Skip to main content

Ahead of the Curve: IoT Security, Privacy, and Policy in Higher Ed

  • Chapter
  • First Online:
Women Securing the Future with TIPPSS for IoT

Part of the book series: Women in Engineering and Science ((WES))

  • 459 Accesses

Abstract

The higher educational institution presents a microcosm of the Internet and society at large—an environment of elevated technology deployment, and valuable experience in utilizing and protecting personal and organizational information technology resources. In some ways, higher education’s early experience with Bring Your Own Everything (BYOE) provides it with the building blocks needed to more fully address the promise and peril of the Internet of Things (IoT) in the campus environment. This chapter presents some of the security, privacy, and infrastructure issues that the proliferation of mobile and connected devices bring to campus and how US higher education institutions are responding to the complexities—opportunities and challenges—presented via the rise of the Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    It is outside of the scope of this chapter to talk about the different types of federal laws that apply to the data that colleges and universities use each day. One of the most common federal data laws referenced in the U.S. higher education environment is the Family Educational Rights and Privacy Act of 1974 (FERPA), which protects students and their families by ensuring the privacy of student educational records.

  2. 2.

    Research data is more than just scientific data. It also includes social sciences data, humanities texts, and any other data, regardless of form, produced in the pursuit of academic research.

  3. 3.

    MOAR Bandwidth would be more appropriate! See e.g., https://imgflip.com/i/uug8z.

References

  1. Dahlstrom E, diFilipo S (2013) The consumerization of technology and the bring-your-own-everything (BYOE) era of higher education [Internet]. EDUCAUSE Center for Applied Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar

  2. Brooks D, Pomerantz J (2017) ECAR study of undergraduate students and information technology, 2017 [Internet]. EDUCAUSE Center for Analysis and Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar

  3. Tate E (2018) 2,300 Echo Dots put Alexa skills in every Saint Louis University dorm. EdScoop [Internet]. [cited 25 Sept 2018]. Available from: https://edscoop.com/saint-louis-university-amazon-alexa-echo-dot

  4. Gartner (2017) Leading the IoT: Gartner insights on how to lead in a connected world, 2017 [Internet]. Gartner, Stamford, CT. [cited 25 Sept 2018]. Available from: https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf

  5. Wheeler T (2013) The general data protection regulation sets privacy by default. [cited 2018 Sept 25]. In: Brookings Techtank Blog [Internet]. The Brookings Institution, Washington, DC. Available from: https://www.brookings.edu/blog/techtank/2018/05/23/the-general-data-protection-regulation-sets-privacy-by-default/

  6. Grama J, Brooks D (2018) 2018 trends and technologies: domain reports [Internet]. EDUCAUSE Center for Analysis and Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar

  7. Sprint T (2018) In wake of “biggest ever” DDOS attack, experts say brace for more. [cited 25 Sept 2018]. In: Threat Post Blog [Internet]. Threatpost, Woburn, MA. Available from: https://threatpost.com/in-wake-of-biggest-ever-ddos-attack-experts-say-brace-for-more/130205/

  8. Chronology of Data Breaches [Internet]. Privacy Rights Clearinghouse, San Diego, CA. [cited 2018 May 25]. Available from: https://www.privacyrights.org/data-breaches

  9. Statista (2018) Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) [Internet]. Statista, Hamburg, Germany. [cited 25 May 2018]. Available from: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/

  10. Addady M (2016) This university is making its students wear Fitbits. Fortune [Internet]. [cited 25 Sept 2018]. Available from: http://fortune.com/2016/02/04/christian-college-fitbit/

  11. Yao M (2017) Your electronic medical records could be worth $1000 to hackers. Forbes [Internet]. [cited 25 Sept 2018]. Available from: https://www.forbes.com/sites/mariyayao/2017/04/14/your-electronic-medical-records-can-be-worth-1000-to-hackers/#776d5e1f50cf

  12. Pomerantz J, Brooks D (2017) ECAR study of faculty and information technology, 2017 [Internet]. EDUCAUSE Center for Analysis and Research, Louisville, CO. [cited 25 Sept 2018]. Available from: https://www.educause.edu/ecar

  13. Fernandez L (2018) Should IT provide faculty with tools to disable Wi-Fi in their classrooms? [cited 25 Sept 2018]. In: Transforming Higher Ed Blog [Internet]. EDUCAUSE Review, Louisville, CO. Available from: https://er.educause.edu/blogs/2018/4/should-it-provide-faculty-with-tools-to-disable-wi-fi-in-their-classrooms

  14. Protection of Human Subjects, 45 C.F.R. Sect. 46.102 (2018)

    Google Scholar 

  15. Brooks D, Pomerantz J (2017) Beyond passwords and PINS: students and infosec training. [cited 25 Sept 2018]. In: Data Bytes Blog [Internet]. EDUCAUSE Review, Louisville, CO. Available from: https://er.educause.edu/blogs/2017/10/beyond-passwords-and-pins-students-and-infosec-training

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joanna Lyn Grama .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Grama, J.L., Milford, K. (2019). Ahead of the Curve: IoT Security, Privacy, and Policy in Higher Ed. In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15705-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15704-3

  • Online ISBN: 978-3-030-15705-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics