This document summarizes a presentation given by Adam Thierer on the Internet of Things (IoT) and wearable technology. It discusses:
- Definitions of the IoT and its key components, including sensors, wireless networks, data storage, and analytics capabilities.
- The large number of connected devices expected by 2020, and the economic opportunities of the IoT. Health and fitness are major drivers.
- Privacy and security as the most significant social policy concerns raised by the IoT. The IoT challenges traditional privacy frameworks due to its always-on data collection capabilities.
- Constructive solutions like privacy by design, consumer education, and allowing legal and social norms to adapt over time in
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
Keynote talk for VL/HCC 2018. I talk about why developers should care about privacy, what privacy is and why it is hard, some of our group's research in building better tools to help developers (in particular, Coconut IDE Plug-in and PrivacyStreams), and lastly some frameworks for thinking about privacy and developers.
The Internet of Things is coming... and if it stays how it is today, it will be a complete nightmare when it arrives. Different groups are attempting to address the shortcomings, but they all suffer from various shortcomings.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
Keynote talk for VL/HCC 2018. I talk about why developers should care about privacy, what privacy is and why it is hard, some of our group's research in building better tools to help developers (in particular, Coconut IDE Plug-in and PrivacyStreams), and lastly some frameworks for thinking about privacy and developers.
The Internet of Things is coming... and if it stays how it is today, it will be a complete nightmare when it arrives. Different groups are attempting to address the shortcomings, but they all suffer from various shortcomings.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace,
Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check,.
In 2018, IoT will see tremendous growth in all directions; the following 8 trends are the main developments we predict for next year:
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
Sudha's keynote about IoT Trends Silicon Valley kicking off the new year 2018 at Consumer Electronics Forum on Innovation and Entrepreneurship (silicon valley) on Jan 6th 2018, building up the excitement pre-CES 2018.
Sudha covers IoT from the perspective of Sensors and how they are driving Car Cognition, Connected Car telematics, Robots, Drones, Smart cities, Connected Appliances, Smart homes, with focus on data and machine learning.
Wearable technologies have shown a large potential to amplify human abilities. Thanks to their close contact to the human body, their miniaturized dimensions and continuous data collection, wearable technologies are versatile, meeting system requirements across domains. Wearable technologies have grown in quantity and quality over the past decades, gaining widespread adoption. Still, ensuring that wearables properly meet users’ needs remains an open challenge. Through illustrative examples of diverse applications, in this talk I provide an overview of wearable computing. I discuss the challenges and opportunities in the design of user interfaces for wearable interaction, and conclude with a roadmap for next-generation wearables.
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
This a IOT base ppt slide. It's more describe IOT system history and IOt devices . And also given most valuable and relevant information about IOT and devices.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
Speech to first year graduate students at Babson College on the attitudinal shifts that will allow the IoT to transform business away from hierarchy to innovative circular organizations
With the invention of new Li-fi technology, you will soon find light bulbs of your car, light lamps in your room, lights in subway, flashlight of your mobile and any other light source are providing you internet access at very high speed.Li-fi technology is the another milestone in the history of information technology. You have got the idea that Li-Fi Technology is something light. Yes, Li-fi technology or light-fidelity technology transmits data wirelessly at high speeds with the use of light emitting diodes.
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
Talk Feb2019 at UCSD's Halıcıoğlu Data Science Institute, Security and Privacy at the Edge: Challenges and Future Directions
In the near future, our smart devices will know almost everything about us. These devices, combined with AI technologies, will offer many opportunities to vastly improve society in positive ways. However, these same technologies also pose dramatic new challenges for privacy and for ethics. In this talk, I'll sketch out why privacy is so hard to tackle, how and why we have failed in privacy and ethics in web and smartphones, and discuss some possible social, legal, and technical approaches for steering IoT in more positive directions.
http://datascience.ucsd.edu/security-and-privacy-symposium/venue.html
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
Internet of Things: Opportunities for designing new experiences, capabilities...Claro Partners Inc.
