takeaways
• There is no end point in debates about data security
& online privacy; a never-ending challenge
• IoT & wearables merely extend & exacerbate
problems we already faced in Web 1.0 & 2.0 world
• silver bullet solutions don’t exist (never have, never
will)
• Need to find creative ways to adapt to each new set
of challenges
– individuals, institutions, law & norms all must adapt
– patience & humility will be crucial policy virtues
41
The Grand Tech Policy Clash of
Visions to Come
42
IoT and
Future Tech
Flashpoints
Internet of Things
• Wearable Tech
• Smart Homes
• Smart Cities
Health Issues
• Medical Devices
• Biohacking
• Embeddables
• Genetic issues
• Mobile medical apps
• Telemedicine
3-D Printing
Robotics
• Smart cars
• Private drones
• A.I.
43
Which Vision Will Govern?
IoT foreshadows many other debates about
emerging tech. The choice:
• Permissionless Innovation = the general
freedom to experiment & learn through trial-
and-error experimentation.
• Precautionary Principle = Crafting public
policies to control or limit new innovations
until their creators can prove that they won’t
cause any harms.
44
The Heart of the Debate
Which Default for Innovation?
Precautionary Principle Permissionless Innovation
risk anticipation risk adaptation
Ex ante enforcement Ex post enforcement
Preemptive
top-down controls
Reactive
bottom-up remedies
Innovators have to ask,
“Mother, May I?”
Innovation is “innocent
until proven guilty”
45
A Range of Responses to Technological Risk
Prohibition
Censorship
Info suppression
Product bans
Anticipatory
Regulation
Administrative mandates
Restrictive defaults
Licensing & permits
Industry guidance
Resiliency
Education & Media Literacy
Labeling / Transparency
User empowerment
Self-regulation
Adaptation
Experience / Experiments
Learning / Coping
Social norms & pressure
Top-down
Solutions
Bottom-up
Solutions
Precautionary Principle
Permissionless Innovation
46
Related Mercatus Center Research
• Book: Permissionless Innovation: The Continuing Case for Comprehensive
Technological Freedom
• Testimony: The Connected World: Examining the Internet of Things
• Analysis: Projecting the Growth and Economic Impact of the Internet of Things
• Law review article: The Internet of Things and Wearable Technology:
Addressing Privacy and Security Concerns without Derailing Innovation
• Oped: How Not to Strangle the Internet of Things
• Filing to FTC on Privacy and Security Implications of the Internet of Things
• Law review article: Technopanics, Threat Inflation, and the Danger of an
Information Technology Precautionary Principle
• Article: Muddling Through: How We Learn to Cope with Technological Change
47

Weitere ähnliche Inhalte

Was ist angesagt?

Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Vivian Motti
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETKaren Rose
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingMatt Turck
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of ThingsDaren Dunkel
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Wearable technologies
Wearable technologiesWearable technologies
Wearable technologiesVivian Motti
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointDr. Mazlan Abbas
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
 

Was ist angesagt? (18)

Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the Making
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
Wearable technologies
Wearable technologiesWearable technologies
Wearable technologies
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...
 

Andere mochten auch

Question 3) What have you learned from your audience feedback?
Question 3) What have you learned from your audience feedback?Question 3) What have you learned from your audience feedback?
Question 3) What have you learned from your audience feedback?branblack
 
Presentación modulo 1 UNTREF 2016
Presentación modulo 1 UNTREF 2016Presentación modulo 1 UNTREF 2016
Presentación modulo 1 UNTREF 2016Ana Carolina Salgado
 
Datos de caso clinico
Datos de caso clinicoDatos de caso clinico
Datos de caso clinicoJoel Hq
 
Fall 2015 Research Paper
Fall 2015 Research PaperFall 2015 Research Paper
Fall 2015 Research PaperKRISTIN BETHEL
 
Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...
Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...
Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...Fernando Javier Aguirre Guzmán
 
GeoDataspace: Simplifying Data Management Tasks with Globus
GeoDataspace: Simplifying Data Management Tasks with GlobusGeoDataspace: Simplifying Data Management Tasks with Globus
GeoDataspace: Simplifying Data Management Tasks with GlobusTanu Malik
 
Nur 2-minuten
Nur 2-minutenNur 2-minuten
Nur 2-minutengrafic02
 
David Campbell: Writing Security
David Campbell: Writing SecurityDavid Campbell: Writing Security
David Campbell: Writing SecurityAaron Bauer
 

Andere mochten auch (11)

Question 3) What have you learned from your audience feedback?
Question 3) What have you learned from your audience feedback?Question 3) What have you learned from your audience feedback?
Question 3) What have you learned from your audience feedback?
 
