Abstract
This chapter delves into the interrelationship between the Internet of Things (IoT) and our civil rights, particularly, the Fourth Amendment to the US Constitution. The goal is to emphasize the immensity of the work to be done to tackle the issues presented with this great ubiquitous asset. We constantly use it, but it can also be the cause of many grave issues detrimental to the safety of our personal data. Also discussed are the fundamentals of privacy, security, and your civil rights and the different obstacles and opportunities that occur along the way, sometimes leading to litigation. We will explain why it is all about the data, who gets hacked and why, and what precautions and actions you can take as an individual and a company.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kranzberg M (1986) Technology and history: “Kranzberg’s Laws”. Technol Cult 27(3):544–560. https://doi.org/10.2307/3105385. Retrieved from http://www.jstor.org/stable/3105385
https://us.norton.com/internetsecurity-privacy-privacy-vs-security-whats-the-difference.html
https://fossbytes.com/right-privacy-fundamental-right-cyber-security-impact-india/. 2017 Aug 29
https://www.huntonprivacyblog.com/2018/07/27/indias-draft-data-privacy-law-issued-today/
Linkedin.com. 2018 June 7
Inside Privacy. 2018 Oct 1
Privacy vs. Security. Do today’s models work with the Internet of Things and its cousin, big data? Thursday, 2017 March 23. By: Brian Dean. https://www.secureworks.com/blog/privacy-vs-security
WSJ Pro Cybersecurity. 2018 Sept 18
The Denver Post Published, 2016 October 23 at 12:01 am, Updated 2017 March 24 at 12:29 pm
Enterprise.verizon
The book, The Devil Inside the Beltway: The Shocking Expose of the US Government’s Surveillance and Overreach Into Cybersecurity, Medicine and Small Business, by Michael J. Daugherty
LabMD Inc. v. Federal Trade Commission, on Petition for Review of an Order of the Federal Trade Commission (FTC Docket No. 9357)
Business.com/Security/Last modified. 2018 Mar 29
H.R. 5069, 114th Congress (2015–2016) the Cybersecurity Systems and Risks Reporting Act will amend SOX to also apply to cybersecurity systems and cybersecurity systems officers and bring it up to date
https://techspective.net/2018/09/04/what-is-the-us-doing-to-keep-technology-safe/
United States v. Microsoft Corp., 584 U.S. ___, 138 S.Ct. 1186, 200 L.Ed.2d 610 (April 17, 2018).
CNBC.com. 2018 July 11
Governmenteuropa.eu. 11 Dec 2018
Euractiv.com. 2018 Dec 10 (updated 2018 Dec 18)
H5690 March 2017, Rep. Justin Price, Rhode Island
Lidar is commonly used to make high-resolution maps, with applications in in geodesy, geomatics, archaeology, geography, geology, geomorphology, seismology, forestry, atmospheric physics, laser guidance, airborne laser swath mapping (ALSM), and laser altimetry. The technology is also used in control and navigation for some autonomous cars. Wikipedia
https://www.statista.com/statistics/276703/android-app-releases-worldwide/
Alice Corporation Pty. Ltd., Petitioner v. CLS Bank International et al., 134 S.Ct. 2347 (2014 June)
See United States v. Jones, 132 S.Ct. 945, 565 U.S. 400, 181 L.Ed.2d 911, 80 U.S.L.W. 4125, 23 Fla.L.Weekly Fed. S 102 (2012. Criticized 732 F.3d 187 (3rd Cir. 2013), 12-2548, United States v. Katzin
565 U.S. 400 (2012), 132 S.Ct. 945, 181 L.Ed.2d 911
Forbes.com. 2014 Nov 16
December 11, 2017, Future of Privacy Forum, fpf.org
Unfairness by algorithm: Distilling the Harms of Automated Decision-Making, Lauren Smith, 2017 December 11, Future of Privacy Forum
https://www.cnbc.com/2017/12/12/starbucks-customer-laptops-hacked-to-mine-cryptocurrency.html
MIT Technology Review, Technologyreview.com, The Download, 2018 Dec 20
MIT Technology Review, Technologyreview.com, Six Cyber Threats to Really About in 2018, by Martin Giles. 2018 Jan 2
Forbes Technology Council, Brian NeSmith, 2018 December 28, Cybersecurity Predictions for 2019. https://www.forbes.com/sites/forbestechcouncil/2018/12/28/cybersecurity-predictions-for-2019/#22a3c8bb4a27
MIT Technology Review, Hijacking Computers to Min Cryptocurrency is all the Rage. https://www.technologyreview.com/s/609031/hijacking-computers-to-mine-cryptocurrency-is-all-the-rage/, Mike Orcutt. 2017 Oct 5
Wired.com, Andy Greenberg Security. 2018 Aug 22
Verizon 2018 Data Breach Investigations Report
https://altaba.gcs-web.com/static-files/346e8981-1015-49dd-b616-66756ba99173
https://www.nytimes.com/2019/01/23/business/dealbook/yahoo-cyber-security-settlement.html
Enhancing Cyber-Risk Oversight by Katie Swafford, NACD Directorship May/June 2017
2016 WL 6081823. decided 2016 Oct 18
https://www.eckertseamans.com/app/uploads/PileggiDelawareWatchJanFeb2017.pdf
Rms.com, RMS Releases Industry’s First Probabilistic Cyber Risk Model, Newark, Calif. 2018 Mar 7
Innovation engineering gets its inspiration from Dr. W. Edwards Deming. For additional information on Dr. Deming’s work go to www.deming.org
Is the Internet of Things Your New Constitution? Philip N. Howard, pnhoward@uw.edu, Professor, Oxford University and University of Washington 9/11/2015. https://www.sas.upenn.edu/andrea-mitchell-center/sites/www.sas.upenn.edu.dcc/files/Howard%20DCC%20Paper%20v3.pdf
Wall Street Journal 2017 October 20
https://www.nytimes.com/2017/07/12/business/apple-china-data-center-cybersecurity.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mares, C.D. (2019). IoT: Privacy, Security, and Your Civil Rights. In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-15705-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15704-3
Online ISBN: 978-3-030-15705-0
eBook Packages: EngineeringEngineering (R0)