SlideShare a Scribd company logo
1 of 47
The Internet of Things & Wearable Technology:
An Overview of Key Issues & Policy Concerns
Adam Thierer
Senior Research Fellow
Mercatus Center at George Mason University
Last updated September 2015
Outline of Paper & Presentation
• Definitions
• Opportunities
• Key Policy Concerns (Technical vs. Social)
• A Deeper Dive on Privacy-Related Concerns
• Constructive Solutions
• A Word about Adaptation
• The Growing Conflict of Visions Ahead
2
Definitions
3
Definitions of IoT Evolving
• No consensus definition, but lots of catchphrases!
– “machine-to-machine” communication
– “Industrial Internet” (GE)
– “Internet of Everything” (Cisco)
– “ThingerNet” / “Thingerverse”
• “Smart” everything!
– “smart homes,” “smart buildings,” “smart appliances,”
“smart health,” “smart mobility,” “smart cities,” “smart
cars,” etc.
4
Best Definition of IoT
Morrison Foerster analysts define IoT as:
“the network of everyday physical objects which
surround us and that are increasingly being
embedded with technology to enable those objects
to collect and transmit data about their use and
surroundings.”
• More simply, it’s a world were the Internet is baked
into all our stuff!
5
Key Components of the IoT
• Power of IoT comes from combination of:
– Faster & smaller microprocessors
– Smaller & better sensors (& cameras)
– More ubiquitous & robust wireless networks
– Expanding cloud storage capacity
– Enhanced “big data” capabilities
• It’s the miniaturization of everything that matters
– both in terms of device size & cost
• = the long-desired “seamless web” of connectivity
now exists
6
Just How Connected?
• ABI Research: estimates that there are more than 10
billion wirelessly connected devices in the market
today and more than 35 billion devices expected by
2019
• Cisco: by 2019, 40 billion intelligent things will be
connected & communicating
• IDC: predicts far greater penetration of 212 billion
installed devices by 2020
7
8
The Economic Opportunity
9
Estimated Economic Impact of IoT
• McKinsey Global: $3.9 trillion to $11.1 trillion
potential economic impact per year by 2025
• IDC: compound annual growth rate of 7.9%
between now & 2020, to reach $8.9 trillion
• Cisco: IoT will create $14.4 trillion in value
between 2013 and 2022
10
11
Many Subsectors, Many Players
12
13
“Wearables” = Most
Important IoT Category
• = IoT that is worn on body
• “quantified self” movement growing
• Unsightly today (think “Google Glass”), but
will literally be sewn into our clothes in future
(“sensor-rich fabrics”) & largely invisible
• Becoming “lifestyle remotes” to automate our
lives
14
15
Sectors & Professions That Will Be
Transformed by Wearable Tech
• Health Care / Surgery
• Firefighting
• Law enforcement
• Political campaigns
• Education / Instruction
• Retailing
• Entertainment
• Theme parks
• Airlines & vacationing
• Financial Services
• Sports / Athletics
16
Health & Fitness Are
Major Drivers
Typology of Mobile Health Technologies
• Connectors: applications that connect smartphones and tablets to FDA-regulated
devices, thus amplifying the devices’ functionalities.
• Replicators: applications that turn a smartphone or tablet itself into a medical device by
replicating the functionality of an FDA-regulated device.
• Automators & Customizers: apps which use questionnaires, algorithms, formulae,
medical calculators, or other software parameters to aid clinical decisions.
• Informers & Educators: medical reference texts and educational apps that primarily aim
to inform and educate.
• Administrators: apps that automate office functions, like identifying appropriate
insurance billing codes or scheduling patient appointments.
• Loggers & Trackers: apps that allows users to log, record, and make decisions about
their general health and wellness.
Source: Nathan Cortez, SMU School of Law
17
Wearable Market Growth
• Canalys: 700% growth in wearable smart bands
market in the second half of 2013
• IDC: shipment volumes will exceed 19 million units in
2014, 3x prior year
• IDC: global market will swell to 112 million units in
2018, resulting in a CAGR of 78%
• + major smartphone platforms providers (Apple,
Google, Microsoft, Samsung) all competing
aggressively here
18
The “Sci-Fi” Future of IoT & Wearables
Will Arrive Shortly
• “Implantables” = IoT implanted under skin
• “Ingestibles” = IoT tech that is swallowed
• “Biohacking”= Body modification to enhance
or repair human abilities
– see: http://discuss.biohack.me
19
Policy Concerns:
Technical vs. Social
20
Technical Issues
• Access to adequate spectrum to facilitate wireless