Presentación modulo 1 UNTREF 2016
Presentación modulo 1 UNTREF 2016Presentación modulo 1 UNTREF 2016
Presentación modulo 1 UNTREF 2016
 
Datos de caso clinico
Datos de caso clinicoDatos de caso clinico
Datos de caso clinico
 
Bimba kids 14-04-2013
Bimba kids   14-04-2013Bimba kids   14-04-2013
Bimba kids 14-04-2013
 
Mercenaries_Freedom_Fighters_and_Self_De
Mercenaries_Freedom_Fighters_and_Self_DeMercenaries_Freedom_Fighters_and_Self_De
Mercenaries_Freedom_Fighters_and_Self_De
 
Fall 2015 Research Paper
Fall 2015 Research PaperFall 2015 Research Paper
Fall 2015 Research Paper
 
Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...
Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...
Metodología para el Alineamiento de Procesos de Negocio y Sistemas de Informa...
 
GeoDataspace: Simplifying Data Management Tasks with Globus
GeoDataspace: Simplifying Data Management Tasks with GlobusGeoDataspace: Simplifying Data Management Tasks with Globus
GeoDataspace: Simplifying Data Management Tasks with Globus
 
Nur 2-minuten
Nur 2-minutenNur 2-minuten
Nur 2-minuten
 
Demo
DemoDemo
Demo
 
David Campbell: Writing Security
David Campbell: Writing SecurityDavid Campbell: Writing Security
David Campbell: Writing Security
 

Ähnlich wie How Can Policymakers and Regulators Better Engage the Internet of Things?

[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptMuhammadHashamKhanBI
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of thingsDeva Johnson
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 

Ähnlich wie How Can Policymakers and Regulators Better Engage the Internet of Things? (20)

[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
The connected utility
The connected utilityThe connected utility
The connected utility
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Tech trends
Tech trendsTech trends
Tech trends
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 

Mehr von Mercatus Center

ACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural ProblemsACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural ProblemsMercatus Center
 
Evaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce YandleEvaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce YandleMercatus Center
 
Affordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year AnniversaryAffordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year AnniversaryMercatus Center
 
Capitol Hill Campis March 2016
Capitol Hill Campis March 2016Capitol Hill Campis March 2016
Capitol Hill Campis March 2016Mercatus Center
 
Understanding the U.S. Health Care System
Understanding the U.S. Health Care SystemUnderstanding the U.S. Health Care System
Understanding the U.S. Health Care SystemMercatus Center
 
Wireless Spectrum in 2016: A Policy Update
Wireless Spectrum in 2016: A Policy UpdateWireless Spectrum in 2016: A Policy Update
Wireless Spectrum in 2016: A Policy UpdateMercatus Center
 
Buchanan Speaker Series: Education, Inequality, and Incentives
Buchanan Speaker Series: Education, Inequality, and IncentivesBuchanan Speaker Series: Education, Inequality, and Incentives
Buchanan Speaker Series: Education, Inequality, and IncentivesMercatus Center
 
Modernizing Freight Rail Regulation: Recommendations from the TRB Study
Modernizing Freight Rail Regulation: Recommendations from the TRB StudyModernizing Freight Rail Regulation: Recommendations from the TRB Study
Modernizing Freight Rail Regulation: Recommendations from the TRB StudyMercatus Center
 
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...Mercatus Center
 
An Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce YandleAn Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce YandleMercatus Center
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?Mercatus Center
 
Tools for Tracking the Economic Impact of Legislation
Tools for Tracking the Economic Impact of LegislationTools for Tracking the Economic Impact of Legislation
Tools for Tracking the Economic Impact of LegislationMercatus Center
 
