SlideShare a Scribd company logo
The ethics and risks of urban big data
and smart cities
Rob Kitchin
National University of Ireland Maynooth
@robkitchin
Smart Dublin / open data & tools
Smart city technologies
Domain Example technologies
Government
E-government systems; online transactions; city operating
systems; performance management systems; urban
dashboards
Security and emergency
services
Centralised control rooms; digital surveillance; predictive
policing; coordinated emergency response
Transport
Intelligent transport systems; integrated ticketing; smart
travel cards; bikeshare; real-time passenger information;
smart parking; logistics management; transport apps
Energy Smart grids; smart meters; energy usage apps; smart
lighting
Waste Compactor bins and dynamic routing/collection
Environment Sensor networks (e.g., pollution, noise, weather; land
movement; flood management)
Buildings Building management systems; sensor networks
Homes Smart meters; app controlled smart appliances
Civic Various apps; open data; volunteered data/hacks
Urban big data
• Diverse range of public and private
generation of fine-scale (uniquely
indexical) data about citizens and places in
real-time:
• utilities
• transport providers, logistics systems
• environmental agencies
• mobile phone operators
• app developers
• social media sites
• travel and accommodation websites
• home appliances and entertainment
systems
• financial institutions and retail chains
• private surveillance and security firms
• remote sensing, aerial surveying
• emergency services
• Producing a data deluge that can be
combined, analyzed, acted upon
Ethics and security concerns
• Urban big data and smart city
systems create a number of ethical
and security concerns
• Surveillance and erosion privacy
• Ownership, control, data markets
• Social sorting / redlining
• Predictive profiling / anticipatory
governance
• Nudge / behavioural change
• Dynamic pricing
• Data security
• Control creep
• Buggy, brittle, hackable urban
systems
Privacy
• Privacy debates concern acceptable practices
with regards to accessing and disclosing
personal and sensitive information about a
person
• identity privacy (to protect personal and
confidential data)
• bodily privacy (to protect the integrity of
the physical person);
• territorial privacy (to protect personal
space, objects and property);
• locational and movement privacy (to
protect against the tracking of spatial
behaviour)
• communications privacy (to protect against
the surveillance of conversations and
correspondence);
• transactions privacy (to protect against
monitoring of queries/searches, purchases,
and other exchanges)
A Taxonomy of Privacy Harms (compiled from Solove 2006)
Domain Privacy breach Description
Information
Collection
Surveillance Watching, listening to, or recording of an individual’s activities
Interrogation Various forms of questioning or probing for information
Information
Processing
Aggregation The combination of various pieces of data about a person
Identification Linking information to particular individuals
Insecurity Carelessness in protecting stored information from leaks and
improper access
Secondary Use Use of information collected for one purpose for a different
purpose without the data subject’s consent
Exclusion Failure to allow the data subject to know about the data that others
have about her and participate in its handling and use, including
being barred from being able to access and correct errors
Information
Dissemination
Breach of Confidentiality Breaking a promise to keep a person’s information confidential
Disclosure Revelation of information about a person that impacts the way
others judge her character
Exposure Revealing another’s nudity, grief, or bodily functions
Increased Accessibility Amplifying the accessibility of information
Blackmail Threat to disclose personal information
Appropriation The use of the data subject’s identity to serve the aims and
interests of another
Distortion Dissemination of false or misleading information about individuals
Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude
Decisional Interference Incursion into the data subject’s decisions regarding her private
affairs
Privacy and big urban data
• Intensifies datafication
• The capture and circulation
data are:
• indiscriminate and exhaustive
(involve all individuals, objects,
transactions, etc.);
• distributed (occur across
multiple devices, services and
places);
• platform independent (data can
flow across platforms, services,
and devices);
• continuous (data are generated
on a routine and automated
basis).
Location/movement data