Presented at WebVisions Chicago 2013
Discussion around the Internet of Things (IoT) often gets caught up on resolving issues of interoperability, battery life and security. However, in this session we will shift the focus to the enormous potential of valuable services built by designers, developers and users on top of the connections, data and networked objects. We'll outline our vision of how the IoT will develop and grow from the bottom-up and propose that while another appliance manufacturer redesigns the internet-connected fridge (again), networks of people will create new IoT experiences and capabilities themselves, enabled by the power of digital networks, accessible tools, new funding channels and programming fluency.
In fact, this ecosystem is already emerging, and we will show the vast landscape of value propositions in the IoT and the new business models they bring with them. We will also look at how services in the IoT can be designed to enable different technological capabilities as well as meet a range of human needs, uncovering the opportunities that arise when designers look beyond simple track-and-trace applications and control mechanisms to products which offer emotional benefits like the Good Night Lamp or Berg's Little Printer.
In the presentation we are sharing our perspective based on emerging business research and interviews with experts and IoT creators.
Our perspective is summarised in the following key points:
1. The Internet of Things is nascent… like the internet in 1995, the IoT is just getting started. Actually it's mostly a collection of non-connected Intranets of Things
2. The IoT will be built by many different players with many different roles
3. The real value of the IoT will not come from the technology itself, but the services built on top and enabled by it
4. A significant part of the IoT will evolve from the bottom-up, by entrepreneurship
5. IoT-enabled services are complex because they have both physical and digital elements and need to deliver an experience that bridges the two
To conclude:
•The big value of the Internet of Things isn’t in the connection of devices, but in the services for people that are built on top of those connections
•To create those products and services will require a broad mix of expertise
•Many of the Internet of Things products and services will be built by makers, hackers, entrepreneurs
In the talk we also introduce a couple of tools that help IoT creators discover opportunities and create and prototype IoT offerings.
They are:
IoT emerging business landscape
The interactive IoT landscape mapping 400+ startups and initiatives, structured across 10 business and consumer facing verticals and 5 types of enablers. The IoT landscape shows the vastness, variety, and scope of the Internet of Things and is a key tool to identification of new opportunity spaces.
IoT canvas
The IoT canvas helps IoT creators navigate the multiplied complexity
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Sudha Jamthe
Sudha's keynote about IoT Trends Silicon Valley kicking off the new year 2018 at Consumer Electronics Forum on Innovation and Entrepreneurship (silicon valley) on Jan 6th 2018, building up the excitement pre-CES 2018.
Sudha covers IoT from the perspective of Sensors and how they are driving Car Cognition, Connected Car telematics, Robots, Drones, Smart cities, Connected Appliances, Smart homes, with focus on data and machine learning.
Wearable technologies have shown a large potential to amplify human abilities. Thanks to their close contact to the human body, their miniaturized dimensions and continuous data collection, wearable technologies are versatile, meeting system requirements across domains. Wearable technologies have grown in quantity and quality over the past decades, gaining widespread adoption. Still, ensuring that wearables properly meet users’ needs remains an open challenge. Through illustrative examples of diverse applications, in this talk I provide an overview of wearable computing. I discuss the challenges and opportunities in the design of user interfaces for wearable interaction, and conclude with a roadmap for next-generation wearables.
Understanding the different building blocks of IoT, identifying the areas of vulnerability in each block and exploring technologies needed to counter each of the weaknesses are essential in dealing with the security issue of IoT.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
This a IOT base ppt slide. It's more describe IOT system history and IOt devices . And also given most valuable and relevant information about IOT and devices.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
Speech to first year graduate students at Babson College on the attitudinal shifts that will allow the IoT to transform business away from hierarchy to innovative circular organizations
With the invention of new Li-fi technology, you will soon find light bulbs of your car, light lamps in your room, lights in subway, flashlight of your mobile and any other light source are providing you internet access at very high speed.Li-fi technology is the another milestone in the history of information technology. You have got the idea that Li-Fi Technology is something light. Yes, Li-fi technology or light-fidelity technology transmits data wirelessly at high speeds with the use of light emitting diodes.