The Sharing Economy: Perspectives on Policies in the New Economy
The Sharing Economy: Perspectives on Policies in the New EconomyThe Sharing Economy: Perspectives on Policies in the New Economy
The Sharing Economy: Perspectives on Policies in the New EconomyMercatus Center
 
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...Mercatus Center
 
Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...
Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...
Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...Mercatus Center
 
Stephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI PanelStephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI PanelMercatus Center
 
David Stapleton Presentation for Mercatus Center SSDI Panel
David Stapleton Presentation for Mercatus Center SSDI PanelDavid Stapleton Presentation for Mercatus Center SSDI Panel
David Stapleton Presentation for Mercatus Center SSDI PanelMercatus Center
 
Jason J. Fichtner Presentation for Mercatus Center SSDI Panel
Jason J. Fichtner Presentation for Mercatus Center SSDI PanelJason J. Fichtner Presentation for Mercatus Center SSDI Panel
Jason J. Fichtner Presentation for Mercatus Center SSDI PanelMercatus Center
 
Stephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI PanelStephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI PanelMercatus Center
 

Mehr von Mercatus Center (20)

ACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural ProblemsACA Has Worsened Medicaid's Structural Problems
ACA Has Worsened Medicaid's Structural Problems
 
Evaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce YandleEvaluating a Sluggish Economy with Bruce Yandle
Evaluating a Sluggish Economy with Bruce Yandle
 
Affordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year AnniversaryAffordable Care Act's 6 Year Anniversary
Affordable Care Act's 6 Year Anniversary
 
Capitol Hill Campis March 2016
Capitol Hill Campis March 2016Capitol Hill Campis March 2016
Capitol Hill Campis March 2016
 
Nominal GDP Targeting
Nominal GDP TargetingNominal GDP Targeting
Nominal GDP Targeting
 
Understanding the U.S. Health Care System
Understanding the U.S. Health Care SystemUnderstanding the U.S. Health Care System
Understanding the U.S. Health Care System
 
Wireless Spectrum in 2016: A Policy Update
Wireless Spectrum in 2016: A Policy UpdateWireless Spectrum in 2016: A Policy Update
Wireless Spectrum in 2016: A Policy Update
 
Buchanan Speaker Series: Education, Inequality, and Incentives
Buchanan Speaker Series: Education, Inequality, and IncentivesBuchanan Speaker Series: Education, Inequality, and Incentives
Buchanan Speaker Series: Education, Inequality, and Incentives
 
Modernizing Freight Rail Regulation: Recommendations from the TRB Study
Modernizing Freight Rail Regulation: Recommendations from the TRB StudyModernizing Freight Rail Regulation: Recommendations from the TRB Study
Modernizing Freight Rail Regulation: Recommendations from the TRB Study
 
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...
 
An Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce YandleAn Economic Situation Update with Bruce Yandle
An Economic Situation Update with Bruce Yandle
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?
 
Tools for Tracking the Economic Impact of Legislation
Tools for Tracking the Economic Impact of LegislationTools for Tracking the Economic Impact of Legislation
Tools for Tracking the Economic Impact of Legislation
 
The Sharing Economy: Perspectives on Policies in the New Economy
The Sharing Economy: Perspectives on Policies in the New EconomyThe Sharing Economy: Perspectives on Policies in the New Economy
The Sharing Economy: Perspectives on Policies in the New Economy
 
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...
 
Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...
Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...
Bootleggers and Baptists in the Garden of Good and Evil: Understanding Americ...
 
Stephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI PanelStephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI Panel
 
David Stapleton Presentation for Mercatus Center SSDI Panel
David Stapleton Presentation for Mercatus Center SSDI PanelDavid Stapleton Presentation for Mercatus Center SSDI Panel
David Stapleton Presentation for Mercatus Center SSDI Panel
 
Jason J. Fichtner Presentation for Mercatus Center SSDI Panel
Jason J. Fichtner Presentation for Mercatus Center SSDI PanelJason J. Fichtner Presentation for Mercatus Center SSDI Panel
Jason J. Fichtner Presentation for Mercatus Center SSDI Panel
 
Stephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI PanelStephen C. Goss Presentation for Mercatus Center SSDI Panel
Stephen C. Goss Presentation for Mercatus Center SSDI Panel
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

How Can Policymakers and Regulators Better Engage the Internet of Things?