• Controllable digital CCTV cameras + ANPR + facial
recognition
• Smart phones: cell masts, GPS, wifi
• Sensor networks: capture and track phone identifiers
such as MAC addresses
• Wifi mesh: capture & track phones with wifi turned on
• Smart card tracking: barcodes/RFID chips (buildings &
public transport)
• Vehicle tracking: unique ID transponders for automated
road tolls & car parking
• Other staging points: ATMs, credit card use, metadata
tagging
• Electronic tagging; shared calenders
Data type Data permissions that can be sought by android apps (from Hein 2014)
Accounts log email log
App Activity name, package name, process number of activity, processed id
App Data Usage Cache size, code size, data size, name, package name
App Install installed at, name, package name, unknown sources enabled, version code, version
name
Battery health, level, plugged, present, scale, status, technology, temperature, voltage
Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP,
MAC address, manufacturer, model, OS platform, product, SDK code, total disk
space, unknown sources enabled
GPS accuracy, altitude, latitude, longitude, provider, speed
MMS from number, MMS at, MMS type, service number, to number
NetData bytes received, bytes sent, connection type, interface type
PhoneCall call duration, called at, from number, phone call type, to number
SMS from number, service number, SMS at, SMS type, to number
TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local
area code, MEID, mobile country code, mobile network code, network name,
network type, phone type, SIM serial number, SIM state, subscriber ID
WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID
WifiNeighbors BSSID, capabilities, frequency, level, SSID
Root Check root status code, root status reason code, root version, sig file version
Malware Info algorithm confidence, app list, found malware, malware SDK version, package list,
reason code, service list, sigfile version
Privacy and big urban data
• Intensifies datafication
• Deepens inferencing and
predictive privacy harms
• Weak anonymization and enables
re-identification
• Opacity and automation creates
obfuscation and reduces control
• Data are being shared and
repurposed and used in
unpredictable and unexpected
ways
• Notice and consent is an empty
exercise or absent
•
R
Fair Information Practice Principles (OECD, 1980)
Principle Description
Notice Individuals are informed that data are being generated and the
purpose to which the data will be put
Choice Individuals have the choice to opt-in or opt-out as to whether and
how their data will be used or disclosed
Consent Data are only generated and disclosed with the consent of
individuals
Security Data are protected from loss, misuse, unauthorized access,
disclosure, alteration and destruction
Integrity Data are reliable, accurate, complete and current
Access Individuals can access, check and verify data about themselves
Use Data are only used for the purpose for which they are generated
and individuals are informed of each change of purpose
Accountability The data holder is accountable for ensuring the above principles
and has mechanisms in place to assure compliance
Redundant in the age of big urban data?
Privacy and big urban data
• Intensifies datafication
• Deepens inferencing and
predictive privacy harms
• Weak anonymization and enables
re-identification
• Opacity and automation creates
obfuscation and reduces control
• Data are being shared and
repurposed and used in
unpredictable and unexpected
ways
• Notice and consent is an empty
exercise or absent
• Data security
Hacking the city
• Weak security and encryption
• Insecure legacy systems and poor
maintenance
• Large and complex attack surfaces
and interdependencies
• Cascade effects
• Human error and disgruntled
(ex)employees
Suggested solutions
• Market:
• Industry standards and self-regulation
• Privacy/security as competitive advantage
• Technological
• End-to-end strong encryption, access controls, security controls, audit
trails, backups, up-to-date patching, etc.
• Privacy enhancement tools
• Policy and regulation
• FIPPs
• Privacy by design;
• security by design
• Governance
• Vision and strategy: (1) smart city advisory board and smart city strategy;
• Oversight of delivery and compliance: (2) smart city governance, risk and
compliance board;
• Day-to-day delivery: (3) core privacy/security team, smart city
privacy/security assessments, and (4) computer emergency response team
Background
http://progcity.maynoothuniversity.ie
@progcity
Rob.Kitchin@nuim.ie
@robkitchin
https://www.maynoothuniversity.ie/people/rob-kitchin