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
Talk Feb2019 at UCSD's Halıcıoğlu Data Science Institute, Security and Privacy at the Edge: Challenges and Future Directions
In the near future, our smart devices will know almost everything about us. These devices, combined with AI technologies, will offer many opportunities to vastly improve society in positive ways. However, these same technologies also pose dramatic new challenges for privacy and for ethics. In this talk, I'll sketch out why privacy is so hard to tackle, how and why we have failed in privacy and ethics in web and smartphones, and discuss some possible social, legal, and technical approaches for steering IoT in more positive directions.
http://datascience.ucsd.edu/security-and-privacy-symposium/venue.html
For the IoT industry to thrive, there are three categories of challenges to overcome: technology, business, and society. The upcoming webinar will shed some on what issues to expect soon.
Internet of Things: Opportunities for designing new experiences, capabilities...Claro Partners Inc.
Presented at WebVisions Chicago 2013
Discussion around the Internet of Things (IoT) often gets caught up on resolving issues of interoperability, battery life and security. However, in this session we will shift the focus to the enormous potential of valuable services built by designers, developers and users on top of the connections, data and networked objects. We'll outline our vision of how the IoT will develop and grow from the bottom-up and propose that while another appliance manufacturer redesigns the internet-connected fridge (again), networks of people will create new IoT experiences and capabilities themselves, enabled by the power of digital networks, accessible tools, new funding channels and programming fluency.
In fact, this ecosystem is already emerging, and we will show the vast landscape of value propositions in the IoT and the new business models they bring with them. We will also look at how services in the IoT can be designed to enable different technological capabilities as well as meet a range of human needs, uncovering the opportunities that arise when designers look beyond simple track-and-trace applications and control mechanisms to products which offer emotional benefits like the Good Night Lamp or Berg's Little Printer.
In the presentation we are sharing our perspective based on emerging business research and interviews with experts and IoT creators.
Our perspective is summarised in the following key points:
1. The Internet of Things is nascent… like the internet in 1995, the IoT is just getting started. Actually it's mostly a collection of non-connected Intranets of Things
2. The IoT will be built by many different players with many different roles
3. The real value of the IoT will not come from the technology itself, but the services built on top and enabled by it
4. A significant part of the IoT will evolve from the bottom-up, by entrepreneurship
5. IoT-enabled services are complex because they have both physical and digital elements and need to deliver an experience that bridges the two
To conclude:
•The big value of the Internet of Things isn’t in the connection of devices, but in the services for people that are built on top of those connections
•To create those products and services will require a broad mix of expertise
•Many of the Internet of Things products and services will be built by makers, hackers, entrepreneurs
In the talk we also introduce a couple of tools that help IoT creators discover opportunities and create and prototype IoT offerings.
They are:
IoT emerging business landscape
The interactive IoT landscape mapping 400+ startups and initiatives, structured across 10 business and consumer facing verticals and 5 types of enablers. The IoT landscape shows the vastness, variety, and scope of the Internet of Things and is a key tool to identification of new opportunity spaces.
IoT canvas
The IoT canvas helps IoT creators navigate the multiplied complexity
This presentation introduces to the world of hardware everyone can use to get stated with Internet of Things (IoT) such as Arduino, Raspberry Pi and ESP8266.
Internet of Things (IoT) is an emerging platform for human interaction. As such it needs enough security and privacy guarantees to make it an attractive platform for people to come onboard.
This talk explores the efficiencies that organizations achieve when they deploy IoT. It draws upon a series of case studies across different industries including autos, aircraft, farm equipment and farming, logistics, aircraft engines, and healthcare.
Internet of Things (IoT) an introduction-
There is a growing interest in using IoT technologies in various industries. A number of industrial IoT projects have been conducted in areas such as agriculture, food processing industry, environmental monitoring, security surveillance, and others. Meanwhile, the number of IoT applications is quickly growing. It is rapidly gathering momentum driven by the advancements in sensor networks, mobile devices, wireless communications, networking and cloud technologies.
Integration of device and sensor data with big data, analytics and other enterprise applications is a core concept behind the emerging Internet of Things.
Internet of Things A Vision, Architectural Elements, and Future Directions Mostafa Arjmand
Present paper aboat Internet of Things (IoT) A Vision, Architectural Elements, and Future Directions
Overall IoT vision and the technologies that will achieve the it
Application domains in IoT with a new approach in defining them
Cloud centric Internet of Things realization and challenges
Case study of data analytics on the Aneka/Azure cloud platform
Open Challenges and Future Directions
Smart environment application domains
Cloud computing
Cloud centric Internet of Things
Microsoft Azure
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Julien Vermillard
M2M/IoT is rapidly growing and since its early days different “standard” protocols have emerged (e.g. OMA-DM, TR-069, MQTT, …) or are emerging (e.g. CoAP or Lightweight M2M). Understanding which protocol to use for which application can be intimidating, therefore we propose to give an overview of these protocols to help you understand their goals and characteristics. We’ll present common M2M use cases and why they usually require more than just one protocol ; we will also see whether CoAP associated with Lightweight M2M allows to forge “one protocol to rule them all”.
Nigel will talk about some of the real world business model innovation that the IoT enables.
Stream Technologies and its IoT-X platform is building a ‘Unified Access Connectivity Environment‘ for IoT and as such is well-placed to disrupt traditional IoT business models as connectivity extends beyond cellular to satellite, Low Power Radio and WiFi.
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
Dr Alisdair Ritchie from the WMG, University of Warwick is taking us through his research on IoT security at the Midlands Cyber Security Expo 2019 #midscybersecurity19
Data protection and other systems of personal data protection around the globe are fundamentally based on principles of "notice and choice". These basic principles are now however assailed from three directions: the chimera of online consent; the lack of opportunity for consent in the world of ambient intelligence or ubiq; and the destruction of purpose specification by the rise of Big Data. This paper connects the dots between all three and considers if anything is left of DP after.
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
You might have heard plenty of jargons related to the internet, but the one that has become a buzzword recently and is broken into the mainstream as potentially the most significant term for the way we communicate, work and live in the near future is: The Internet of Things (IoT). Today, everyone is talking about the Internet of Things (IoT) from the newspaper to tech blogs. But what, exactly, is the IoT for beginners? Let’s find out. For more details visit: https://goo.gl/qT4LYA
The Internet of Things (IoT) is an umbrella term which covers a broad repertoire of sensors, applications, technologies, and use cases as they are enabled by the network of objects and devices with an IP address (Internet Protocol). Smart locks, smart cars, smart security system, smart thermostats, and smart health monitor are some of the examples of The Internet of Things (IoT) you’ve probably heard recently, and you’re going to hear more as the year progresses.
PESTLE analysis of a Grid Operator,
IT then and now,
Strategies for mobile
Presentation delivered at the Managing BYOD & Mobility Summit, London on 24 March 2015
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
Successful innovation, which is essential to better health, safety and security, requires freedom to experiment and develop. But there is an array of government rules and processes that increasingly prohibit “permissionless” innovation.
We hear specific technology terms more frequently, however some individuals may not know what they mean.
My goal is to help you understand the topics that are changing our world and will most likely continue to play an integral part in how we interact with technology.
IT law : the middle kingdom between east and WestLilian Edwards
Privacy as a value is often as conflicting with and less important than other major societal goals such as nation state secureity and business profits. China as a socialist state emerging a a major digital economuic force may fall prey to both these assumptions. However the recent history in the West shows that over zealous national secueity infringing citizen privacy, as revealed in the recent Snowden PRISM/TEMPORA etc scandals, may backlash against business profits as well as reducing citizen trust in security.China can learn from these lessons as it expands its own privacy law especially in the IT/telecoms area.