  • 1. The Internet of Things & Wearable Technology: An Overview of Key Issues & Policy Concerns Adam Thierer Senior Research Fellow Mercatus Center at George Mason University Last updated September 2015
  • 2. Outline of Paper & Presentation • Definitions • Opportunities • Key Policy Concerns (Technical vs. Social) • A Deeper Dive on Privacy-Related Concerns • Constructive Solutions • A Word about Adaptation • The Growing Conflict of Visions Ahead 2
  • 4. Definitions of IoT Evolving • No consensus definition, but lots of catchphrases! – “machine-to-machine” communication – “Industrial Internet” (GE) – “Internet of Everything” (Cisco) – “ThingerNet” / “Thingerverse” • “Smart” everything! – “smart homes,” “smart buildings,” “smart appliances,” “smart health,” “smart mobility,” “smart cities,” “smart cars,” etc. 4
  • 5. Best Definition of IoT Morrison Foerster analysts define IoT as: “the network of everyday physical objects which surround us and that are increasingly being embedded with technology to enable those objects to collect and transmit data about their use and surroundings.” • More simply, it’s a world were the Internet is baked into all our stuff! 5
  • 6. Key Components of the IoT • Power of IoT comes from combination of: – Faster & smaller microprocessors – Smaller & better sensors (& cameras) – More ubiquitous & robust wireless networks – Expanding cloud storage capacity – Enhanced “big data” capabilities • It’s the miniaturization of everything that matters – both in terms of device size & cost • = the long-desired “seamless web” of connectivity now exists 6
  • 7. Just How Connected? • ABI Research: estimates that there are more than 10 billion wirelessly connected devices in the market today and more than 35 billion devices expected by 2019 • Cisco: by 2019, 40 billion intelligent things will be connected & communicating • IDC: predicts far greater penetration of 212 billion installed devices by 2020 7
  • 8. 8
  • 10. Estimated Economic Impact of IoT • McKinsey Global: $3.9 trillion to $11.1 trillion potential economic impact per year by 2025 • IDC: compound annual growth rate of 7.9% between now & 2020, to reach $8.9 trillion • Cisco: IoT will create $14.4 trillion in value between 2013 and 2022 10
  • 11. 11
  • 12. Many Subsectors, Many Players 12
  • 13. 13
  • 14. “Wearables” = Most Important IoT Category • = IoT that is worn on body • “quantified self” movement growing • Unsightly today (think “Google Glass”), but will literally be sewn into our clothes in future (“sensor-rich fabrics”) & largely invisible • Becoming “lifestyle remotes” to automate our lives 14
  • 15. 15
  • 16. Sectors & Professions That Will Be Transformed by Wearable Tech • Health Care / Surgery • Firefighting • Law enforcement • Political campaigns • Education / Instruction • Retailing • Entertainment • Theme parks • Airlines & vacationing • Financial Services • Sports / Athletics 16
  • 17. Health & Fitness Are Major Drivers Typology of Mobile Health Technologies • Connectors: applications that connect smartphones and tablets to FDA-regulated devices, thus amplifying the devices’ functionalities. • Replicators: applications that turn a smartphone or tablet itself into a medical device by replicating the functionality of an FDA-regulated device. • Automators & Customizers: apps which use questionnaires, algorithms, formulae, medical calculators, or other software parameters to aid clinical decisions. • Informers & Educators: medical reference texts and educational apps that primarily aim to inform and educate. • Administrators: apps that automate office functions, like identifying appropriate insurance billing codes or scheduling patient appointments. • Loggers & Trackers: apps that allows users to log, record, and make decisions about their general health and wellness. Source: Nathan Cortez, SMU School of Law 17
  • 18. Wearable Market Growth • Canalys: 700% growth in wearable smart bands market in the second half of 2013 • IDC: shipment volumes will exceed 19 million units in 2014, 3x prior year • IDC: global market will swell to 112 million units in 2018, resulting in a CAGR of 78% • + major smartphone platforms providers (Apple, Google, Microsoft, Samsung) all competing aggressively here 18
  • 19. The “Sci-Fi” Future of IoT & Wearables Will Arrive Shortly • “Implantables” = IoT implanted under skin • “Ingestibles” = IoT tech that is swallowed • “Biohacking”= Body modification to enhance or repair human abilities – see: http://discuss.biohack.me 19