More Related Content

What's hot

OTT & Video Advertising Playbook
OTT & Video Advertising PlaybookOTT & Video Advertising Playbook
OTT & Video Advertising Playbook
Tinuiti
 
Machine Learning in Healthcare and Life Science
Machine Learning in Healthcare and Life ScienceMachine Learning in Healthcare and Life Science
Machine Learning in Healthcare and Life Science
IDEAS - Int'l Data Engineering and Science Association
 
Netweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-studyNetweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-study
IntelAPAC
 
Modeling The Market Mix Modeling Problem (Media Mix Optimization)
Modeling The Market Mix Modeling Problem (Media Mix Optimization)Modeling The Market Mix Modeling Problem (Media Mix Optimization)
Modeling The Market Mix Modeling Problem (Media Mix Optimization)
Amit Satsangi
 
Big Data & Artificial Intelligence
Big Data & Artificial IntelligenceBig Data & Artificial Intelligence
Big Data & Artificial Intelligence
Zavain Dar
 
Google Analytics 4
Google Analytics 4Google Analytics 4
Google Analytics 4
CarolinaVelasquezJar
 
Location Based Marketing
Location Based Marketing Location Based Marketing
Location Based Marketing
Rori DuBoff
 
Tracxn - Top Business Models - Blockchain Industry Applications - Mar 2022
Tracxn - Top Business Models - Blockchain  Industry Applications - Mar 2022Tracxn - Top Business Models - Blockchain  Industry Applications - Mar 2022
Tracxn - Top Business Models - Blockchain Industry Applications - Mar 2022
Tracxn
 
Artificial Intelligence in the Financial Industries
Artificial Intelligence in the Financial IndustriesArtificial Intelligence in the Financial Industries
Artificial Intelligence in the Financial Industries
Gerardo Salandra
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Case IQ
 
Market mix modelling
Market mix modellingMarket mix modelling
Market mix modelling
Indira Priyadarsini
 
Explainability and bias in AI
Explainability and bias in AIExplainability and bias in AI
Explainability and bias in AI
Bill Liu
 
Impact of big data in gaming industry
Impact of big data in gaming industryImpact of big data in gaming industry
Impact of big data in gaming industry
Vikas Kumar
 
The internet economy slides november 2017
The internet economy slides november 2017The internet economy slides november 2017
The internet economy slides november 2017
Ville Saarikoski
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Cambridge analytica facebook
Cambridge analytica facebookCambridge analytica facebook
Cambridge analytica facebook
Rohan Hirani
 
Artificial Intelligence improving customer experience in Retail
Artificial Intelligence improving customer experience in RetailArtificial Intelligence improving customer experience in Retail
Artificial Intelligence improving customer experience in Retail
Gachoucha Kretz
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
Daniel Faggella
 
Time series Segmentation & Anomaly Detection
Time series Segmentation & Anomaly DetectionTime series Segmentation & Anomaly Detection
Time series Segmentation & Anomaly Detection
Aditya Bhattacharya
 
Towards Explainable Fact Checking
Towards Explainable Fact CheckingTowards Explainable Fact Checking
Towards Explainable Fact Checking
Isabelle Augenstein
 

What's hot (20)

OTT & Video Advertising Playbook
OTT & Video Advertising PlaybookOTT & Video Advertising Playbook
OTT & Video Advertising Playbook
 
Machine Learning in Healthcare and Life Science
Machine Learning in Healthcare and Life ScienceMachine Learning in Healthcare and Life Science
Machine Learning in Healthcare and Life Science
 
Netweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-studyNetweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-study
 
Modeling The Market Mix Modeling Problem (Media Mix Optimization)
Modeling The Market Mix Modeling Problem (Media Mix Optimization)Modeling The Market Mix Modeling Problem (Media Mix Optimization)
Modeling The Market Mix Modeling Problem (Media Mix Optimization)
 
Big Data & Artificial Intelligence
Big Data & Artificial IntelligenceBig Data & Artificial Intelligence
Big Data & Artificial Intelligence
 
Google Analytics 4
Google Analytics 4Google Analytics 4
Google Analytics 4
 
Location Based Marketing
Location Based Marketing Location Based Marketing
Location Based Marketing
 
Tracxn - Top Business Models - Blockchain Industry Applications - Mar 2022
Tracxn - Top Business Models - Blockchain  Industry Applications - Mar 2022Tracxn - Top Business Models - Blockchain  Industry Applications - Mar 2022
Tracxn - Top Business Models - Blockchain Industry Applications - Mar 2022
 
