Abstract
The IoT is a revolutionary development for both society and governments. In this chapter opportunities and threats of the IoT are discussed. Linking technological, societal, economic, and policy-oriented aspects of the IoT, this chapter introduces a conceptual framework to map and analyze the factors or obstacles that arise in addressing IoT opportunities and threats, and possible government measures to mitigate these factors. By adopting a broad view and paying attention to the relations between different factors, this chapter shows that there is no one-size-fits-all solution for IoT-related issues, as different problems and solutions are interdependent and require a coherent government approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
https://www.iso.org/standard/62436.html.
Abbreviations
- CE:
-
Conformité Européenne
- CLTC:
-
Center for Long-term Cybersecurity
- GDPR:
-
General Data Protection Regulation
- IoT:
-
Internet of Things
- ISO:
-
International Organization for Standardization
- IT:
-
Information technology
- R&D:
-
Research and development
- SWOT:
-
Strengths, weaknesses opportunities, threats
References
Ackerman, S., & Thielman, S. (2016). US intelligence chief: We might use the internet of things to spy on you. Retrieved July 24, 2017, from https://www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.
Amichai-Hamburger, Y. (2002). Internet and personality. Computers in Human Behavior, 18(1), 1–10.
Aoyama, T., Koike, M., Koshijima, I., & Hashimoto, Y. (2013). A unified framework for safety and security. Safety and Security Engineering V, 134, 67–77.
Arntz, M., Gregory, T., & Zierahn, U. (2016). The risk of automation for jobs in OECD countries: A comparative analysis. Paris: OECD Publishing. OECD Social, Employment and Migration Working Papers, 189.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.
Bawden, D., & Robinson, L. (2009). The dark side of information: Overload, anxiety and other paradoxes and pathologies. Journal of Information Science, 35(2), 180–191.
Beaudin, J. S., Intille, S. S., & Morris, M. E. (2006). To track or not to track: User reactions to concepts in longitudinal health monitoring. Journal of Medical Internet Research, 8(4), 1–22.
Bijlsma, M., Overvest, B., & Straathof, B. (2016). Marktordening bij nieuwe ICT-toepassingen. Den Haag: Centraal Planbureau.
Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications, 54, 1–31.
Bos, J., & Munnichs, G. (2016). Digitalisering van dieren. Den Haag: Rathenau Instituut.
Bradley, J., Barbier, J., & Handler, D. (2013). Embracing the Internet of everything to capture your share of $14.4 trillion. San Jose: Cisco.
Castermans, J., Feijth, H., Verheij, M., Beekhuizen, J., & Wong-A-Tjong, S. (2014). Internet of Things: Slimme en internet-verbonden producten en diensten. Utrecht: Kamer van Koophandel.
CBS (Centraal Bureau voor de Statistiek). (2013). Het Nederlandse ondernemings klimaat in cijfers 2013. Den Haag: CBS.
Chang, R. (1997). Incommensurability, incomparability, and practical reason. Cambridge: Harvard University Press.
CLTC (Center for Long-term Cybersecurity). (2016). Cybersecurity futures 2020. Berkeley: University of California.
CPB & PBL. (2015). Toekomstverkenning welvaart en leefomgeving: Achtergronddocument binnenlandse personenmobiliteit. Den Haag: CPB/PBL.
CSR (Cybersecurity Raad). (2016a). The opportunities and risks of the Internet of Things: Perspectives for action. Den Haag: CSR.
CSR (Cybersecurity Raad). (2016b). De economische en maatschappelijke noodzaak van meer Cybersecurity: Nederland digitaal droge voeten. Den Haag: CSR.
Custers, B. H. M., Calders, T., Schermer, B., & Zarsky, T. Z. (2013). Discrimination and privacy in the information society: Data mining and profiling in large databases studies in applied philosophy. Heidelberg: Springer.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le Métayer, D., Tirtea, R., et al. (2014). Privacy and data protection by design—From policy to engineering. Technical report. https://doi.org/10.2824/38623.
Davies, R. (2015). The Internet of Things opportunities and challenges. Retrieved July 24, 2017, from https://www.europarl.europa.eu/RegData/etudes/BRIE/ 2015/557012/EPRS_BRI(2015)557012_EN.pdf
Domingo, M. C. (2012). An overview of the Internet of Things for people with disabilities. Journal of Network and Computer Applications, 35(2), 584–596.
