Privacy and Security in Smart Data Collection by Citizens

Part of the Public Administration and Information Technology book series (PAIT, volume 11)


The question of how to make a city or government better by exploiting information and communication infrastructures, referred to as smart city, entails an emerging field of research. Large quantities of data are generated from these infrastructures and infusing these data into the physical infrastructure of a city or government may lead to better services to citizens. Collecting and processing of such data, however, may result in privacy and security issues that should be faced appropriately to create a sustainable approach for smart cities and governments. In this chapter, we focus on data collection through crowdsourcing with smart devices and identify the corresponding security and privacy issues in the context of enabling smart cities and governments. We categorize these issues in four classes. For each class, we identify a number of threats as well as solution directions for these threats.


Crowdsourcing Privacy Security (Un)authorized access (Un)authorized use Smart devices 


  1. Bargh, M. S., & Choenni, S. (2013). On preserving privacy whilst integrating data in connected information systems. In Proceedings of the International Conference on Cloud Security Management (ICCSM’13), Seattle, US, 17–18 October.Google Scholar
  2. Braak, S. W. van den, Choenni, S., Meijer, R., & Zuiderwijk, A. (2012). Trusted third parties for secure and privacy preserving data integration and sharing in the public sector. In Proceedings of the l3th Annual International Conference on Digital Government Research, New York, NY, USA, 2012, pp. 135–144.Google Scholar
  3. Cameron, K. (2005). The laws of identity. Accessed 1 Feb 2014.
  4. Chadwick, D. W. (2009). Federated identity management. In: Foundations of security analysis and design V; lecture notes in computer science (Vol. 5705), 2009, pp. 96–120.Google Scholar
  5. Chin, E., Porter Felt, A., Greenwood, K., & Wagner, D. (2011). Analyzing inter-application communication in Android. In Proceedings of MobiSys. ACM, 2011.Google Scholar
  6. Choenni, S., & Leertouwer, E. (2010). Public safety mashups to support policy makers. In Proceedings of EGOVIS 2010, Electronic Government and the Information Systems Perspective, Bilbao, Spain, August 31–September 2, 2010. LNCS 6267, pp. 234–248.Google Scholar
  7. Choenni, S., van Dijk, J., & Leeuw, F., (2010). Preserving privacy whilst integrating data: Applied to criminal justice. Information Polity, 15(1–2), 125–138.Google Scholar
  8. Dawes, S. S. (2010a). Stewardship and usefulness: Policy principles for information-based trans-parency. Government Information Quarterly, 27, 377–383.CrossRefGoogle Scholar
  9. Dawes, S. S. (2010b). Information policy meta-principles: Stewardship and usefulness. In 2010 43rd Hawaii International Conference on System Sciences (pp. 1–10). IEEE.Google Scholar
  10. DPPA. (2014). Dutch data protection authority—College Bescherming Persoonsgegevens (2014), Dutch Privacy Protection Act (DPPA)—Wbp-naslag; Found on Accessed 11 June 2015.
  11. EU. (1995). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.Google Scholar
  12. Ganesan, D., & Corner, M. (2011). Crowd sourcing for data collection. Accessed 26 Feb 2014.
  13. Gutmann, M., Witkowski, K., Colyer, C., O’Rourke, J., & McNally, J. (2008). Providing spatial data for secondary analysis: Issues and current practices relating to confidentiality. Population Research and Policy Review, 27 (6), 639–665.CrossRefGoogle Scholar
  14. Hildebrandt, M., & Koops, B. J. (2010). The challenges of ambient law and legal protection in the profiling era. The Modern Law Review, 73(3), 428–460CrossRefGoogle Scholar
  15. Kalidien, S., Choenni, S., & Meijer, R. (2010). Crime statistics online: Potentials and challenges. Proceedings of the 11th Annual International Conference on Digital Government Research, New York, NY, USA, 2010, pp. 131–137.Google Scholar
  16. Kosinski, M., Stillwell D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences of the United States of America, 110(15) Michal Kosinski, 5802–5805. doi:10.1073/pnas.1218772110.Google Scholar
  17. Kulk, S., & van Loenen, B. (2012). Brave new open data world? International Journal of Spatial Data Infrastructures, 7, 196–206.Google Scholar
  18. Meijer, R., Choenni, S., Sheikh, A. R., & Conradie, P. (2013). Bridging the contradictions of open data. Proceedings of the 13th European Conference on eGovernment. Como, Italy.Google Scholar
  19. Montjoye de, Y-Al., Hidalgo, C. A., Verleysen, M., & Blondel, V. D. (2013). Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3(1376). doi:10.1038/srep01376.Google Scholar
  20. OECD. (2013). The OECD privacy framework. Accessed 21 Feb 2014.
  21. Stembert, N., Conradie, P., Mulder, I., & Choenni, S. (2013). Participatory data gathering for public sector reuse: Lessons learned from traditional initiatives. Electronic government (pp. 87–98). Berlin Heidelberg: Springer.Google Scholar
  22. Taylor, J. (2010). Citizens as public sensors. Accessed 26 Feb 2014.
  23. Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N. (2009). Who’s viewed you? The impact of feedback in a mobile location-sharing application. Computer Human Interaction (CHI’09) ACM Press.Google Scholar
  24. VDSS Vita Data Security Systems. (2014). Accessed 21 Feb 2014.
  25. Wang, Y., Huang, Y., & Louis, C. (September 2013). Towards a framework for privacy-aware mobile crowdsourcing. In Social Computing (SocialCom), 2013 International Conference on Social Computing (pp. 454–459). IEEE Press.Google Scholar
  26. Zoldan, A. (5 October 2013). More data, more problems: Is big data always right?. Accessed 11 June 2015.
  27. Zuiderwijk, A., Janssen, M., Meijer, R., Choenni, R., Charalabidis, Y., & Jeffery, K. (2012). Issues and guiding principles for opening governmental judicial research data. Proceedings of the 11th European Conference On Electronic Government, EGOV’12, LNCS Vol. 7443. Springer verlag, Kristiansand, Norway, September 3–6 (90–101).Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Ministry of Justice & SecurityWODCThe HagueThe Netherlands
  2. 2.RotterdamThe Netherlands

Personalised recommendations