Artificial Intelligence in the Financial Industries
Artificial Intelligence in the Financial IndustriesArtificial Intelligence in the Financial Industries
Artificial Intelligence in the Financial Industries
 
Data Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and SecurityData Ethics in the Workplace: Beyond AI, Privacy and Security
Data Ethics in the Workplace: Beyond AI, Privacy and Security
 
Market mix modelling
Market mix modellingMarket mix modelling
Market mix modelling
 
Explainability and bias in AI
Explainability and bias in AIExplainability and bias in AI
Explainability and bias in AI
 
Impact of big data in gaming industry
Impact of big data in gaming industryImpact of big data in gaming industry
Impact of big data in gaming industry
 
The internet economy slides november 2017
The internet economy slides november 2017The internet economy slides november 2017
The internet economy slides november 2017
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Cambridge analytica facebook
Cambridge analytica facebookCambridge analytica facebook
Cambridge analytica facebook
 
Artificial Intelligence improving customer experience in Retail
Artificial Intelligence improving customer experience in RetailArtificial Intelligence improving customer experience in Retail
Artificial Intelligence improving customer experience in Retail
 
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
 
Time series Segmentation & Anomaly Detection
Time series Segmentation & Anomaly DetectionTime series Segmentation & Anomaly Detection
Time series Segmentation & Anomaly Detection
 
Towards Explainable Fact Checking
Towards Explainable Fact CheckingTowards Explainable Fact Checking
Towards Explainable Fact Checking
 

Viewers also liked

Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)
robkitchin
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/space
robkitchin
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shifts
robkitchin
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
robkitchin
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perils
robkitchin
 
How Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesHow Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart Cities
Solace
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanism
robkitchin
 
Critical data studies
Critical data studiesCritical data studies
Critical data studies
robkitchin
 
Platform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven citiesPlatform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven cities
Sarah Barns
 
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Mainard Gallagher
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequences
robkitchin
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
robkitchin
 
Open data: an open and shut case?
Open data: an open and shut case?Open data: an open and shut case?
Open data: an open and shut case?
robkitchin
 
The Real-Time City? Data-driven, networked urbanism and the production of sm...
The Real-Time City? Data-driven, networked urbanism  and the production of sm...The Real-Time City? Data-driven, networked urbanism  and the production of sm...
The Real-Time City? Data-driven, networked urbanism and the production of sm...
robkitchin
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
robkitchin
 
Privacy in a digital world
Privacy in a digital worldPrivacy in a digital world
Privacy in a digital world
robkitchin
 
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
Cubic Corporation
 
China smart grid & smart cities
China smart grid & smart citiesChina smart grid & smart cities
China smart grid & smart cities
Patrick Schuler
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboard
robkitchin
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launch
robkitchin
 

Viewers also liked (20)

Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/space
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shifts
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perils
 
How Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesHow Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart Cities
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanism
 
Critical data studies
Critical data studiesCritical data studies
Critical data studies
 
Platform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven citiesPlatform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven cities
 
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequences
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
 
Open data: an open and shut case?
Open data: an open and shut case?Open data: an open and shut case?
Open data: an open and shut case?
 
The Real-Time City? Data-driven, networked urbanism and the production of sm...
The Real-Time City? Data-driven, networked urbanism  and the production of sm...The Real-Time City? Data-driven, networked urbanism  and the production of sm...
The Real-Time City? Data-driven, networked urbanism and the production of sm...
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
 
Privacy in a digital world
Privacy in a digital worldPrivacy in a digital world
Privacy in a digital world
 
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
 
China smart grid & smart cities
China smart grid & smart citiesChina smart grid & smart cities
China smart grid & smart cities
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboard
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launch
 

Similar to The ethics and risks of urban big data and smart cities

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart city
robkitchin
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
Kavitha Gupta, CIPP-Asia
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart Cities
Charles Mok
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
Grant Thornton UK LLP
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
CREST
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
NCCOMMS
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
Yäsh Chaudhary
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
robkitchin
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt
BalwinderKaur626266
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
ramkumarttf69
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your Data
Ulf Mattsson
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
Karen Moxley
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
Dr. Prashant Vats
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
Charles Mok
 