networking capabilities?
• Technical standards
– Wi-Fi, Bluetooth, near field communication, GPS
– Licensed or unlicensed ?
• Device / platform interoperability
– Apple vs. Android vs. what else?
• Device addressing
– Will rise of IoT & wearables get IPv6 transition moving?
21
Quick Note on Technical Issues
• Technical issues were not focus of this
particular paper
• That is primarily because I am actually far
more optimistic we can work those issues out
relative to…
22
Social Concerns
(in order of current severity)
• Security
• Privacy
– reputational issues
– “discrimination” issues
– data ownership
• Safety
• Automation fears & other ethical objections
– “cyborg” concerns
23
Regulatory Interest Growing
Policymakers Already Exploring IoT Tech
• FTC (general privacy & security)
• FDA (safety of mobile medical apps & devices)
• FCC (wireless issues)
• FAA (commercial drones)
• NHTSA (intelligent vehicle technology)
• NTIA (multistakeholder privacy reviews)
• Congress
• Various state, local & int’l regulators (esp. in EU)
24
A Deeper Dive on
Privacy & Security Concerns
25
The Coming Data Deluge
• Amount of data generated & collected online today
pales in comparison to what is coming
• Recall estimates of 30+ billion devices by 2020
• And recall defining realities of IoT & wearable tech:
– always-on
– always-sensing
– always-collecting
– always-communicating
• The IoT is, at once, a massive data generator & giant
data vacuum cleaner
26
Ramifications for Modern Privacy
& Security Policies
• “fair information practice principles” (FIPPs)
will be hard to strictly apply & enforce
• FTC Chairwoman Ramirez:
“the difficulties will be exponentially greater with
the advent of the Internet of Things, as the
boundaries between the virtual and physical
worlds disappear.”
27
How IoT Challenges FIPPS
• What is “adequate notice” in an always-on, always-sensing
world of billions of micro devices?
• What counts as “consent” in a world of peer-to-peer self-
surveillance?
– Ex: How do you get consent when using Google Glass or a “Narrative”
clip-on camera?
• Transparency: How to post privacy policies when everything is
so small?
• What counts as “respect for context” when everything is
being collected?
• How does data minimization work for “always on” IoT &
wearables
28
IoT Also Challenges…
• Health Insurance Portability and
Accountability Act (HIPAA)
• COPPA & FERPA (kids & education privacy)
• GLB financial privacy
• State privacy & data security laws
• FDA safety standards
• + wide variety of workplace issues
29
Will a Move to Use-Based
Restrictions Save the Day?
• Going to be very hard to limit collection, so a move to
use-based restrictions seems likely
• But which uses?
– “discriminatory” uses (how defined?)
– are existing discrimination statutes applicable?
• What about database access / correction?
– think FCRA
• Problem of overly sweeping use restrictions
– “privacy paternalism”?
30
Query: What about the First Amendment?
• First Amendment likely poses serious roadblock to
more comprehensive regulation of IoT & wearables
• Volokh: “We already have a code of ‘fair information
practices,’ and it is the First Amendment”
• ACLU of Illinois v. Alvarez (2012):
– “The act of making an audio or audiovisual recording is
necessarily included within the First Amendment’s
guarantee of speech and press rights as a corollary of the
right to disseminate the resulting recording.”
• 1A might limit both collection & use-based
restrictions
31
Constructive Solutions
32
A “Layered” Approach to Address Concerns
1) Developers: Privacy & security “by design” / best practices
2) Consumers: Education, media literacy & tech etiquette
3) Social norms, pressure & sanctions will play big role
– ex: restrictions on phones in theaters & locker rooms
4) Common law adjudication / other legal standards
– privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws
– Products liability: strict liability / negligence, design defects law, failure to
warn, breach of warranty, etc
5) FTC (Section 5) “unfair & deceptive practices”
6) Targeted data use restrictions for sensitive classes of info
– note: existing discrimination statutes might cover some issues
33
Developer-Side Solutions
Elements of Privacy / Security by Design
• Better security through encryption,
anonymization / data “de-identification”
• Rolling security notices / updates / upgrades
• Proper use guidelines
• Better transparency re: data use/sharing
policies
• Data minimization when possible
• Simpler UI
34
Consumer-Side Education
• Media literacy / digital citizenship /