Ellen MacArthur Foundation. (2016). Intelligent assets: Unlocking the circular economy potential. Retrieved July 24, 2017, from https://www.ellenmacarthurfoundation.org/publications/intelligent-assets
Eger, J. M., & Maggipinto, A. (2009). Technology as a tool of transformation: e-Cities and the rule of law. In A. D’Atri & D. Saccà (Eds.), Information systems: People, organizations, institutions, and technologies. Heidelberg: Physica-Verlag.
Farooq, M. U., Waseem, M., Mazhar, S., Khairi, A., & Kamal, T. (2015). A review on Internet of Things (IoT). International Journal of Computer Applications, 113(1), 1–7.
Fernandez, F., & Pallis, G. C. (2014). Opportunities and challenges of the Internet of Things for healthcare: Systems engineering perspective. In 2014 EAI 4th International Conference on Wireless Mobile Communication and Healthcare (Mobihealth) (pp. 263–266). New York: IEEE.
Flight, S. (2016). Politie en beeldtechnologie: Gebruik, opbrengsten en uitdagingen. Justitiële Verkenningen, 42(3), 68–93.
Floridi, L. (2015). The onlife manifesto: Being human in a hyperconnected era. Cham: Springer International Publishing.
Frenken, K. (2015). Reflecties op de deeleconomie. Retrieved July 24, 2017, from https://dspace.library.uu.nl/handle/1874/320399.
Friedman, B., Kahn, P. H., Jr., & Borning, A. (2013). Value sensitive design and information systems. In K. E. Himma & H. T. Tavani (Eds.), Early engagement and new technologies: Opening up the laboratory (pp. 55–95). Hoboken: John Wiley & Sons, Inc..
FTC. (2015). Privacy & security in a connected world. Washington: FTC.
Gartner. (2015). What’s new in Gartner’s hype cycle for emerging technologies, 2015. Retrieved July 24, 2017, from https://www.gartner.com/smarterwithgartner/whats-new-in-gartners-hype-cycle-for-emerging-technologies-2015
Gil-Garcia, J. R., Helbig, N., & Ojo, A. (2014). Being smart: Emerging technologies and innovation in the public sector. Government Information Quarterly, 31, I1–I8.
Gil-Garcia, J. R., Zhang, J., & Puron-Cid, G. (2016). Conceptualizing smartness in government: An integrative and multi-dimensional view. Government Information Quarterly, 33, 524–534.
Goodman, M. (2015). Future crimes: Everything is connected, everyone is vulner-able and what we can do about it. London: Transworld.
GO-Science (The Government Office for Science). (2014). The Internet of Things: Making the most of the Second Digital Revolution. London: GO-Science.
Gregory, J. (2015). The Internet of Things: Revolutionizing the retail industry. Retrieved July 24, 2017, from https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_14/Accenture-The-Internet-Of-Things.pdf
Healey, J., Pollard, N., & Woods, B. (2015). The healthcare internet of things: Rewards and risks. Washington: Atlantic Council.
Hildebrandt, M. (2008). Defining profiling: A new type of knowledge? In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen (pp. 17–45). Dordrecht: Springer.
Janowski, T. (2015). Digital government evolution: From transformation to contextualization. Government Information Quarterly, 32(2015), 221–236.
Kaminski, M. E., & Witnov, S. (2015). The conforming effect: First amendment implications of surveillance, beyond chilling speech. University of Richmond Law Review, 49, 465–518.
Keymolen, E. (2014). A moral bubble: The influence of online personalization on moral repositioning. In J. de Mul (Ed.), Plessner’s philosophical anthropology: Perspectives and prospects (pp. 387–406). Amsterdam: Amsterdam University Press.
Koebler, J. (2015). Hackers killed a simulated human by turning off its pacemaker. Retrieved July 24, 2017, from https://motherboard.vice.com/en_us/article/hackers-killed-a-simulated-human-by-turning-off-its-pacemaker
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
Kong, A., Beresford, S. A., & Alfano, C. M. (2012). Self-monitoring and eating-related behaviors are associated with 12-month weight loss in postmenopausal overweight-to-obese women. Journal of the Academy of Nutrition and Dietetics, 112(9), 1428–1435.