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
Supply chain is a complex ecosystem with many participants, that may include governments, transnational companies, brokers and other middlemen, and local farms, factories, and other suppliers. Another reason supply chain is complex is because it cuts across borders, and must adhere to laws and regulations in multiple jurisdictions: global, national, and local.
This report researched the supply chain through the lens of digital identity for tracking and auditing.
Download the reports:
Gaps: bit.ly/NPEreport
Supply Chain: bit.ly/GSCreport
AI Worldviews: Similarities & DifferencesAdam Thierer
There are many different perspectives on artificial intelligence and AI policy, but I’ve come to think about four generalized worldviews. There are very interesting similarities and differences among these worldviews, however. We can compare and contrast them along a linear spectrum, or we can bend the line and look at them a different way through the prism of “horseshoe theory,” where the extremes sometimes meet and the middle finds some common ground.
Here are some slides that I developed to tease out the similarities and differences between the worldviews I’ve identified.
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterAdam Thierer
An overview of the future of innovation policy and what governance vision will drive it -- the precautionary principle or permissionless innovation. (By Adam Thierer, Senior Research Fellow, Mercatus Center at George Mason University).
Tips & Best Practices for Aspiring Policy ScholarsAdam Thierer
A short presentation by Adam D. Thierer offering tips and best practices to aspiring policy scholars looking to develop their personal brand and be more effective in public policy discussions.
Artificial intelligence governance in the Obama & Trump yearsAdam Thierer
This presentation briefly outlines how AI governance was being formulated in the United States from 2009 to 2020 during the presidencies of Barack Obama and Donald Trump. Although these two administrations differed on most policy matters, they shared a common approach to AI governance. Generally speaking, both administrations adopted a “light-touch” regulatory and industrial policy stance toward AI. Although both administrations highlighted potential areas of policy concern—safety and security issues, in particular—promoting the growth of AI sectors and technologies was prioritized over preemptively restricting them. “Soft law” mechanisms were typically tapped before hard law solutions. In this sense, AI policy in the Obama-Trump AI governance approach has been an extension of the governance vision previous administrations applied to the internet and digital commerce.
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
presentation by Adam Thierer of the Mercatus Center at George Mason University. Made at Univ. of Minnesota Law School symposium on "Legal Concerns in 3D Printing" on March 4, 2016.
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
1. The Internet of Things & Wearable Technology:
Unlocking the Next Wave of Data-Driven Innovation
Presentation at AEI-FCC Conference on “Regulating the
Evolving Broadband Ecosystem”
Adam Thierer
Senior Research Fellow
Mercatus Center at George Mason University
September 11, 2014
2. Outline of Paper & Presentation
• Definitions
• Opportunities
• Key Policy Concerns (Technical vs. Social)
• A Deeper Dive on Privacy-Related Concerns
• Constructive Solutions
• A Word about Adaptation
• The Growing Conflict of Visions Ahead
2
4. Definitions of IoT Evolving
• No consensus definition, but lots of catchphrases!
– “machine-to-machine” communication
– “Industrial Internet” (GE)
– “Internet of Everything” (Cisco)
– “ThingerNet” / “Thingerverse”
• “Smart” everything!
– “smart homes,” “smart buildings,” “smart appliances,”
“smart health,” “smart mobility,” “smart cities,” “smart
cars,” etc.
4
5. Best Definition of IoT
Morrison Foerster analysts define IoT as:
“the network of everyday physical objects which
surround us and that are increasingly being
embedded with technology to enable those objects
to collect and transmit data about their use and
surroundings.”