“netiquette”
• Government can be active here w/o fear of
First Amendment
– PSAs / general awareness-building efforts
• ex: OnGuardOnline.gov
– Classroom lessons
• Privacy curriculum (see Fordham CLIP model)
35
Liability Norms Could Evolve
• Who is “least-cost avoider” who assumes liability?
• As developer knowledge of potential misuses grows,
liability could shift, too
– Ex: Driverless cars & insurance as cars become a service
• But will liability norms need a nudge in that
direction? …
• … or, will IoT developers need protection from over-
eager tort lawyers!
• Bottom line: Let product liability evolve; it has
happened many times before w/ other tech.
36
FTC Role Will Continue
Recent FTC Privacy & Security Enforcement Actions
• Google
• Facebook
• Apple
• Twitter
• MySpace
• HTC
• Lookout
• Path
• Snapchat
• Fandango
• Credit Karma
• TrendNet
37
 53 data security-related cases recently
 20-year privacy audits for some firms + fines
 = is this an “FTC common law” of IoT privacy & security?
A Word about Social
Adaptation
38
What Was True Before…
• Citizen attitudes about emerging technologies
follow a familiar cycle:
1. initial resistance (“technopanic” phase)
2. gradual adaptation
3. eventual assimilation
• we have seen this cycle play out in countless
other contexts
39
First We Panic, Then…
• Recall reaction to camera & photography in late 1800’s…
“Instantaneous photographs and newspaper enterprise have invaded
the sacred precincts of private and domestic life; and numerous
mechanical devices threaten to make good the prediction that ‘what is
whispered in the closet shall be proclaimed from the house-tops.’”
— Samuel D. Warren and Louis D. Brandeis, 1890
• But we got through it! We adjusted our societal norms and
personal expectations to accommodate photography.
• Instead of rejecting cameras, we bought a lot of them! (But
then learned how to use them respectfully, too.)
40
Key Takeaways
• There is no end point in debates about data security
& online privacy; a never-ending challenge
• IoT & wearables merely extend & exacerbate
problems we already faced in Web 1.0 & 2.0 world
• silver bullet solutions don’t exist (never have, never
will)
• Need to find creative ways to adapt to each new set
of challenges
– individuals, institutions, law & norms all must adapt
– patience & humility will be crucial policy virtues
41
The Grand Tech Policy Clash of
Visions to Come
42
IoT and
Future Tech
Flashpoints
Internet of Things
• Wearable Tech
• Smart Homes
• Smart Cities
Health Issues
• Medical Devices
• Biohacking
• Embeddables
• Genetic issues
• Mobile medical apps
• Telemedicine
3-D Printing
Robotics
• Smart cars
• Private drones
• A.I.
Which Vision Will Govern?
IoT foreshadows many other debates about
emerging tech. The choice:
• Permissionless Innovation = the general
freedom to experiment & learn through trial-
and-error experimentation.
• Precautionary Principle = Crafting public
policies to control or limit new innovations
until their creators can prove that they won’t
cause any harms.
44
The Heart of the Debate
Which Default for Innovation?
45
Precautionary Principle Permissionless Innovation
risk anticipation risk adaptation
Ex ante enforcement Ex post enforcement
Preemptive
top-down controls
Reactive
bottom-up remedies
Innovators have to ask,
“Mother, May I?”
Innovation is “innocent
until proven guilty”
A Range of Responses to Technological Risk
Prohibition
Censorship
Info suppression
Product bans
Anticipatory
Regulation
Administrative mandates
Restrictive defaults
Licensing & permits
Industry guidance
Resiliency
Education & Media Literacy
Labeling / Transparency
User empowerment
Self-regulation
Adaptation
Experience / Experiments
Learning / Coping
Social norms & pressure
Top-down
Solutions
Bottom-up
Solutions
Precautionary Principle
Permissionless Innovation
46
Related Mercatus Center Research
• Book: Permissionless Innovation: The Continuing Case for Comprehensive
Technological Freedom
• Testimony: The Connected World: Examining the Internet of Things
• Analysis: Projecting the Growth and Economic Impact of the Internet of Things
• Law review article: The Internet of Things and Wearable Technology:
Addressing Privacy and Security Concerns without Derailing Innovation
• Oped: How Not to Strangle the Internet of Things
• Filing to FTC on Privacy and Security Implications of the Internet of Things
• Law review article: Technopanics, Threat Inflation, and the Danger of an
Information Technology Precautionary Principle
• Article: Muddling Through: How We Learn to Cope with Technological Change
47