Kooiman, J., & Jentoft, S. (2009). Meta-governance: Values, norms and principles, and the making of hard choices. Public Administration, 87(4), 818–836.
Kool, L., Timmer, J., Royakkers, L., & Van Est, R. (2017). Opwaarderen:- Borgen van publieke waarden in de digitale samenleving. Den Haag: Rathenau Instituut.
Krebs, B. (2016). Who makes the IoT things under attack? Retrieved July 24, 2017, from https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack
Layne, K., & Lee, J. (2001). Developing fully functional E-government: A four stage model. Government Information Quarterly, 18(2), 122–136.
Lu, J. (2016). Will medical technology deskill doctors? International Education Studies, 9(7), 130–134.
Lund, D., MacGillivray, C., Turner, V., & Morales, M. (2014). Worldwide and regional internet of things (IoT) 2014–2020 forecast: A virtuous circle of proven value and demand. Framingham: International Data Corporation (IDC).
Manyika, J., Chui, M., Bughin, J., Dobbs, R., Bisson, P., & Marrs, A. (2013). Disruptive technologies: Advances that will transform life, business, and the global economy. San Francisco: McKinsey Global Institute.
Mattord, W. (2014). Principles of information security. Delhi: Cengage India.
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.
Moon, M. J. (2002). The evolution of e-government among municipalities: Rhetoric or reality? Public Administration Review, 62(4), 424–433.
Munnichs, G., Kouw, M., & Kool, L. (2017). Een nooit gelopen race: Over cyberdreigingen en versterking van weerbaarheid. Den Haag: Rathenau Instituut.
Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge: Cambridge University Press.
Pandya, H. B., & Champaneria, T. A. (2015, January). Internet of things: Survey and case studies. In 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) (pp. 1–6). New York: IEEE.
Peppet, S. R. (2014). Regulating the internet of things: First steps toward managing discrimination, privacy, security and consent. Texas Law Review, 93, 85–176.
Pereira, Â. G., Benessia, A., & Curvelo, P. (2013). Agency in the Internet of Things. Luxemburg: Publications Office of the European Union.
Roca, D., Nemirovsky, D., Nemirovsky, M., Milito, R., & Valero, M. (2016). Emergent behaviors in the Internet of Things: The ultimate ultra-large-scale System. IEEE Micro, 36(6), 36–44.
Roose, K. (2014). The sharing economy isn’t about trust, it’s about desperation. Retrieved July 24, 2017, from http://nymag.com/daily/intelligencer/2014/04/sharing-economy-is-about-desperation.htm
Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of Things: An overview: Understanding the issues and challenges of a more connected world. Genève: Internet Society.
SER (Sociaal-Economische Raad). (2016). Verkenning en werkagenda digitalisering: Mens en technologie: samen aan het werk. Den Haag: SER.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164.
Silver, E., Wallenstein, S., & Levy, A. (2012). Inward and outward: The role of patient self-monitoring and patient communities in IBD. Inflammatory Bowel Diseases, 18, 45–46.
Smit, W., Peters, S., Kemps, D., Vos, R., & Sterk, W. (2016). Industrial Internet of Things: Noodzaak voor industrie, kans voor IT-sector. Retrieved July 24, 2017, from https://insights.abnamro.nl/2016/02/industrial-internet-of-things
Song, A. M., Chuenpagdee, R., & Jentoft, S. (2013). Values, images, and principles: What they represent and how they may improve fisheries governance. Marine Policy, 40, 167–175.
Stilgoe, J., Owen, R., & Macnaghten, P. (2013). Developing a framework for responsible innovation. Research Policy, 42(9), 1568–1580.
Stratix. (2015). Internet of Things in the Netherlands: Applications, trends and potential impact on radio spectrum. Stratix: Hilversum.
Sun, Y., Song, H., Jara, A. J., & Bie, R. (2016). Internet of things and big data analytics for smart and connected communities. IEEE Access, 4, 766–773.
Swan, M. (2013). The quantified self: Fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85–99.
The Netherlands Court of Audit. (2017). Producten op de Europese markt: CE-markering ontrafeld. The Hague: The Netherlands Court of Audit.
