Skip to main content

Public Safety and Protection by Design: Opportunities and Challenges for IoT and Data Science

  • Chapter
  • First Online:
Women Securing the Future with TIPPSS for IoT

Part of the book series: Women in Engineering and Science ((WES))

  • 465 Accesses

Abstract

The Internet of Things (IoT) and data-enabled technologies have the potential to impact society at an unprecedented scale. However, our legal structures, operating frameworks, and social norms concerning IoT design and deployment—and how data are used—often lack the transparency and cohesiveness needed for effective coordination. Particularly for matters of public safety and protection, we must collectively understand and proactively shape an ecosystem that values collaboration among diverse stakeholders. We must underscore the need for responsible use of technologies, with community dialogue about ethical implications woven throughout the process. Safety and protection are global challenges in today’s interconnected society, with opportunities for local action. To develop and advance sustainable solutions in the public safety realm, we advocate for greater multi-sector coordination and understanding of stakeholder risks and contexts. The intentional creation of avenues for iteratively clarifying and improving policies and processes will be critical to success.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. National Academies of Sciences, Engineering, and Medicine (2018) Critical issues in transportation. The National Academies Press, Washington, DC, p 2019. https://doi.org/10.17226/25314

    Book  Google Scholar 

  2. Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: Solutions and challenges. IEEE Internet Things J 1(4):289–299

    Article  Google Scholar 

  3. Mulligan DK, Bamberger KA (2016) Public values, private infrastructure and the Internet of Things: the case of automobiles. Journal of Law & Economic Regulation,Vol. 9. No. 1. 2016. 5. pp.7–44, https://escholarship.org/uc/item/3z59j68j

  4. Ray PP, Mukherjee M, Shu L (2017) Internet of things for disaster management: state-of-the-art and prospects. IEEE Access 5:18818–18835

    Article  Google Scholar 

  5. Islam SR, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708

    Article  Google Scholar 

  6. Chin CD, Linder V, Sia SK (2007) Lab-on-a-chip devices for global health: Past studies and future opportunities. Lab Chip 7(1):41–57

    Article  Google Scholar 

  7. Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3–4):211–407

    MathSciNet  MATH  Google Scholar 

  8. Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570

    Article  MathSciNet  Google Scholar 

  9. Popa RA, Balakrishnan H, Blumberg AJ (2009) VPriv: Protecting privacy in location-based vehicular services, https://dspace.mit.edu/openaccess-disseminate/1721.1/58903Cached

  10. Erickson L, Evans Harris N, Lee MM (2018) It’s time for data ethics conversations at your dinner table. Tech at Bloomberg

    Google Scholar 

  11. Gotterbarn DW, Bruckman A, Flick C, Miller K, Wolf MJ (2018) ACM code of ethics: a guide for positive action. Communications of the ACM 61(1):121–128 10.1145/3173016, https://cacm.acm.org/magazines/2018/1/223896-acm-code-of-ethics/abstract

  12. Angwin J, Larson J, Mattu S, Kirchner L (2016) Machine bias. ProPublica, https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing

  13. Stoyanovich J, Howe B, Abiteboul S, Miklau G, Sahuguet A, Weikum G Fides: Towards a platform for responsible data science. Proceedings of the 29th International Conference on Scientific and Statistical Database Management; ACM, 27 June 2017, p. 26

    Google Scholar 

  14. Khalil IM, Khreishah A, Ahmed F, Shuaib K (2014) Dependable wireless sensor networks for reliable and secure humanitarian relief applications. Ad Hoc Netw 13:94–106

    Article  Google Scholar 

  15. Bowles N (2018) Thermostats, locks and lights: digital tools of domestic abuse. The New York Times

    Google Scholar 

  16. Sherman J (2018) Need a resolution? How about ‘Guard your online presence’. Richmond Times-Dispatch

    Google Scholar 

  17. Lin R (2019) Long-awaited earthquake early warning app for L.A. can now be downloaded. Los Angeles Times

    Google Scholar 

  18. Rosen D, Singh S (2018) The New America Foundation. Perspectives and Policies on the Digital Safety of Vulnerable Communities