More Related Content

What's hot

Future of Wearable Tech Report
Future of Wearable Tech ReportFuture of Wearable Tech Report
Future of Wearable Tech ReportIntel iQ
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralphralphlu
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoTFarjad Noor
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-pptSonalSharnam
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017paul young cpa, cga
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETKaren Rose
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingMatt Turck
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaIEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaAndy Shutka
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)sameergupta85
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointDr. Mazlan Abbas
 

What's hot (20)

Future of Wearable Tech Report
Future of Wearable Tech ReportFuture of Wearable Tech Report
Future of Wearable Tech Report
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Internet of Things - Lu, Ralph
Internet of Things - Lu, RalphInternet of Things - Lu, Ralph
Internet of Things - Lu, Ralph
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoT
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
Internet of Things Webinar
Internet of Things WebinarInternet of Things Webinar
Internet of Things Webinar
 
Iot
IotIot
Iot
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
Sensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the MakingSensors, Wearables and the Internet of Things: A Revolution in the Making
Sensors, Wearables and the Internet of Things: A Revolution in the Making
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfuaIEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
IEEE Internet of Things (IoT) Initiative in Ukraine #iotconfua
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 

Viewers also liked

Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology DesignJeffrey Funk
 
Introduction to Wearable Technology for Creatives
Introduction to Wearable Technology for CreativesIntroduction to Wearable Technology for Creatives
Introduction to Wearable Technology for CreativesRain Ashford
 
Wearable Technology - Learning, Connecting, Monitoring and Posing
Wearable Technology - Learning, Connecting, Monitoring and Posing Wearable Technology - Learning, Connecting, Monitoring and Posing
Wearable Technology - Learning, Connecting, Monitoring and Posing Seymourpowell
 
Wearable Technology Part 1 Blue Paper
Wearable Technology Part 1 Blue Paper Wearable Technology Part 1 Blue Paper
Wearable Technology Part 1 Blue Paper 4imprint
 
Wearable Technology - A perspective on experience
Wearable Technology - A perspective on experienceWearable Technology - A perspective on experience
Wearable Technology - A perspective on experiencePerry Chan
 
Wearing your heart on your sleeve: a wearable computing primer (of sorts)
Wearing your heart on your sleeve: a wearable computing primer (of sorts)Wearing your heart on your sleeve: a wearable computing primer (of sorts)
Wearing your heart on your sleeve: a wearable computing primer (of sorts)Alejandro Zamudio
 
The Future of Wearables
The Future of WearablesThe Future of Wearables
The Future of WearablesEllen Noh
 
Introduction to Wearable Technology
Introduction to Wearable TechnologyIntroduction to Wearable Technology
Introduction to Wearable TechnologyRain Ashford
 
Overview of Wearable Technology
Overview of Wearable TechnologyOverview of Wearable Technology
Overview of Wearable TechnologyAditi Rustagi
 
New Opportunities with Wearable Technology
New Opportunities with Wearable TechnologyNew Opportunities with Wearable Technology
New Opportunities with Wearable TechnologyMatthew Morey
 
The Future of Wearable Technology
The Future of Wearable Technology The Future of Wearable Technology
The Future of Wearable Technology Jeff Valdez
 
Wearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionWearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionJoshua Murdock
 
Wearable Technology Sep 2013
Wearable Technology Sep 2013Wearable Technology Sep 2013
Wearable Technology Sep 2013Vasily Ryzhonkov
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALgeorgekurianpottackal
 

Viewers also liked (20)

Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology Design
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
Introduction to Wearable Technology for Creatives
Introduction to Wearable Technology for CreativesIntroduction to Wearable Technology for Creatives
Introduction to Wearable Technology for Creatives
 
Wearable Technology - Learning, Connecting, Monitoring and Posing
Wearable Technology - Learning, Connecting, Monitoring and Posing Wearable Technology - Learning, Connecting, Monitoring and Posing
Wearable Technology - Learning, Connecting, Monitoring and Posing
 
Wearable Technology Part 1 Blue Paper
Wearable Technology Part 1 Blue Paper Wearable Technology Part 1 Blue Paper
Wearable Technology Part 1 Blue Paper
 
