Skip to main content

The Internet of Things in a Smart Society: How Government Policy Can Help Seize Opportunities and Mitigate Threats

  • Chapter
  • First Online:
Beyond Smart and Connected Governments

Part of the book series: Public Administration and Information Technology ((PAIT,volume 30))

Abstract

The IoT is a revolutionary development for both society and governments. In this chapter opportunities and threats of the IoT are discussed. Linking technological, societal, economic, and policy-oriented aspects of the IoT, this chapter introduces a conceptual framework to map and analyze the factors or obstacles that arise in addressing IoT opportunities and threats, and possible government measures to mitigate these factors. By adopting a broad view and paying attention to the relations between different factors, this chapter shows that there is no one-size-fits-all solution for IoT-related issues, as different problems and solutions are interdependent and require a coherent government approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.iso.org/standard/62436.html.

Abbreviations

CE:

Conformité Européenne

CLTC:

Center for Long-term Cybersecurity

GDPR:

General Data Protection Regulation

IoT:

Internet of Things

ISO:

International Organization for Standardization

IT:

Information technology

R&D:

Research and development

SWOT:

Strengths, weaknesses opportunities, threats

References

  • Ackerman, S., & Thielman, S. (2016). US intelligence chief: We might use the internet of things to spy on you. Retrieved July 24, 2017, from https://www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper.

  • Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.

    Article  Google Scholar 

  • Amichai-Hamburger, Y. (2002). Internet and personality. Computers in Human Behavior, 18(1), 1–10.

    Article  Google Scholar 

  • Aoyama, T., Koike, M., Koshijima, I., & Hashimoto, Y. (2013). A unified framework for safety and security. Safety and Security Engineering V, 134, 67–77.

    Article  Google Scholar 

  • Arntz, M., Gregory, T., & Zierahn, U. (2016). The risk of automation for jobs in OECD countries: A comparative analysis. Paris: OECD Publishing. OECD Social, Employment and Migration Working Papers, 189.

    Google Scholar 

  • Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  • Bawden, D., & Robinson, L. (2009). The dark side of information: Overload, anxiety and other paradoxes and pathologies. Journal of Information Science, 35(2), 180–191.

    Article  Google Scholar 

  • Beaudin, J. S., Intille, S. S., & Morris, M. E. (2006). To track or not to track: User reactions to concepts in longitudinal health monitoring. Journal of Medical Internet Research, 8(4), 1–22.

    Article  Google Scholar 

  • Bijlsma, M., Overvest, B., & Straathof, B. (2016). Marktordening bij nieuwe ICT-toepassingen. Den Haag: Centraal Planbureau.

    Google Scholar 

  • Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues. Computer Communications, 54, 1–31.

    Article  Google Scholar 

  • Bos, J., & Munnichs, G. (2016). Digitalisering van dieren. Den Haag: Rathenau Instituut.

    Google Scholar 

  • Bradley, J., Barbier, J., & Handler, D. (2013). Embracing the Internet of everything to capture your share of $14.4 trillion. San Jose: Cisco.

    Google Scholar 

  • Castermans, J., Feijth, H., Verheij, M., Beekhuizen, J., & Wong-A-Tjong, S. (2014). Internet of Things: Slimme en internet-verbonden producten en diensten. Utrecht: Kamer van Koophandel.

    Google Scholar 

  • CBS (Centraal Bureau voor de Statistiek). (2013). Het Nederlandse ondernemings klimaat in cijfers 2013. Den Haag: CBS.

    Google Scholar 

  • Chang, R. (1997). Incommensurability, incomparability, and practical reason. Cambridge: Harvard University Press.

    Google Scholar 

  • CLTC (Center for Long-term Cybersecurity). (2016). Cybersecurity futures 2020. Berkeley: University of California.

    Google Scholar 

  • CPB & PBL. (2015). Toekomstverkenning welvaart en leefomgeving: Achtergronddocument binnenlandse personenmobiliteit. Den Haag: CPB/PBL.

    Google Scholar 

  • CSR (Cybersecurity Raad). (2016a). The opportunities and risks of the Internet of Things: Perspectives for action. Den Haag: CSR.

    Google Scholar 

  • CSR (Cybersecurity Raad). (2016b). De economische en maatschappelijke noodzaak van meer Cybersecurity: Nederland digitaal droge voeten. Den Haag: CSR.

    Google Scholar 

  • Custers, B. H. M., Calders, T., Schermer, B., & Zarsky, T. Z. (2013). Discrimination and privacy in the information society: Data mining and profiling in large databases studies in applied philosophy. Heidelberg: Springer.

    Book  Google Scholar 

  • Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243.

    Article  Google Scholar 

  • Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le Métayer, D., Tirtea, R., et al. (2014). Privacy and data protection by design—From policy to engineering. Technical report. https://doi.org/10.2824/38623.

  • Davies, R. (2015). The Internet of Things opportunities and challenges. Retrieved July 24, 2017, from https://www.europarl.europa.eu/RegData/etudes/BRIE/ 2015/557012/EPRS_BRI(2015)557012_EN.pdf

  • Domingo, M. C. (2012). An overview of the Internet of Things for people with disabilities. Journal of Network and Computer Applications, 35(2), 584–596.

    Article  Google Scholar 

  • Ellen MacArthur Foundation. (2016). Intelligent assets: Unlocking the circular economy potential. Retrieved July 24, 2017, from https://www.ellenmacarthurfoundation.org/publications/intelligent-assets

  • Eger, J. M., & Maggipinto, A. (2009). Technology as a tool of transformation: e-Cities and the rule of law. In A. D’Atri & D. Saccà (Eds.), Information systems: People, organizations, institutions, and technologies. Heidelberg: Physica-Verlag.

    Google Scholar 

  • Farooq, M. U., Waseem, M., Mazhar, S., Khairi, A., & Kamal, T. (2015). A review on Internet of Things (IoT). International Journal of Computer Applications, 113(1), 1–7.

    Article  Google Scholar 

  • Fernandez, F., & Pallis, G. C. (2014). Opportunities and challenges of the Internet of Things for healthcare: Systems engineering perspective. In 2014 EAI 4th International Conference on Wireless Mobile Communication and Healthcare (Mobihealth) (pp. 263–266). New York: IEEE.

    Google Scholar 

  • Flight, S. (2016). Politie en beeldtechnologie: Gebruik, opbrengsten en uitdagingen. Justitiële Verkenningen, 42(3), 68–93.

    Article  Google Scholar 

  • Floridi, L. (2015). The onlife manifesto: Being human in a hyperconnected era. Cham: Springer International Publishing.

    Book  Google Scholar 

  • Frenken, K. (2015). Reflecties op de deeleconomie. Retrieved July 24, 2017, from https://dspace.library.uu.nl/handle/1874/320399.

  • Friedman, B., Kahn, P. H., Jr., & Borning, A. (2013). Value sensitive design and information systems. In K. E. Himma & H. T. Tavani (Eds.), Early engagement and new technologies: Opening up the laboratory (pp. 55–95). Hoboken: John Wiley & Sons, Inc..

    Chapter  Google Scholar 

  • FTC. (2015). Privacy & security in a connected world. Washington: FTC.

    Google Scholar 

  • Gartner. (2015). What’s new in Gartner’s hype cycle for emerging technologies, 2015. Retrieved July 24, 2017, from https://www.gartner.com/smarterwithgartner/whats-new-in-gartners-hype-cycle-for-emerging-technologies-2015

  • Gil-Garcia, J. R., Helbig, N., & Ojo, A. (2014). Being smart: Emerging technologies and innovation in the public sector. Government Information Quarterly, 31, I1–I8.

    Article  Google Scholar 

  • Gil-Garcia, J. R., Zhang, J., & Puron-Cid, G. (2016). Conceptualizing smartness in government: An integrative and multi-dimensional view. Government Information Quarterly, 33, 524–534.

    Article  Google Scholar 

  • Goodman, M. (2015). Future crimes: Everything is connected, everyone is vulner-able and what we can do about it. London: Transworld.