  • 21. Technical Issues • Access to adequate spectrum to facilitate wireless networking capabilities? • Technical standards – Wi-Fi, Bluetooth, near field communication, GPS – Licensed or unlicensed ? • Device / platform interoperability – Apple vs. Android vs. what else? • Device addressing – Will rise of IoT & wearables get IPv6 transition moving? 21
  • 22. Quick Note on Technical Issues • Technical issues were not focus of this particular paper • That is primarily because I am actually far more optimistic we can work those issues out relative to… 22
  • 23. Social Concerns (in order of current severity) • Security • Privacy – reputational issues – “discrimination” issues – data ownership • Safety • Automation fears & other ethical objections – “cyborg” concerns 23
  • 24. Regulatory Interest Growing Policymakers Already Exploring IoT Tech • FTC (general privacy & security) • FDA (safety of mobile medical apps & devices) • FCC (wireless issues) • FAA (commercial drones) • NHTSA (intelligent vehicle technology) • NTIA (multistakeholder privacy reviews) • Congress • Various state, local & int’l regulators (esp. in EU) 24
  • 25. A Deeper Dive on Privacy & Security Concerns 25
  • 26. The Coming Data Deluge • Amount of data generated & collected online today pales in comparison to what is coming • Recall estimates of 30+ billion devices by 2020 • And recall defining realities of IoT & wearable tech: – always-on – always-sensing – always-collecting – always-communicating • The IoT is, at once, a massive data generator & giant data vacuum cleaner 26
  • 27. Ramifications for Modern Privacy & Security Policies • “fair information practice principles” (FIPPs) will be hard to strictly apply & enforce • FTC Chairwoman Ramirez: “the difficulties will be exponentially greater with the advent of the Internet of Things, as the boundaries between the virtual and physical worlds disappear.” 27
  • 28. How IoT Challenges FIPPS • What is “adequate notice” in an always-on, always-sensing world of billions of micro devices? • What counts as “consent” in a world of peer-to-peer self- surveillance? – Ex: How do you get consent when using Google Glass or a “Narrative” clip-on camera? • Transparency: How to post privacy policies when everything is so small? • What counts as “respect for context” when everything is being collected? • How does data minimization work for “always on” IoT & wearables 28
  • 29. IoT Also Challenges… • Health Insurance Portability and Accountability Act (HIPAA) • COPPA & FERPA (kids & education privacy) • GLB financial privacy • State privacy & data security laws • FDA safety standards • + wide variety of workplace issues 29
  • 30. Will a Move to Use-Based Restrictions Save the Day? • Going to be very hard to limit collection, so a move to use-based restrictions seems likely • But which uses? – “discriminatory” uses (how defined?) – are existing discrimination statutes applicable? • What about database access / correction? – think FCRA • Problem of overly sweeping use restrictions – “privacy paternalism”? 30
  • 31. Query: What about the First Amendment? • First Amendment likely poses serious roadblock to more comprehensive regulation of IoT & wearables • Volokh: “We already have a code of ‘fair information practices,’ and it is the First Amendment” • ACLU of Illinois v. Alvarez (2012): – “The act of making an audio or audiovisual recording is necessarily included within the First Amendment’s guarantee of speech and press rights as a corollary of the right to disseminate the resulting recording.” • 1A might limit both collection & use-based restrictions 31
  • 33. A “Layered” Approach to Address Concerns 1) Developers: Privacy & security “by design” / best practices 2) Consumers: Education, media literacy & tech etiquette 3) Social norms, pressure & sanctions will play big role – ex: restrictions on phones in theaters & locker rooms 4) Common law adjudication / other legal standards – privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws – Products liability: strict liability / negligence, design defects law, failure to warn, breach of warranty, etc 5) FTC (Section 5) “unfair & deceptive practices” 6) Targeted data use restrictions for sensitive classes of info – note: existing discrimination statutes might cover some issues 33
  • 34. Developer-Side Solutions Elements of Privacy / Security by Design • Better security through encryption, anonymization / data “de-identification” • Rolling security notices / updates / upgrades • Proper use guidelines • Better transparency re: data use/sharing policies • Data minimization when possible • Simpler UI 34