Wearable Technology - A perspective on experience
Wearable Technology - A perspective on experienceWearable Technology - A perspective on experience
Wearable Technology - A perspective on experience
 
Wearing your heart on your sleeve: a wearable computing primer (of sorts)
Wearing your heart on your sleeve: a wearable computing primer (of sorts)Wearing your heart on your sleeve: a wearable computing primer (of sorts)
Wearing your heart on your sleeve: a wearable computing primer (of sorts)
 
WHERE IS WEARABLE TECHNOLOGY GOING?
WHERE IS WEARABLE TECHNOLOGY GOING?WHERE IS WEARABLE TECHNOLOGY GOING?
WHERE IS WEARABLE TECHNOLOGY GOING?
 
The Future of Wearables
The Future of WearablesThe Future of Wearables
The Future of Wearables
 
Introduction to Wearable Technology
Introduction to Wearable TechnologyIntroduction to Wearable Technology
Introduction to Wearable Technology
 
History
HistoryHistory
History
 
Overview of Wearable Technology
Overview of Wearable TechnologyOverview of Wearable Technology
Overview of Wearable Technology
 
Wearable technology
Wearable technologyWearable technology
Wearable technology
 
New Opportunities with Wearable Technology
New Opportunities with Wearable TechnologyNew Opportunities with Wearable Technology
New Opportunities with Wearable Technology
 
The Future of Wearable Technology
The Future of Wearable Technology The Future of Wearable Technology
The Future of Wearable Technology
 
Wearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science FictionWearable Technology: Separating Fact from Science Fiction
Wearable Technology: Separating Fact from Science Fiction
 
Wearable Technology Sep 2013
Wearable Technology Sep 2013Wearable Technology Sep 2013
Wearable Technology Sep 2013
 
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKALAll about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
All about WEARABLE TECHNOLOGY...By..GEORGE KURIAN POTTACKAL
 
Wearable Technology
Wearable TechnologyWearable Technology
Wearable Technology
 
wearable technology
 wearable technology wearable technology
wearable technology
 

Similar to Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation

[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfImXaib
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design360mnbsu
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptMuhammadHashamKhanBI
 
Towards a Responsible Internet of Things
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of ThingsJeff Katz
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115Devaraj Sl
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 

Similar to Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation (20)

[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 
Towards a Responsible Internet of Things
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of Things
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115The criticality-of-security-in-the-internet-of-things joa-eng_1115
The criticality-of-security-in-the-internet-of-things joa-eng_1115
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
The connected utility
The connected utilityThe connected utility
The connected utility
 

More from Adam Thierer

Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesAdam Thierer
 
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...Adam Thierer
 
The War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyThe War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyAdam Thierer
 
Cronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and SolutionsCronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and SolutionsAdam Thierer
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
 
Who Needs Parental Controls (Adam Thierer Pff)
Who Needs Parental Controls (Adam Thierer   Pff)Who Needs Parental Controls (Adam Thierer   Pff)
Who Needs Parental Controls (Adam Thierer Pff)Adam Thierer
 
First Amendment Twilight Zone (Adam Thierer Pff)
First Amendment Twilight Zone (Adam Thierer   Pff)First Amendment Twilight Zone (Adam Thierer   Pff)
First Amendment Twilight Zone (Adam Thierer Pff)Adam Thierer
 
Video Games Presentation At Penn State Univ (Adam Thierer Pff)
Video Games Presentation At Penn State Univ (Adam Thierer   Pff)Video Games Presentation At Penn State Univ (Adam Thierer   Pff)
Video Games Presentation At Penn State Univ (Adam Thierer Pff)Adam Thierer
 

More from Adam Thierer (8)

Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
The Challenge of Benefit-Cost Analysis As Applied to Online Safety & Digital ...
 
The War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital EconomyThe War on Vertical Integration in the Digital Economy
The War on Vertical Integration in the Digital Economy
 
Cronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and SolutionsCronyism: History, Costs, Case Studies and Solutions
Cronyism: History, Costs, Case Studies and Solutions
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
Who Needs Parental Controls (Adam Thierer Pff)
Who Needs Parental Controls (Adam Thierer   Pff)Who Needs Parental Controls (Adam Thierer   Pff)
Who Needs Parental Controls (Adam Thierer Pff)
 
First Amendment Twilight Zone (Adam Thierer Pff)
First Amendment Twilight Zone (Adam Thierer   Pff)First Amendment Twilight Zone (Adam Thierer   Pff)
First Amendment Twilight Zone (Adam Thierer Pff)
 
Video Games Presentation At Penn State Univ (Adam Thierer Pff)
Video Games Presentation At Penn State Univ (Adam Thierer   Pff)Video Games Presentation At Penn State Univ (Adam Thierer   Pff)
Video Games Presentation At Penn State Univ (Adam Thierer Pff)
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 

Recently uploaded (20)

Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 

Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation

  • 1. The Internet of Things & Wearable Technology: An Overview of Key Issues & Policy Concerns Adam Thierer Senior Research Fellow Mercatus Center at George Mason University Last updated September 2015
  • 2. Outline of Paper & Presentation • Definitions • Opportunities • Key Policy Concerns (Technical vs. Social) • A Deeper Dive on Privacy-Related Concerns • Constructive Solutions • A Word about Adaptation • The Growing Conflict of Visions Ahead 2
  • 4. Definitions of IoT Evolving • No consensus definition, but lots of catchphrases! – “machine-to-machine” communication – “Industrial Internet” (GE) – “Internet of Everything” (Cisco) – “ThingerNet” / “Thingerverse” • “Smart” everything! – “smart homes,” “smart buildings,” “smart appliances,” “smart health,” “smart mobility,” “smart cities,” “smart cars,” etc. 4
  • 5. Best Definition of IoT Morrison Foerster analysts define IoT as: “the network of everyday physical objects which surround us and that are increasingly being embedded with technology to enable those objects to collect and transmit data about their use and surroundings.” • More simply, it’s a world were the Internet is baked into all our stuff! 5
  • 6. Key Components of the IoT • Power of IoT comes from combination of: – Faster & smaller microprocessors – Smaller & better sensors (& cameras) – More ubiquitous & robust wireless networks – Expanding cloud storage capacity – Enhanced “big data” capabilities • It’s the miniaturization of everything that matters – both in terms of device size & cost • = the long-desired “seamless web” of connectivity now exists 6
  • 7. Just How Connected? • ABI Research: estimates that there are more than 10 billion wirelessly connected devices in the market today and more than 35 billion devices expected by 2019 • Cisco: by 2019, 40 billion intelligent things will be connected & communicating • IDC: predicts far greater penetration of 212 billion installed devices by 2020 7
  • 8. 8
  • 10. Estimated Economic Impact of IoT • McKinsey Global: $3.9 trillion to $11.1 trillion potential economic impact per year by 2025 • IDC: compound annual growth rate of 7.9% between now & 2020, to reach $8.9 trillion • Cisco: IoT will create $14.4 trillion in value between 2013 and 2022 10
  • 11. 11
  • 12. Many Subsectors, Many Players 12
  • 13. 13
  • 14. “Wearables” = Most Important IoT Category • = IoT that is worn on body • “quantified self” movement growing • Unsightly today (think “Google Glass”), but will literally be sewn into our clothes in future (“sensor-rich fabrics”) & largely invisible • Becoming “lifestyle remotes” to automate our lives 14
  • 15. 15
  • 16. Sectors & Professions That Will Be Transformed by Wearable Tech • Health Care / Surgery • Firefighting • Law enforcement • Political campaigns • Education / Instruction • Retailing • Entertainment • Theme parks • Airlines & vacationing • Financial Services • Sports / Athletics 16
  • 17. Health & Fitness Are Major Drivers Typology of Mobile Health Technologies • Connectors: applications that connect smartphones and tablets to FDA-regulated devices, thus amplifying the devices’ functionalities. • Replicators: applications that turn a smartphone or tablet itself into a medical device by replicating the functionality of an FDA-regulated device. • Automators & Customizers: apps which use questionnaires, algorithms, formulae, medical calculators, or other software parameters to aid clinical decisions. • Informers & Educators: medical reference texts and educational apps that primarily aim to inform and educate. • Administrators: apps that automate office functions, like identifying appropriate insurance billing codes or scheduling patient appointments. • Loggers & Trackers: apps that allows users to log, record, and make decisions about their general health and wellness. Source: Nathan Cortez, SMU School of Law 17
  • 18. Wearable Market Growth • Canalys: 700% growth in wearable smart bands market in the second half of 2013 • IDC: shipment volumes will exceed 19 million units in 2014, 3x prior year • IDC: global market will swell to 112 million units in 2018, resulting in a CAGR of 78% • + major smartphone platforms providers (Apple, Google, Microsoft, Samsung) all competing aggressively here 18
  • 19. The “Sci-Fi” Future of IoT & Wearables Will Arrive Shortly • “Implantables” = IoT implanted under skin • “Ingestibles” = IoT tech that is swallowed • “Biohacking”= Body modification to enhance or repair human abilities – see: http://discuss.biohack.me 19
  • 21. Technical Issues • Access to adequate spectrum to facilitate wireless networking capabilities? • Technical standards – Wi-Fi, Bluetooth, near field communication, GPS – Licensed or unlicensed ? • Device / platform interoperability – Apple vs. Android vs. what else? • Device addressing – Will rise of IoT & wearables get IPv6 transition moving? 21
  • 22. Quick Note on Technical Issues • Technical issues were not focus of this particular paper • That is primarily because I am actually far more optimistic we can work those issues out relative to… 22
  • 23. Social Concerns (in order of current severity) • Security • Privacy – reputational issues – “discrimination” issues – data ownership • Safety • Automation fears & other ethical objections – “cyborg” concerns 23
  • 24. Regulatory Interest Growing Policymakers Already Exploring IoT Tech • FTC (general privacy & security) • FDA (safety of mobile medical apps & devices) • FCC (wireless issues) • FAA (commercial drones) • NHTSA (intelligent vehicle technology) • NTIA (multistakeholder privacy reviews) • Congress • Various state, local & int’l regulators (esp. in EU) 24
  • 25. A Deeper Dive on Privacy & Security Concerns 25
  • 26. The Coming Data Deluge • Amount of data generated & collected online today pales in comparison to what is coming • Recall estimates of 30+ billion devices by 2020 • And recall defining realities of IoT & wearable tech: – always-on – always-sensing – always-collecting – always-communicating • The IoT is, at once, a massive data generator & giant data vacuum cleaner 26
  • 27. Ramifications for Modern Privacy & Security Policies • “fair information practice principles” (FIPPs) will be hard to strictly apply & enforce • FTC Chairwoman Ramirez: “the difficulties will be exponentially greater with the advent of the Internet of Things, as the boundaries between the virtual and physical worlds disappear.” 27
  • 28. How IoT Challenges FIPPS • What is “adequate notice” in an always-on, always-sensing world of billions of micro devices? • What counts as “consent” in a world of peer-to-peer self- surveillance? – Ex: How do you get consent when using Google Glass or a “Narrative” clip-on camera? • Transparency: How to post privacy policies when everything is so small? • What counts as “respect for context” when everything is being collected? • How does data minimization work for “always on” IoT & wearables 28
  • 29. IoT Also Challenges… • Health Insurance Portability and Accountability Act (HIPAA) • COPPA & FERPA (kids & education privacy) • GLB financial privacy • State privacy & data security laws • FDA safety standards • + wide variety of workplace issues 29
  • 30. Will a Move to Use-Based Restrictions Save the Day? • Going to be very hard to limit collection, so a move to use-based restrictions seems likely • But which uses? – “discriminatory” uses (how defined?) – are existing discrimination statutes applicable? • What about database access / correction? – think FCRA • Problem of overly sweeping use restrictions – “privacy paternalism”? 30
  • 31. Query: What about the First Amendment? • First Amendment likely poses serious roadblock to more comprehensive regulation of IoT & wearables • Volokh: “We already have a code of ‘fair information practices,’ and it is the First Amendment” • ACLU of Illinois v. Alvarez (2012): – “The act of making an audio or audiovisual recording is necessarily included within the First Amendment’s guarantee of speech and press rights as a corollary of the right to disseminate the resulting recording.” • 1A might limit both collection & use-based restrictions 31
  • 33. A “Layered” Approach to Address Concerns 1) Developers: Privacy & security “by design” / best practices 2) Consumers: Education, media literacy & tech etiquette 3) Social norms, pressure & sanctions will play big role – ex: restrictions on phones in theaters & locker rooms 4) Common law adjudication / other legal standards – privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws – Products liability: strict liability / negligence, design defects law, failure to warn, breach of warranty, etc 5) FTC (Section 5) “unfair & deceptive practices” 6) Targeted data use restrictions for sensitive classes of info – note: existing discrimination statutes might cover some issues 33