5
6. Key Components of the IoT
• Power of IoT comes from combination of:
– Faster & smaller microprocessors
– Smaller & better sensors (& cameras)
– More ubiquitous & robust wireless networks
– Expanding cloud storage capacity
– Enhanced “big data” capabilities
• It’s the miniaturization of everything that matters
– both in terms of device size & cost
• = the long-desired “seamless web” of connectivity
now exists
6
7. Just How Connected?
(by 2020)
• ABI Research: estimates that there are more than 10
billion wirelessly connected devices in the market
today and more than 30 billion devices expected by
2020
• Cisco: by 2020, 37 billion intelligent things will be
connected & communicating
• IDC: predicts far greater penetration of 212 billion
installed devices by 2020
7
10. Estimated Economic Impact of IoT
• McKinsey Global: $2.7 trillion to $6.2 trillion
per year by 2025
• IDC: compound annual growth rate of 7.9%
between now & 2020, to reach $8.9 trillion
• Cisco: IoT will create $14.4 trillion in value
between 2013 and 2022
10
13. “Wearables” = Most
Important IoT Category
• = IoT that is worn on body
• “quantified self” movement growing
• Unsightly today (think “Google Glass”), but
will literally be sewn into our clothes in future
(“sensor-rich fabrics”) & largely invisible
• Becoming “lifestyle remotes” to automate our
lives
13
15. Sectors & Professions That Will Be
Transformed by Wearable Tech
• Health Care / Surgery
• Firefighting
• Law enforcement
• Political campaigns
• Education / Instruction
• Retailing
• Entertainment
• Theme parks
• Airlines & vacationing
• Financial Services
• Sports / Athletics
15
16. Health & Fitness Are
Major Drivers
Typology of Mobile Health Technologies
• Connectors: applications that connect smartphones and tablets to FDA-regulated
devices, thus amplifying the devices’ functionalities.
• Replicators: applications that turn a smartphone or tablet itself into a medical device by
replicating the functionality of an FDA-regulated device.
• Automators & Customizers: apps which use questionnaires, algorithms, formulae,
medical calculators, or other software parameters to aid clinical decisions.
• Informers & Educators: medical reference texts and educational apps that primarily aim
to inform and educate.
• Administrators: apps that automate office functions, like identifying appropriate
insurance billing codes or scheduling patient appointments.
• Loggers & Trackers: apps that allows users to log, record, and make decisions about
their general health and wellness.
Source: Nathan Cortez, SMU School of Law
16
17. Wearable Market Growth
• Canalys: 700% growth in wearable smart bands
market in the second half of 2013
• IDC: shipment volumes will exceed 19 million units in
2014, 3x prior year
• IDC: global market will swell to 112 million units in
2018, resulting in a CAGR of 78%
• + major smartphone platforms providers (Apple,
Google, Microsoft, Samsung) all competing
aggressively here
17
18. The “Sci-Fi” Future of IoT & Wearables
Will Arrive Shortly
• “Implantables” = IoT implanted under skin
• “Ingestibles” = IoT tech that is swallowed
• “Biohacking”= Body modification to enhance
or repair human abilities
– see: http://discuss.biohack.me
18
20. Technical Issues
• Access to adequate spectrum to facilitate wireless
networking capabilities?
• Technical standards
– Wi-Fi, Bluetooth, near field communication, GPS
– Licensed or unlicensed ?
• Device / platform interoperability
– Apple vs. Android vs. what else?
• Device addressing
– Will rise of IoT & wearables get IPv6 transition moving?