    Google Scholar 

  • GO-Science (The Government Office for Science). (2014). The Internet of Things: Making the most of the Second Digital Revolution. London: GO-Science.

    Google Scholar 

  • Gregory, J. (2015). The Internet of Things: Revolutionizing the retail industry. Retrieved July 24, 2017, from https://www.accenture.com/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Dualpub_14/Accenture-The-Internet-Of-Things.pdf

  • Healey, J., Pollard, N., & Woods, B. (2015). The healthcare internet of things: Rewards and risks. Washington: Atlantic Council.

    Google Scholar 

  • Hildebrandt, M. (2008). Defining profiling: A new type of knowledge? In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the European citizen (pp. 17–45). Dordrecht: Springer.

    Chapter  Google Scholar 

  • Janowski, T. (2015). Digital government evolution: From transformation to contextualization. Government Information Quarterly, 32(2015), 221–236.

    Article  Google Scholar 

  • Kaminski, M. E., & Witnov, S. (2015). The conforming effect: First amendment implications of surveillance, beyond chilling speech. University of Richmond Law Review, 49, 465–518.

    Google Scholar 

  • Keymolen, E. (2014). A moral bubble: The influence of online personalization on moral repositioning. In J. de Mul (Ed.), Plessner’s philosophical anthropology: Perspectives and prospects (pp. 387–406). Amsterdam: Amsterdam University Press.

    Google Scholar 

  • Koebler, J. (2015). Hackers killed a simulated human by turning off its pacemaker. Retrieved July 24, 2017, from https://motherboard.vice.com/en_us/article/hackers-killed-a-simulated-human-by-turning-off-its-pacemaker

  • Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.

    Article  Google Scholar 

  • Kong, A., Beresford, S. A., & Alfano, C. M. (2012). Self-monitoring and eating-related behaviors are associated with 12-month weight loss in postmenopausal overweight-to-obese women. Journal of the Academy of Nutrition and Dietetics, 112(9), 1428–1435.

    Article  Google Scholar 

  • Kooiman, J., & Jentoft, S. (2009). Meta-governance: Values, norms and principles, and the making of hard choices. Public Administration, 87(4), 818–836.

    Article  Google Scholar 

  • Kool, L., Timmer, J., Royakkers, L., & Van Est, R. (2017). Opwaarderen:- Borgen van publieke waarden in de digitale samenleving. Den Haag: Rathenau Instituut.

    Google Scholar 

  • Krebs, B. (2016). Who makes the IoT things under attack? Retrieved July 24, 2017, from https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack

  • Layne, K., & Lee, J. (2001). Developing fully functional E-government: A four stage model. Government Information Quarterly, 18(2), 122–136.

    Article  Google Scholar 

  • Lu, J. (2016). Will medical technology deskill doctors? International Education Studies, 9(7), 130–134.

    Article  Google Scholar 

  • Lund, D., MacGillivray, C., Turner, V., & Morales, M. (2014). Worldwide and regional internet of things (IoT) 2014–2020 forecast: A virtuous circle of proven value and demand. Framingham: International Data Corporation (IDC).

    Google Scholar 

  • Manyika, J., Chui, M., Bughin, J., Dobbs, R., Bisson, P., & Marrs, A. (2013). Disruptive technologies: Advances that will transform life, business, and the global economy. San Francisco: McKinsey Global Institute.

    Google Scholar 

  • Mattord, W. (2014). Principles of information security. Delhi: Cengage India.

    Google Scholar 

  • Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497–1516.

    Article  Google Scholar 

  • Moon, M. J. (2002). The evolution of e-government among municipalities: Rhetoric or reality? Public Administration Review, 62(4), 424–433.

    Article  Google Scholar 

  • Munnichs, G., Kouw, M., & Kool, L. (2017). Een nooit gelopen race: Over cyberdreigingen en versterking van weerbaarheid. Den Haag: Rathenau Instituut.

    Google Scholar 

  • Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Pandya, H. B., & Champaneria, T. A. (2015, January). Internet of things: Survey and case studies. In 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO) (pp. 1–6). New York: IEEE.

    Google Scholar 

  • Peppet, S. R. (2014). Regulating the internet of things: First steps toward managing discrimination, privacy, security and consent. Texas Law Review, 93, 85–176.

    Google Scholar 

  • Pereira, Â. G., Benessia, A., & Curvelo, P. (2013). Agency in the Internet of Things. Luxemburg: Publications Office of the European Union.

    Google Scholar 

  • Roca, D., Nemirovsky, D., Nemirovsky, M., Milito, R., & Valero, M. (2016). Emergent behaviors in the Internet of Things: The ultimate ultra-large-scale System. IEEE Micro, 36(6), 36–44.

    Article  Google Scholar 

  • Roose, K. (2014). The sharing economy isn’t about trust, it’s about desperation. Retrieved July 24, 2017, from http://nymag.com/daily/intelligencer/2014/04/sharing-economy-is-about-desperation.htm

  • Rose, K., Eldridge, S., & Chapin, L. (2015). The Internet of Things: An overview: Understanding the issues and challenges of a more connected world. Genève: Internet Society.

    Google Scholar 

  • SER (Sociaal-Economische Raad). (2016). Verkenning en werkagenda digitalisering: Mens en technologie: samen aan het werk. Den Haag: SER.

    Google Scholar 

  • Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164.

    Article  Google Scholar 

  • Silver, E., Wallenstein, S., & Levy, A. (2012). Inward and outward: The role of patient self-monitoring and patient communities in IBD. Inflammatory Bowel Diseases, 18, 45–46.

    Article  Google Scholar 

  • Smit, W., Peters, S., Kemps, D., Vos, R., & Sterk, W. (2016). Industrial Internet of Things: Noodzaak voor industrie, kans voor IT-sector. Retrieved July 24, 2017, from https://insights.abnamro.nl/2016/02/industrial-internet-of-things

  • Song, A. M., Chuenpagdee, R., & Jentoft, S. (2013). Values, images, and principles: What they represent and how they may improve fisheries governance. Marine Policy, 40, 167–175.

    Article  Google Scholar 

  • Stilgoe, J., Owen, R., & Macnaghten, P. (2013). Developing a framework for responsible innovation. Research Policy, 42(9), 1568–1580.

    Article  Google Scholar 

  • Stratix. (2015). Internet of Things in the Netherlands: Applications, trends and potential impact on radio spectrum. Stratix: Hilversum.

    Google Scholar 

  • Sun, Y., Song, H., Jara, A. J., & Bie, R. (2016). Internet of things and big data analytics for smart and connected communities. IEEE Access, 4, 766–773.

    Article  Google Scholar 

  • Swan, M. (2013). The quantified self: Fundamental disruption in big data science and biological discovery. Big Data, 1(2), 85–99.

    Article  Google Scholar 

  • The Netherlands Court of Audit. (2017). Producten op de Europese markt: CE-markering ontrafeld. The Hague: The Netherlands Court of Audit.

    Google Scholar 

  • Thierer, A. (2015). The internet of things and wearable technology: Addressing privacy and security concerns without derailing innovation. Richmond Journal of Law & Technology, 21(2).

    Google Scholar 

  • Tjong Tjin Tai, T. F. E. (2006). Zorgplichten en zorgethiek. Deventer: Wolters Kluwer.

    Google Scholar 

  • Van den Berg, B., & Keymolen, E. (2013). Techniekfilosofie: Het medium is de maat. Wijsgerig Perspectief, 53(1), 8–17.

    Google Scholar 

  • Van Est, R., & Kool, L. (2015). Working on the robot society: Visions and insights from science concerning the relationship between technology and employment. Den Haag: Rathenau Instituut.

    Google Scholar 

  • Van Lakerveld, J. A., Broek, S. D., Buiskool, B. J., Grijpstra, D. H., Gussen, I., Tonis, I. C. M., & Zonneveld, C. A. J. M. (2014). Arbeidsmarkt voor cybersecurity professionals. Leiden: PLATO.