  • 34. Developer-Side Solutions Elements of Privacy / Security by Design • Better security through encryption, anonymization / data “de-identification” • Rolling security notices / updates / upgrades • Proper use guidelines • Better transparency re: data use/sharing policies • Data minimization when possible • Simpler UI 34
  • 35. Consumer-Side Education • Media literacy / digital citizenship / “netiquette” • Government can be active here w/o fear of First Amendment – PSAs / general awareness-building efforts • ex: OnGuardOnline.gov – Classroom lessons • Privacy curriculum (see Fordham CLIP model) 35
  • 36. Liability Norms Could Evolve • Who is “least-cost avoider” who assumes liability? • As developer knowledge of potential misuses grows, liability could shift, too – Ex: Driverless cars & insurance as cars become a service • But will liability norms need a nudge in that direction? … • … or, will IoT developers need protection from over- eager tort lawyers! • Bottom line: Let product liability evolve; it has happened many times before w/ other tech. 36
  • 37. FTC Role Will Continue Recent FTC Privacy & Security Enforcement Actions • Google • Facebook • Apple • Twitter • MySpace • HTC • Lookout • Path • Snapchat • Fandango • Credit Karma • TrendNet 37  53 data security-related cases recently  20-year privacy audits for some firms + fines  = is this an “FTC common law” of IoT privacy & security?
  • 38. A Word about Social Adaptation 38
  • 39. What Was True Before… • Citizen attitudes about emerging technologies follow a familiar cycle: 1. initial resistance (“technopanic” phase) 2. gradual adaptation 3. eventual assimilation • we have seen this cycle play out in countless other contexts 39
  • 40. First We Panic, Then… • Recall reaction to camera & photography in late 1800’s… “Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’” — Samuel D. Warren and Louis D. Brandeis, 1890 • But we got through it! We adjusted our societal norms and personal expectations to accommodate photography. • Instead of rejecting cameras, we bought a lot of them! (But then learned how to use them respectfully, too.) 40
  • 41. Key Takeaways • There is no end point in debates about data security & online privacy; a never-ending challenge • IoT & wearables merely extend & exacerbate problems we already faced in Web 1.0 & 2.0 world • silver bullet solutions don’t exist (never have, never will) • Need to find creative ways to adapt to each new set of challenges – individuals, institutions, law & norms all must adapt – patience & humility will be crucial policy virtues 41
  • 42. The Grand Tech Policy Clash of Visions to Come 42
  • 43. IoT and Future Tech Flashpoints Internet of Things • Wearable Tech • Smart Homes • Smart Cities Health Issues • Medical Devices • Biohacking • Embeddables • Genetic issues • Mobile medical apps • Telemedicine 3-D Printing Robotics • Smart cars • Private drones • A.I.
  • 44. Which Vision Will Govern? IoT foreshadows many other debates about emerging tech. The choice: • Permissionless Innovation = the general freedom to experiment & learn through trial- and-error experimentation. • Precautionary Principle = Crafting public policies to control or limit new innovations until their creators can prove that they won’t cause any harms. 44
  • 45. The Heart of the Debate Which Default for Innovation? 45 Precautionary Principle Permissionless Innovation risk anticipation risk adaptation Ex ante enforcement Ex post enforcement Preemptive top-down controls Reactive bottom-up remedies Innovators have to ask, “Mother, May I?” Innovation is “innocent until proven guilty”
  • 46. A Range of Responses to Technological Risk Prohibition Censorship Info suppression Product bans Anticipatory Regulation Administrative mandates Restrictive defaults Licensing & permits Industry guidance Resiliency Education & Media Literacy Labeling / Transparency User empowerment Self-regulation Adaptation Experience / Experiments Learning / Coping Social norms & pressure Top-down Solutions Bottom-up Solutions Precautionary Principle Permissionless Innovation 46
  • 47. Related Mercatus Center Research • Book: Permissionless Innovation: The Continuing Case for Comprehensive Technological Freedom • Testimony: The Connected World: Examining the Internet of Things • Analysis: Projecting the Growth and Economic Impact of the Internet of Things • Law review article: The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation • Oped: How Not to Strangle the Internet of Things • Filing to FTC on Privacy and Security Implications of the Internet of Things • Law review article: Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle • Article: Muddling Through: How We Learn to Cope with Technological Change 47