20161212_presentation_APSN_LI
20161212_presentation_APSN_LI20161212_presentation_APSN_LI
20161212_presentation_APSN_LIMarcin Betkier
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 

Similar to The ethics and risks of urban big data and smart cities (20)

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart city
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart Cities
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt
 
UNIT 1Computer forensics science. .pptx
UNIT 1Computer forensics science.  .pptxUNIT 1Computer forensics science.  .pptx
UNIT 1Computer forensics science. .pptx
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your Data
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
20161212_presentation_APSN_LI
20161212_presentation_APSN_LI20161212_presentation_APSN_LI
20161212_presentation_APSN_LI
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 

More from robkitchin

Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart cities
robkitchin
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart City
robkitchin
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
robkitchin
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...
robkitchin
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositories
robkitchin
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisis
robkitchin
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsrobkitchin
 

More from robkitchin (7)

Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart cities
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart City
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositories
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisis
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and maps
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

The ethics and risks of urban big data and smart cities

  • 1. The ethics and risks of urban big data and smart cities Rob Kitchin National University of Ireland Maynooth @robkitchin
  • 2. Smart Dublin / open data & tools
  • 3. Smart city technologies Domain Example technologies Government E-government systems; online transactions; city operating systems; performance management systems; urban dashboards Security and emergency services Centralised control rooms; digital surveillance; predictive policing; coordinated emergency response Transport Intelligent transport systems; integrated ticketing; smart travel cards; bikeshare; real-time passenger information; smart parking; logistics management; transport apps Energy Smart grids; smart meters; energy usage apps; smart lighting Waste Compactor bins and dynamic routing/collection Environment Sensor networks (e.g., pollution, noise, weather; land movement; flood management) Buildings Building management systems; sensor networks Homes Smart meters; app controlled smart appliances Civic Various apps; open data; volunteered data/hacks
  • 4. Urban big data • Diverse range of public and private generation of fine-scale (uniquely indexical) data about citizens and places in real-time: • utilities • transport providers, logistics systems • environmental agencies • mobile phone operators • app developers • social media sites • travel and accommodation websites • home appliances and entertainment systems • financial institutions and retail chains • private surveillance and security firms • remote sensing, aerial surveying • emergency services • Producing a data deluge that can be combined, analyzed, acted upon
  • 5. Ethics and security concerns • Urban big data and smart city systems create a number of ethical and security concerns • Surveillance and erosion privacy • Ownership, control, data markets • Social sorting / redlining • Predictive profiling / anticipatory governance • Nudge / behavioural change • Dynamic pricing • Data security • Control creep • Buggy, brittle, hackable urban systems
  • 6. Privacy • Privacy debates concern acceptable practices with regards to accessing and disclosing personal and sensitive information about a person • identity privacy (to protect personal and confidential data) • bodily privacy (to protect the integrity of the physical person); • territorial privacy (to protect personal space, objects and property); • locational and movement privacy (to protect against the tracking of spatial behaviour) • communications privacy (to protect against the surveillance of conversations and correspondence); • transactions privacy (to protect against monitoring of queries/searches, purchases, and other exchanges)
  • 7. A Taxonomy of Privacy Harms (compiled from Solove 2006) Domain Privacy breach Description Information Collection Surveillance Watching, listening to, or recording of an individual’s activities Interrogation Various forms of questioning or probing for information Information Processing Aggregation The combination of various pieces of data about a person Identification Linking information to particular individuals Insecurity Carelessness in protecting stored information from leaks and improper access Secondary Use Use of information collected for one purpose for a different purpose without the data subject’s consent Exclusion Failure to allow the data subject to know about the data that others have about her and participate in its handling and use, including being barred from being able to access and correct errors Information Dissemination Breach of Confidentiality Breaking a promise to keep a person’s information confidential Disclosure Revelation of information about a person that impacts the way others judge her character Exposure Revealing another’s nudity, grief, or bodily functions Increased Accessibility Amplifying the accessibility of information Blackmail Threat to disclose personal information Appropriation The use of the data subject’s identity to serve the aims and interests of another Distortion Dissemination of false or misleading information about individuals Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude Decisional Interference Incursion into the data subject’s decisions regarding her private affairs
