Personal Perspectives: Individual Privacy in the IOT

Abstract

The Internet of Things (IOT) is the extension of the Internet to the next level, i.e., bringing the Internet to the real physical world of things. In this research, 22 people working with different aspects of IOT development were interviewed in Finland and in China, in order to investigate their thoughts and personal opinions on the IOT and the individual privacy in the IOT. This paper presents the background of the IOT, interviews and collected answers, as well as highlights of collected free comments.

Share and Cite:

J. Virkki and L. Chen, "Personal Perspectives: Individual Privacy in the IOT," Advances in Internet of Things, Vol. 3 No. 2, 2013, pp. 21-26. doi: 10.4236/ait.2013.32003.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Libelium, “50 Internet of Things Applications,” 2012. http://www.libelium.com/top_50_iot_sensor_applications_ranking
[2] The Strategic Centre for Science, “Technology and Innovation in the Field of ICT, Internet of Things Strategic Research Agenda.” http://www.Internetofthings.fi/
[3] Futuretech Alert, “Technology Convergence Leading to the Internet of Things,” Frost & Sullivan, Mountain View, 2012.
[4] “The Internet of Things 2012—New Horizons-Cluster Book,” 2012. http://www.Internet-of-things-research.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf
[5] European Commission, Information Society and Media, “Internet of Things in 2020 Roadmap for the Future,” 2008. http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_ V1-1.pdf
[6] L. Wu and P. Shao, “Research on the Protection Algorithm and Model of Personal Privacy Information in Internet of Thing,” International Conference on E-Business and E-Government, Guiyang, 6-8 May 2011, pp. 1-4.
[7] H. Feng and W. Fu, “Study of Recent Development about Privacy and Security of the Internet of Things,” International Conference on Web Information Systems and Mining, Beijing, 23-24 October 2010, pp. 91-95.
[8] D. Gessner, A. Olivereau, A. S. Segura and A. Serbanati, “Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of Things,” International Conference on Trust, Security and Privacy in Computing and Communications, Heidelberg, 25-27 June 2012, pp. 998-1003.
[9] V. Oleshchuk, “Internet of Things and Privacy Preserving Technologies,” International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Grimstad, 17-20 May 2009, pp. 336-340.
[10] International Telecommunication Union, “The Internet of Things, Executive Summary.” http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf
[11] D. J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review, Vol. 154, No. 3, 2006, p. 477. doi:10.2307/40041279
[12] T. Kowatsch and W. Maass, “Privacy Concerns and Acceptance of IoT Services,” Internet of Things Intitiative, 2012, pp. 176-187.
[13] E. K. Choe, S. Consolvo, J. Jung, B. Harrison and J. A. Kientz, “Living in a Glass House: A Survey of Private Moments in the Home,” Proceedings of the 13th International Conference on Ubiquitous Computing, Beijing, 17-21 September 2011, pp. 41-44.
[14] Y. Wang, G. Norcie and L. F. Cranor “Who Is Concerned about What? A Study of American, Chinese and Indian Users Privacy Concerns on Social Network Sites,” International Conference on Trust & Trustworthy Computing, Vol. 6740, 2011, pp. 146-153.
[15] D. J. Solove, “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy,” San Diego Law Review, Vol. 44, 2007, p. 74

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.