20
21. Quick Note on Technical Issues
• Technical issues were not focus of this
particular paper
• That is primarily because I am actually far
more optimistic we can work those issues out
relative to…
21
22. Social Concerns
(in order of current severity)
• Security
• Privacy
– reputational issues
– “discrimination” issues
Primary focus of paper
• Safety
• Automation fears & other ethical objections
– “cyborg” concerns
22
23. Regulatory Interest Growing
Agencies Already Exploring IoT Tech
• FTC (general privacy & security)
• FDA (safety of mobile medical apps & devices)
• FCC (wireless issues)
• FAA (commercial drones)
• NHTSA (intelligent vehicle technology)
• NTIA (multistakeholder privacy reviews)
• Various state & local regulators
• + rapidly growing interest in Europe & Asia
23
25. The Coming Data Deluge
• Amount of data generated & collected online today
pales in comparison to what is coming
• Recall estimates of 30+ billion devices by 2020
• And recall defining realities of IoT & wearable tech:
– always-on
– always-sensing
– always-collecting
– always-communicating
• The IoT is, at once, a massive data generator & giant
data vacuum cleaner
25
26. Ramifications for Modern Privacy
& Security Policies
• “fair information practice principles” (FIPPs)
will be hard to strictly apply & enforce
• FTC Chairwoman Ramirez:
“the difficulties will be exponentially greater with
the advent of the Internet of Things, as the
boundaries between the virtual and physical
worlds disappear.”
26
27. How IoT Challenges FIPPS
• What is “adequate notice” in an always-on, always-sensing
world of billions of micro devices?
• What counts as “consent” in a world of peer-to-peer self-surveillance?
– Ex: How do you get consent when using Google Glass or a “Narrative”
clip-on camera?
• Transparency: How to post privacy policies when everything is
so small?
• What counts as “respect for context” when everything is
being collected?
• How does data minimization work for “always on” IoT &
wearables
27
28. IoT Also Challenges…
• Health Insurance Portability and
Accountability Act (HIPAA)
• COPPA & FERPA (kids & education privacy)
• GLB financial privacy
• State privacy & data security laws
• FDA safety standards
• + wide variety of workplace issues
28
29. Will a Move to Use-Based
Restrictions Save the Day?
• Going to be very hard to limit collection, so a move to
use-based restrictions seems likely
• But which uses?
– “discriminatory” uses (how defined?)
– are existing discrimination statutes applicable?
• What about database access / correction?
– think FCRA
• Problem of overly sweeping use restrictions
– “privacy paternalism”?
29
30. Query: What about the First Amendment?
• First Amendment likely poses serious roadblock to
more comprehensive regulation of IoT & wearables
• Volokh: “We already have a code of ‘fair information
practices,’ and it is the First Amendment”
• ACLU of Illinois v. Alvarez (2012):
– “The act of making an audio or audiovisual recording is
necessarily included within the First Amendment’s
guarantee of speech and press rights as a corollary of the
right to disseminate the resulting recording.”
• 1A might limit both collection & use-based
restrictions
30
32. A “Layered” Approach to Address Concerns
1) Developers: Privacy & security “by design” / best practices
2) Consumers: Education, media literacy & tech etiquette
3) Social norms, pressure & sanctions will play big role
– ex: restrictions on phones in theaters & locker rooms
4) Common law adjudication / other legal standards
– privacy torts (“intrusion upon seclusion”); “Pepping Tom” laws
– Products liability: strict liability / negligence, design defects law, failure to
warn, breach of warranty, etc
5) FTC (Section 5) “unfair & deceptive practices”
6) Targeted data use restrictions for sensitive classes of info
– note: existing discrimination statutes might cover some issues
32
33. Developer-Side Solutions
Elements of Privacy / Security by Design
• Better security through encryption,
anonymization / data “de-identification”
• Rolling security notices / updates / upgrades
• Proper use guidelines
• Better transparency re: data use/sharing
policies
• Data minimization when possible
• Simpler UI
33
34. Consumer-Side Education
• Media literacy / digital citizenship /
“netiquette”
• Government can be active here w/o fear of
First Amendment
– PSAs / general awareness-building efforts
• ex: OnGuardOnline.gov
– Classroom lessons
• Privacy curriculum (see Fordham CLIP model)
34
35. Liability Norms Could Evolve
• Who is “least-cost avoider” who assumes liability?
• As developer knowledge of potential misuses grows,
liability could shift, too
– Ex: Driverless cars & insurance as cars become a service
• But will liability norms need a nudge in that
direction? …
• … or, will IoT developers need protection from over-eager
tort lawyers!