  • 35. Consumer-Side Education • Media literacy / digital citizenship / “netiquette” • Government can be active here w/o fear of First Amendment – PSAs / general awareness-building efforts • ex: OnGuardOnline.gov – Classroom lessons • Privacy curriculum (see Fordham CLIP model) 35
  • 36. Liability Norms Could Evolve • Who is “least-cost avoider” who assumes liability? • As developer knowledge of potential misuses grows, liability could shift, too – Ex: Driverless cars & insurance as cars become a service • But will liability norms need a nudge in that direction? … • … or, will IoT developers need protection from over- eager tort lawyers! • Bottom line: Let product liability evolve; it has happened many times before w/ other tech. 36
  • 37. FTC Role Will Continue Recent FTC Privacy & Security Enforcement Actions • Google • Facebook • Apple • Twitter • MySpace • HTC • Lookout • Path • Snapchat • Fandango • Credit Karma • TrendNet  53 data security-related cases recently  20-year privacy audits for some firms + fines  = is this an “FTC common law” of IoT privacy & security? 37
  • 38. A Word about Social Adaptation 38
  • 39. What Was True Before… • Citizen attitudes about emerging technologies follow a familiar cycle: 1. initial resistance (“technopanic” phase) 2. gradual adaptation 3. eventual assimilation • we have seen this cycle play out in countless other contexts 39
  • 40. First We Panic, Then… • Recall reaction to camera & photography in late 1800’s… “Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” — Samuel D. Warren and Louis D. Brandeis, 1890 • But we got through it! We adjusted our societal norms and personal expectations to accommodate photography. • Instead of rejecting cameras, we bought a lot of them! (But then learned how to use them respectfully, too.) 40
  • 41. Key Takeaways • There is no end point in debates about data security & online privacy; a never-ending challenge • IoT & wearables merely extend & exacerbate problems we already faced in Web 1.0 & 2.0 world • silver bullet solutions don’t exist (never have, never will) • Need to find creative ways to adapt to each new set of challenges – individuals, institutions, law & norms all must adapt – patience & humility will be crucial policy virtues 41
  • 42. The Grand Tech Policy Clash of Visions to Come 42
  • 43. IoT and Future Tech Flashpoints Internet of Things • Wearable Tech • Smart Homes • Smart Cities Health Issues • Medical Devices • Biohacking • Embeddables • Genetic issues • Mobile medical apps • Telemedicine 3-D Printing Robotics • Smart cars • Private drones • A.I. 43
  • 44. Which Vision Will Govern? IoT foreshadows many other debates about emerging tech. The choice: • Permissionless Innovation = the general freedom to experiment & learn through trial- and-error experimentation. • Precautionary Principle = Crafting public policies to control or limit new innovations until their creators can prove that they won’t cause any harms. 44
  • 45. The Heart of the Debate Which Default for Innovation? Precautionary Principle Permissionless Innovation risk anticipation risk adaptation Ex ante enforcement Ex post enforcement Preemptive top-down controls Reactive bottom-up remedies Innovators have to ask, “Mother, May I?” Innovation is “innocent until proven guilty” 45
  • 46. A Range of Responses to Technological Risk Prohibition Censorship Info suppression Product bans Anticipatory Regulation Administrative mandates Restrictive defaults Licensing & permits Industry guidance Resiliency Education & Media Literacy Labeling / Transparency User empowerment Self-regulation Adaptation Experience / Experiments Learning / Coping Social norms & pressure Top-down Solutions Bottom-up Solutions Precautionary Principle Permissionless Innovation 46
  • 47. Related Mercatus Center Research • Book: Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom • Testimony: The Connected World: Examining the Internet of Things • Analysis: Projecting the Growth and Economic Impact of the Internet of Things • Law review article: The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation • Oped: How Not to Strangle the Internet of Things • Filing to FTC on Privacy and Security Implications of the Internet of Things • Law review article: Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle • Article: Muddling Through: How We Learn to Cope with Technological Change 47