    Google Scholar 

  • Verbeek, P. P. (2011). De grens van de mens: Over techniek, ethiek en de menselijke natuur. Rotterdam: Lemniscaat.

    Google Scholar 

  • Vermeulen, E., Fenwick, M. Kaal, W. A. (2016). Regulation tomorrow: What happens when technology is faster than the law? TILEC Discussion Paper No. 2016-024.

    Google Scholar 

  • Wang, Y. F., Lin, W. M., Zhang, T., & Ma, Y. Y. (2012). Research on application and security protection of internet of things in smart grid. In IET International Conference on Information Science and Control Engineering 2012 (ICISCE 2012), 1–5.

    Google Scholar 

  • Went, R., & Kremer, M. (2015). Hoe we robotisering de baas kunnen blijven: Inzetten op complementariteit. In Wetenschappelijke Raad voor het Regeringsbeleid (WRR), De Robot de baas: De toekomst van werk in het tweede machinetijdperk (pp. 23–46). Amsterdam: University Press.

    Google Scholar 

  • Williams, C. (2016). Thermostat ransomware. Retrieved July 24, 2017, from https://www.theregister.co.uk/2016/08/08/smart_thermostat_ransomware.

  • Whitmore, A., Agarwal, A., & Xu, L. D. (2015). The Internet of Things: A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274.

    Article  Google Scholar 

  • WEF (World Economic Forum). (2015). Deep shift: Technology tipping points and societal impact. Genève: WEF.

    Google Scholar 

  • Weiser, M., & Brown, J. S. (1995). Designing calm technology. PowerGrid Journal, 1(1), 75–85. Retrieved May 17, 2018, from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.9788&rep=rep1&type=pdf.

    Google Scholar 

  • West, D. M. (2004). E-government and the transformation of service delivery and citizen attitudes. Public Administration Review, 64(1), 15–27.

    Article  Google Scholar 

  • Wolters, P. T. J., & Verbruggen, P. W. J. (2016). De verplichting tot het bijwerken van onveilige software. Weekblad voor Privaatrecht, Notariaat en Registratie, 7123, 832–839.

    Google Scholar 

  • WRR (Wetenschappelijke Raad voor het Regeringsbeleid). (2016). Big Data in een vrije en veilige samenleving. Retrieved July 24, 2017, from https://www.wrr.nl/publicaties/rapporten/2016/04/28/big-data-in-een-vrije-en-veilige-samenleving

  • Wurman, R. S. (1989). Information anxiety. New York: DoubleDay.

    Google Scholar 

  • Xu, T., Wendt, J. B., Potkonjak, M. (2014). Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (pp. 417–423). New York: IEEE Press.

    Google Scholar 

  • Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2013). A survey on smart grid communication infrastructures: Motivations, requirements and challenges. IEEE Communications Surveys & Tutorials, 15(1), 5–20.

    Article  Google Scholar 

  • Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22–32.

    Article  Google Scholar 

  • Zarsky, T. Z. (2014). Understanding discrimination in the scored society. Washington Law Review, 89, 1375–1412.

    Google Scholar 

  • Zarsky, T. Z. (2016). The trouble with algorithmic decisions. An analytic road map to examine efficiency and fairness in automated and opaque decision making. Science, Technology & Human Values, 41(1), 118–132.

    Article  Google Scholar 

  • Zwenne, G. J. (2015). De onbestaanbare olifant: gedachten over Big Data en de Privacywet. Tijdschrift voor Internetrecht, 4, 142–147.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susan van den Braak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pool, R., van Berkel, J., van den Braak, S., Harbers, M., Bargh, M.S. (2020). The Internet of Things in a Smart Society: How Government Policy Can Help Seize Opportunities and Mitigate Threats. In: Gil-Garcia, J.R., Pardo, T.A., Gasco-Hernandez, M. (eds) Beyond Smart and Connected Governments. Public Administration and Information Technology, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-37464-8_2

Download citation

Publish with us

Policies and ethics