{"title":"私隐及保安","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8552484","DOIUrl":null,"url":null,"abstract":"This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Privacy and Security\",\"authors\":\"Erin E. Kenneally\",\"doi\":\"10.1109/MIOT.2018.8552484\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.\",\"PeriodicalId\":409551,\"journal\":{\"name\":\"IEEE Internet Things Mag.\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet Things Mag.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MIOT.2018.8552484\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet Things Mag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MIOT.2018.8552484","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.