  • 8. Privacy and big urban data • Intensifies datafication • The capture and circulation data are: • indiscriminate and exhaustive (involve all individuals, objects, transactions, etc.); • distributed (occur across multiple devices, services and places); • platform independent (data can flow across platforms, services, and devices); • continuous (data are generated on a routine and automated basis).
  • 9. Location/movement data • Controllable digital CCTV cameras + ANPR + facial recognition • Smart phones: cell masts, GPS, wifi • Sensor networks: capture and track phone identifiers such as MAC addresses • Wifi mesh: capture & track phones with wifi turned on • Smart card tracking: barcodes/RFID chips (buildings & public transport) • Vehicle tracking: unique ID transponders for automated road tolls & car parking • Other staging points: ATMs, credit card use, metadata tagging • Electronic tagging; shared calenders
  • 10. Data type Data permissions that can be sought by android apps (from Hein 2014) Accounts log email log App Activity name, package name, process number of activity, processed id App Data Usage Cache size, code size, data size, name, package name App Install installed at, name, package name, unknown sources enabled, version code, version name Battery health, level, plugged, present, scale, status, technology, temperature, voltage Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP, MAC address, manufacturer, model, OS platform, product, SDK code, total disk space, unknown sources enabled GPS accuracy, altitude, latitude, longitude, provider, speed MMS from number, MMS at, MMS type, service number, to number NetData bytes received, bytes sent, connection type, interface type PhoneCall call duration, called at, from number, phone call type, to number SMS from number, service number, SMS at, SMS type, to number TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local area code, MEID, mobile country code, mobile network code, network name, network type, phone type, SIM serial number, SIM state, subscriber ID WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID WifiNeighbors BSSID, capabilities, frequency, level, SSID Root Check root status code, root status reason code, root version, sig file version Malware Info algorithm confidence, app list, found malware, malware SDK version, package list, reason code, service list, sigfile version
  • 11. Privacy and big urban data • Intensifies datafication • Deepens inferencing and predictive privacy harms • Weak anonymization and enables re-identification • Opacity and automation creates obfuscation and reduces control • Data are being shared and repurposed and used in unpredictable and unexpected ways • Notice and consent is an empty exercise or absent •
  • 12. R Fair Information Practice Principles (OECD, 1980) Principle Description Notice Individuals are informed that data are being generated and the purpose to which the data will be put Choice Individuals have the choice to opt-in or opt-out as to whether and how their data will be used or disclosed Consent Data are only generated and disclosed with the consent of individuals Security Data are protected from loss, misuse, unauthorized access, disclosure, alteration and destruction Integrity Data are reliable, accurate, complete and current Access Individuals can access, check and verify data about themselves Use Data are only used for the purpose for which they are generated and individuals are informed of each change of purpose Accountability The data holder is accountable for ensuring the above principles and has mechanisms in place to assure compliance Redundant in the age of big urban data?
  • 13. Privacy and big urban data • Intensifies datafication • Deepens inferencing and predictive privacy harms • Weak anonymization and enables re-identification • Opacity and automation creates obfuscation and reduces control • Data are being shared and repurposed and used in unpredictable and unexpected ways • Notice and consent is an empty exercise or absent • Data security
  • 14. Hacking the city • Weak security and encryption • Insecure legacy systems and poor maintenance • Large and complex attack surfaces and interdependencies • Cascade effects • Human error and disgruntled (ex)employees
  • 15. Suggested solutions • Market: • Industry standards and self-regulation • Privacy/security as competitive advantage • Technological • End-to-end strong encryption, access controls, security controls, audit trails, backups, up-to-date patching, etc. • Privacy enhancement tools • Policy and regulation • FIPPs • Privacy by design; • security by design • Governance • Vision and strategy: (1) smart city advisory board and smart city strategy; • Oversight of delivery and compliance: (2) smart city governance, risk and compliance board; • Day-to-day delivery: (3) core privacy/security team, smart city privacy/security assessments, and (4) computer emergency response team