Abstract
The higher educational institution presents a microcosm of the Internet and society at large—an environment of elevated technology deployment, and valuable experience in utilizing and protecting personal and organizational information technology resources. In some ways, higher education’s early experience with Bring Your Own Everything (BYOE) provides it with the building blocks needed to more fully address the promise and peril of the Internet of Things (IoT) in the campus environment. This chapter presents some of the security, privacy, and infrastructure issues that the proliferation of mobile and connected devices bring to campus and how US higher education institutions are responding to the complexities—opportunities and challenges—presented via the rise of the Internet of Things.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
It is outside of the scope of this chapter to talk about the different types of federal laws that apply to the data that colleges and universities use each day. One of the most common federal data laws referenced in the U.S. higher education environment is the Family Educational Rights and Privacy Act of 1974 (FERPA), which protects students and their families by ensuring the privacy of student educational records.
- 2.
Research data is more than just scientific data. It also includes social sciences data, humanities texts, and any other data, regardless of form, produced in the pursuit of academic research.
- 3.
MOAR Bandwidth would be more appropriate! See e.g., https://imgflip.com/i/uug8z.
References
Dahlstrom E, diFilipo S (2013) The consumerization of technology and the bring-your-own-everything (BYOE) era of higher education [Internet]. EDUCAUSE Center for Applied Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar
Brooks D, Pomerantz J (2017) ECAR study of undergraduate students and information technology, 2017 [Internet]. EDUCAUSE Center for Analysis and Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar
Tate E (2018) 2,300 Echo Dots put Alexa skills in every Saint Louis University dorm. EdScoop [Internet]. [cited 25 Sept 2018]. Available from: https://edscoop.com/saint-louis-university-amazon-alexa-echo-dot
Gartner (2017) Leading the IoT: Gartner insights on how to lead in a connected world, 2017 [Internet]. Gartner, Stamford, CT. [cited 25 Sept 2018]. Available from: https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf
Wheeler T (2013) The general data protection regulation sets privacy by default. [cited 2018 Sept 25]. In: Brookings Techtank Blog [Internet]. The Brookings Institution, Washington, DC. Available from: https://www.brookings.edu/blog/techtank/2018/05/23/the-general-data-protection-regulation-sets-privacy-by-default/
Grama J, Brooks D (2018) 2018 trends and technologies: domain reports [Internet]. EDUCAUSE Center for Analysis and Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar
Sprint T (2018) In wake of “biggest ever” DDOS attack, experts say brace for more. [cited 25 Sept 2018]. In: Threat Post Blog [Internet]. Threatpost, Woburn, MA. Available from: https://threatpost.com/in-wake-of-biggest-ever-ddos-attack-experts-say-brace-for-more/130205/
Chronology of Data Breaches [Internet]. Privacy Rights Clearinghouse, San Diego, CA. [cited 2018 May 25]. Available from: https://www.privacyrights.org/data-breaches
Statista (2018) Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) [Internet]. Statista, Hamburg, Germany. [cited 25 May 2018]. Available from: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
Addady M (2016) This university is making its students wear Fitbits. Fortune [Internet]. [cited 25 Sept 2018]. Available from: http://fortune.com/2016/02/04/christian-college-fitbit/
Yao M (2017) Your electronic medical records could be worth $1000 to hackers. Forbes [Internet]. [cited 25 Sept 2018]. Available from: https://www.forbes.com/sites/mariyayao/2017/04/14/your-electronic-medical-records-can-be-worth-1000-to-hackers/#776d5e1f50cf
Pomerantz J, Brooks D (2017) ECAR study of faculty and information technology, 2017 [Internet]. EDUCAUSE Center for Analysis and Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar
Fernandez L (2018) Should IT provide faculty with tools to disable Wi-Fi in their classrooms? [cited 25 Sept 2018]. In: Transforming Higher Ed Blog [Internet]. EDUCAUSE Review, Louisville, CO. Available from: https://er.educause.edu/blogs/2018/4/should-it-provide-faculty-with-tools-to-disable-wi-fi-in-their-classrooms
Protection of Human Subjects, 45 C.F.R. Sect. 46.102 (2018)
Brooks D, Pomerantz J (2017) Beyond passwords and PINS: students and infosec training. [cited 25 Sept 2018]. In: Data Bytes Blog [Internet]. EDUCAUSE Review, Louisville, CO. Available from: https://er.educause.edu/blogs/2017/10/beyond-passwords-and-pins-students-and-infosec-training
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Grama, J.L., Milford, K. (2019). Ahead of the Curve: IoT Security, Privacy, and Policy in Higher Ed. In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-15705-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15704-3
Online ISBN: 978-3-030-15705-0
eBook Packages: EngineeringEngineering (R0)