Abstract
Internet of Things (IoTs) within Smart Cities have gained wider relevance in various dimensions especially in how humans interact with these technologies and the need to share data. Various IoTs such as smart devices including phones, appliances in the home and in industry, are used in daily life to keep up with growing trends of attaining information at our fingertips. These IoT devices within Smart Cities covers industries such as health, sports, and education amongst many. The advantages of these IoTs includes their ability to talk to each other in a connection of networks across “Cyberspace”, allowing for transfer of data to happen quickly and efficiently. However, these devices are now presenting numerous challenges including those related to privacy, security, and data breaches, and those pertaining to ethical, legal, and jurisdictional matters. IoTs cover a broad range of proprietary hardware and software that often use different data formats, network or communication protocols, and physical interfaces resulting in technical challenges. IoT devices also work on the concept of ‘Big Data’ and lean on Artificial Intelligence (AI) and Machine Learning (ML) techniques and its algorithms, to process and perform analysis enabling data management for human consumption. These large quantities of data are often private and sensitive, travelling through “Cyberspace”, transferring data along the way. Disadvantageously, this creates a wider security attack surface for potential malicious activities to occur. With surveillance being the biggest challenge of Smart Cities, the “Big Brother is watching you” attitudes, and how that crosses over to the ethics involved in data collection is questioned. This chapter focuses on the challenges of these intelligent software’s and how the influence of the human element holds barriers to the security of IoTs. Perceptions of security and privacy concerning these devices are also discussed. The concept of “Cookies” used in IoTs, as a tracking tool for online web surfing and its safety measures, will also be shoehorned into this debate and how awareness should be raised around it. The impact of Covid-19 on businesses and relevance of IoTs in business continuity and disaster recovery will also be explored in the shift in work patterns from the office environment to working from home. Reports set out by technical advisory groups that contribute to understanding of IoTs will also be explored in its coping mechanisms in living alongside them. Anti-forensic methods, jurisdiction and service level agreements (SLAs) all further aggravate technical, privacy, security and legal challenges, and the presence of General Data Protection Regulation (GDPR) and its effects on IoTs and the human elements involved, will be further explored in understanding how to keep these devices safe and secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
‘Don’t go to 2020’ – Sound advice from Dublin’s newest Back to the Future mural. Available at: https://lovindublin.com/dublin/dont-go-to-2020-sound-advice-from-dublins-newest-back-to-the- future-mural (Accessed on 10 June 2021)
Role of Internet of Things (IoT) in Movies Blog Mallika Rangaiah Mar 26, 2020, Available at: https://www.analyticssteps.com/blogs/role-internet-things-iot-movies (Accessed on 10 June 2021)
www.mindbounce.com, Who Coined The Term ‘Cyberspace’? – MindBounce (n.d.) [online]. Available at: https://www.mindbounce.com/trivia/who-coined-the-term-cyberspace/ (Accessed 3 Aug 2022)
www.goodreads.com, A quote from Neuromancer (n.d.) [online]. Available at: https://www.goodreads.com/quotes/14638-cyberspace-a-consensual-hallucination-experienced-daily-by-billions-of-legitimate. (Accessed on 08.03.21)
The Sydney Morning Herald, Towards a consensual hallucination (2012) [online]. Available at: https://www.smh.com.au/technology/towards-a-consensual-hallucination-20120524-1z7d7.html. (Accessed on 09.03.21)
S.M. Biju, A. Mathew, Internet of Things (IoT): Securing the Next Frontier in Connectivity (2020)
J. Yarnold, P. Henman, C. McEwan, A. Radke, K. Hussey, As you enter your driverless vehicle, your Chatbot reminds you to pick up milk. Your milk can be traced through its supply chain back to the farm where a robot milked the cow. The milk contains genetically engineered enzymes that were designed by predictive computer software to improve your health. Welcome to now, or at least, very soon from now
D.E. O’Leary, ‘Big Data’, the ‘Internet of Things’, and the ‘Internet of Signs’. Intell. Syst. Account. Finance Manag. 20(1), 53–65 (2013)
M. Cox, D. Ellsworth, Managing Big Data for Scientific Visualization (ACM Siggraph, 1997)
Gartner, (2020). Available at: https://www.gartner.com/en/information-technology/glossary/big-data/ (Accessed on 10 June 2021)
K. Ashton, That ‘Internet of Things’ thing (2009). Available at: http://www.rfidjournal.com/article/view/4986 (Accessed on 10 June 2021)
P. Hernandez, App employs context for Big Dataanalytics efficiency, Enterprise Apps Today, 18 September, (2012). Available at: http://www.enterpriseappstoday.com/businessintelligence/app-employs-context-for-big- data-analyticsefficiency.html (Accessed on 10 June 2021)
What Is Machine Learning: Definition, Types, Applications and Examples, Available at: https://www.potentiaco.com/what-is-machine-learning-definition-typesapplications-and-examples/ (Accessed: 11 June 2021)
Robocop Machine Learning Expense Fraud. Available at: https://www.cbronline.com/emerging-technology/robo-cop-machine-learningexpense-fraud/ (no date) (Accessed: 11 June 2021)
G. Murtarelli, A. Gregory, S. Romenti, A conversation-based perspective for shaping ethical human–machine interactions: The particular challenge of chatbots. J. Bus. Res. (2020)
Top Cybersecurity facts figures and statistics. Available at: https://www.csoonline.com/article/3153707/topcybersecurity-facts-figures-and- statistics.html (Accessed: 11 June 2021)
J. Haney, Y. Acar, S. Furman, “ It’s the Company, the Government, You and I”: User perceptions of responsibility for smart home privacy and security, in 30th {USENIX} Security Symposium ({USENIX} Security 21), (2021)
S. Chatterjee, Factors impacting behavioral intention of users to adopt IoT in India: From security and privacy perspective. Int. J. Inf. Secur. Priv. 14(4), 92–112 (2020)
F.D. Davis, Technology acceptance model: TAM, in Information Seeking Behavior and Technology Adoption, ed. by M.N. Al-Suqri, A.S. Al-Aufi, (IGI Global, Hershey, 1989), pp. 205–219
P. Jayashankar, S. Nilakanta, W.J. Johnston, P. Gill, R. Burres, IoT adoption in agriculture: the role of trust, perceived value, and risk. J. Bus. Ind. Mark. (2018). https://doi.org/10.1108/JBIM-01-2018-0023
E.M. Rogers, Diffusion of innovations. Fourth edition (Free Press, New York, 1995)
M.N. Alraja, M.M.J. Farooque, B. Khashab, The effect of security, privacy, familiarity, and trust on users’ attitudes toward the use of the IoT-based healthcare: the mediation role of risk perception. IEEE Access 7, 111341–111354 (2019)
A. AlHogail, Improving IoT technology adoption through improving consumer trust. Technologies 6(3), 64 (2018)
K. Marky, A. Voit, A. Stöver, K. Kunze, S. Schröder, M. Mühlhäuser, “I don’t know how to protect myself”: Understanding privacy perceptions resulting from the presence of bystanders in smart environments, in Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, pp. 1–11 (2020, October)
A. Cahn, S. Alfeld, P. Barford, S. Muthukrishnan, An empirical study of web cookies, in Proceedings of the 25th International Conference on World Wide Web, pp. 891–901 (2016, April)
L. Narayanan, Cookies ‘n’consent: An empirical study on the factors influencing customer attitudes towards cookie consent among internet users in EU (Doctoral dissertation, Dublin Business School, 2020)
M.S. Ackerman, L.F. Cranor, J. Reagle, Privacy in e-commerce: examining user scenarios and privacy preferences, in Proceedings of the 1st ACM conference on Electronic commerce, pp. 1–8 (1999)
A.D. Miyazaki, Online privacy and the disclosure of cookie use: Effects on consumer trust and anticipated patronage. J. Public Policy Mark. 27(1), 19–33 (2008). https://doi.org/10.1509/jppm.27.1.19
A. McStay, I consent: An analysis of the Cookie Directive and its implications for UK behavioral advertising. New Media Soc. 15(4), 596–611 (2013). https://doi.org/10.1177/1461444812458434
S. Chapman, G.S. Dhillon, Privacy and the internet: The case of the DoubleClick, Inc., in Social Responsibility in the Information Age: Issues and Controversies, (IGI Global, 2002), pp. 75–88
Risk associated with cookies – Infosec Resources (infosecinstitute.com) (Accessed: 11 June 2021)
Accept All Cookies | Master of Media (uva.nl) (Accessed: 11 June 2021)
N. Rawindaran, A. Jayal, E. Prakash, Machine learning cybersecurity adoption in small and medium enterprises in developed countries. Computers 10, 150 (2021). https://doi.org/10.3390/computers10110150
Qualtrics [Online Software]: Provo, UT, USA. Available online: www.qualtrics.com (Accessed on 3 Mar 2020).
D.B. Allsop, J.M. Chelladurai, E.R. Kimball, L.D. Marks, J.J. Hendricks, Qualitative methods with Nvivo Software: A practical guide for analyzing qualitative data. Psych 4(2), 142–159 (2022)
C.W. Turner, M. Zavod, W. Yurcik, Factors that affect the perception of security and privacy of e-commerce web sites, in Fourth International Conference on Electronic Commerce Research, Dallas TX, pp. 628–636 (2001, November)
C.C. Carbon, Understanding human perception by human-made illusions. Front. Hum. Neurosci. 8, 566 (2014)
S. Zheng, N. Apthorpe, M. Chetty, N. Feamster, User perceptions of smart home IoT privacy, in Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), pp.1–20 (2018)
Broadband Internet Technical Advisory Group, Internet of Things (IoT) Security and Privacy Recommendations. Technical Report (2016)
BITAG History, (2016). Available at: https://bitag.org/ (Accessed: 12 June 2021)
M. Ziosi, B. Hewitt, P. Juneja, M. Taddeo, L. Floridi, Smart Cities: Mapping their Ethical Implications. Available at SSRN 4001761 (2022)
M. Sourbati, F. Behrendt, Smart mobility, age and data justice. New Media Soc. 23(6), 1398–1414 (2021). https://doi.org/10.1177/1461444820902682
T. Yigitcanlar, K. Desouza, L. Butler, F. Roozkhosh, Contributions and risks of artificial intelligence (AI) in building smarter cities: Insights from a systematic review of the literature. Energies 13, 1473 (2020). https://doi.org/10.3390/en13061473
K. Kirytopoulos, T. Christopoulos, E. Dermitzakis, Smart cities: Emerging risks and mitigation strategies, in Building on Smart Cities Skills and Competences, (Springer, Cham, 2022), pp. 123–139
J. Johnson, A. Hevia, R. Yergin, S. Karbassi, A. Levine, J. Ortiz, Data governance frameworks for smart cities: Key considerations for data management and use. J. Law Mobil. 2022(1), 1 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rawindaran, N. (2023). Legal Considerations and Ethical Challenges of Artificial Intelligence on Internet of Things and Smart Cities. In: Hewage, C., Rahulamathavan, Y., Ratnayake, D. (eds) Data Protection in a Post-Pandemic Society. Springer, Cham. https://doi.org/10.1007/978-3-031-34006-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-34006-2_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34005-5
Online ISBN: 978-3-031-34006-2
eBook Packages: Computer ScienceComputer Science (R0)