Thierer, A. (2015). The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond Journal of Law & Technology, 21(2).
Tjong Tjin Tai, T. F. E. (2006). Zorgplichten en zorgethiek. Deventer: Wolters Kluwer.
Van den Berg, B., & Keymolen, E. (2013). Techniekfilosofie: Het medium is de maat. Wijsgerig Perspectief, 53(1), 8–17.
Van Est, R., & Kool, L. (2015). Working on the robot society: Visions and insights from science concerning the relationship between technology and employment. Den Haag: Rathenau Instituut.
Van Lakerveld, J. A., Broek, S. D., Buiskool, B. J., Grijpstra, D. H., Gussen, I., Tonis, I. C. M., & Zonneveld, C. A. J. M. (2014). Arbeidsmarkt voor cybersecurity professionals. Leiden: PLATO.
Verbeek, P. P. (2011). De grens van de mens: Over techniek, ethiek en de menselijke natuur. Rotterdam: Lemniscaat.
Vermeulen, E., Fenwick, M. Kaal, W. A. (2016). Regulation tomorrow: What happens when technology is faster than the law? TILEC Discussion Paper No. 2016-024.
Wang, Y. F., Lin, W. M., Zhang, T., & Ma, Y. Y. (2012). Research on application and security protection of internet of things in smart grid. In IET International Conference on Information Science and Control Engineering 2012 (ICISCE 2012), 1–5.
Went, R., & Kremer, M. (2015). Hoe we robotisering de baas kunnen blijven: Inzetten op complementariteit. In Wetenschappelijke Raad voor het Regeringsbeleid (WRR), De Robot de baas: De toekomst van werk in het tweede machinetijdperk (pp. 23–46). Amsterdam: University Press.
Williams, C. (2016). Thermostat ransomware. Retrieved July 24, 2017, from https://www.theregister.co.uk/2016/08/08/smart_thermostat_ransomware.
Whitmore, A., Agarwal, A., & Xu, L. D. (2015). The Internet of Things: A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274.
WEF (World Economic Forum). (2015). Deep shift: Technology tipping points and societal impact. Genève: WEF.
Weiser, M., & Brown, J. S. (1995). Designing calm technology. PowerGrid Journal, 1(1), 75–85. Retrieved May 17, 2018, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.9788&rep=rep1&type=pdf.
West, D. M. (2004). E-government and the transformation of service delivery and citizen attitudes. Public Administration Review, 64(1), 15–27.
Wolters, P. T. J., & Verbruggen, P. W. J. (2016). De verplichting tot het bijwerken van onveilige software. Weekblad voor Privaatrecht, Notariaat en Registratie, 7123, 832–839.
WRR (Wetenschappelijke Raad voor het Regeringsbeleid). (2016). Big Data in een vrije en veilige samenleving. Retrieved July 24, 2017, from https://www.wrr.nl/publicaties/rapporten/2016/04/28/big-data-in-een-vrije-en-veilige-samenleving
Wurman, R. S. (1989). Information anxiety. New York: DoubleDay.
Xu, T., Wendt, J. B., Potkonjak, M. (2014). Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (pp. 417–423). New York: IEEE Press.
Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2013). A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE Communications Surveys & Tutorials, 15(1), 5–20.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22–32.
Zarsky, T. Z. (2014). Understanding discrimination in the scored society. Washington Law Review, 89, 1375–1412.
Zarsky, T. Z. (2016). The trouble with algorithmic decisions. An analytic road map to examine efficiency and fairness in automated and opaque decision making. Science, Technology & Human Values, 41(1), 118–132.
Zwenne, G. J. (2015). De onbestaanbare olifant: gedachten over Big Data en de Privacywet. Tijdschrift voor Internetrecht, 4, 142–147.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pool, R., van Berkel, J., van den Braak, S., Harbers, M., Bargh, M.S. (2020). The Internet of Things in a Smart Society: How Government Policy Can Help Seize Opportunities and Mitigate Threats. In: Gil-Garcia, J.R., Pardo, T.A., Gasco-Hernandez, M. (eds) Beyond Smart and Connected Governments. Public Administration and Information Technology, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-37464-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-37464-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37463-1
Online ISBN: 978-3-030-37464-8
eBook Packages: Economics and FinanceEconomics and Finance (R0)