• Bottom line: Let product liability evolve; it has
happened many times before w/ other tech.
35
36. FTC Role Will Continue
Recent FTC Privacy & Security Enforcement Actions
• Google
• Facebook
• Apple
• Twitter
• MySpace
• HTC
• Lookout
• Path
• Snapchat
• Fandango
• Credit Karma
• TrendNet
53 data security-related cases recently
20-year privacy audits for some firms + fines
= is this an “FTC common law” of IoT privacy & security?
36
38. What Was True Before…
• Citizen attitudes about emerging technologies
follow a familiar cycle:
1. initial resistance (“technopanic” phase)
2. gradual adaptation
3. eventual assimilation
• we have seen this cycle play out in countless
other contexts
38
39. First We Panic, Then…
• Recall reaction to camera & photography in late 1800’s…
“Instantaneous photographs and newspaper enterprise have invaded
the sacred precincts of private and domestic life; and numerous
mechanical devices threaten to make good the prediction that ‘what is
whispered in the closet shall be proclaimed from the house-tops.’”
— Samuel D. Warren and Louis D. Brandeis, 1890
• But we got through it! We adjusted our societal norms and
personal expectations to accommodate photography.
• Instead of rejecting cameras, we bought a lot of them! (But
then learned how to use them respectfully, too.)
39
40. Key Takeaways
• There is no end point in debates about data security
& online privacy; a never-ending challenge
• IoT & wearables merely extend & exacerbate
problems we already faced in Web 1.0 & 2.0 world
• silver bullet solutions don’t exist (never have, never
will)
• Need to find creative ways to adapt to each new set
of challenges
– individuals, institutions, law & norms all must adapt
– patience & humility will be crucial policy virtues
40
42. IoT and
Future Tech
Flashpoints
Internet of Things
• Wearable Tech
• Smart Homes
• Smart Cities
Robotics
• Smart cars
• Private drones
Health Issues
• Medical Devices
• Biohacking
• Embeddables
• Genetic issues
• Mobile medical apps
• Telemedicine
3-D Printing
• A.I.
43. Which Vision Will Govern?
IoT foreshadows many other debates about
emerging tech. The choice:
• Permissionless Innovation = the general
freedom to experiment & learn through trial-and-
error experimentation.
• Precautionary Principle = Crafting public
policies to control or limit new innovations
until their creators can prove that they won’t
cause any harms.
43
44. The Heart of the Debate
Which Default for Innovation?
Precautionary Principle Permissionless Innovation
44
risk anticipation risk adaptation
Ex ante enforcement Ex post enforcement
Preemptive
top-down controls
Reactive
bottom-up remedies
Innovators have to ask,
“Mother, May I?”
Innovation is “innocent
until proven guilty”
45. A Range of Responses to Technological Risk
Prohibition
Censorship
Info suppression
Product bans
Anticipatory
Regulation
Administrative mandates
Restrictive defaults
Licensing & permits
Industry guidance
Resiliency
Education & Media Literacy
Labeling / Transparency
User empowerment
Self-regulation
Adaptation
Experience / Experiments
Learning / Coping
Social norms & pressure
Top-down
Solutions
Bottom-up
Solutions
Precautionary Principle
Permissionless Innovation
45
46. Related Mercatus Center Research
Books, Papers & Filings
• Book: Permissionless Innovation: The Continuing Case for Comprehensive
Technological Freedom
• Filing to FTC on Privacy and Security Implications of the Internet of Things
• Law review article: Technopanics, Threat Inflation, and the Danger of an
Information Technology Precautionary Principle
Articles & Blog Posts
• Muddling Through: How We Learn to Cope with Technological Change
• Who Really Believes in “Permissionless Innovation”?
• “Permissionless Innovation” Offline as Well as On
• The Third Industrial Revolution Has Only Just Begun
46