    Google Scholar 

  19. General Data Protection Regulation. https://ec.europa.eu/commission/priorities/justice-and-fundamental-rights/data-protection/2018-reform-eu-data-protection-rules_en

  20. The Financial Services Modernization Act (Gramm-Leach-Bliley Act (GLB)) (15 U.S.C. §§6801-6827)

    Google Scholar 

  21. The Health Insurance Portability and Accountability Act (HIPAA) (42 U.S.C. §1301 et seq.)

    Google Scholar 

  22. The Federal Trade Commission Act (FTC ACT) (15 U.S.C. §§41-58)

    Google Scholar 

  23. The Driver’s Privacy Protection Act of 1994 (18 U.S. Code 2721)

    Google Scholar 

  24. The Fair Credit Reporting Act, as amended by Fair and Accurate Credit Transactions Act (FACTA) (15 U.S. Code 1681)

    Google Scholar 

  25. The Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act) (15 U.S.C. §§7701-7713 and 18 U.S.C. §1037)

    Google Scholar 

  26. Telephone Consumer Protection Act (47 U.S.C. §227 et seq.)

    Google Scholar 

  27. Children’s Online Privacy Protection Act (COPPA) (15 U.S. Code 6501)

    Google Scholar 

  28. Video Privacy Protection Act (VPPA) (18 U.S. Code 2710)

    Google Scholar 

  29. The Electronic Communications Privacy Act (18 U.S.C. §2510) and the Computer Fraud and Abuse Act (18 U.S.C. §1030)

    Google Scholar 

  30. National Conference of State Legislatures (2019) State Laws Related to Internet Privacy. http://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx

  31. National Conference of State Legislatures (2019) State Laws Related to Data Security Laws in Private Sector. http://www.ncsl.org/research/telecommunications-and-information-technology/data-security-laws.aspx

  32. National Conference of State Legislatures (2019) State Laws Related to Data Disposal. http://www.ncsl.org/research/telecommunications-and-information-technology/data-disposal-laws.aspx

  33. United States Senate. Constitution of the United States. https://www.senate.gov/civics/constitution_item/constitution.htm#a6

  34. United States of America v. State of California et al. 2:18-cv-02660 (US District Court for the Eastern District of California. Oct 3, 2018)

    Google Scholar 

  35. United States of America v. State of California, et al. 2:18-cv-00490-JAM-KJN (US District Court for the Eastern District of California. July 9, 2018)

    Google Scholar 

  36. State of California Department of Justice. Privacy Legislation Enacted in 2013. https://oag.ca.gov/privacy/privacy-legislation/leg2013

  37. The State of California. The California Electronic Communications Privacy Act. https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB178

  38. The State of California. The California Consumer Privacy Act of 2018. https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375

  39. State of California. Privacy: electronic communications: search warrant. http://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB178

  40. How to Improve the California Consumer Privacy Act of 2018. Electronic Frontier Foundation. August 8, 2018. https://www.eff.org/deeplinks/2018/08/how-improve-california-consumer-privacy-act-2018

  41. World Economic Forum. The Fourth Industrial Revolution: what it means, how to respond. January 14, 2016. Available at https://www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/

  42. Global Big Data in Healthcare Market: Analysis and Forecast, 2017-2025 (Focus on Components and Services, Applications, Competitive Landscape and Country Analysis). BIS Research. March 2019. https://bisresearch.com/industry-report/global-big-data-in-healthcare-market-2025.html

  43. OECD, KEY ISSUES FOR DIGITAL TRANSFORMATION IN THE G20, 150–62 (2017). Available at http://www.oecd.org/innovation/key-issues-for-digital-transformation-in-the-g20.pdf

  44. Ritter J, Mayer A (2017) Regulating data as property: a new construct for moving forward. Duke Law Tech Rev 16:220

    Google Scholar 

  45. Petrow S. Who owns your medical data? Most likely not you. The Washington Post. 2018 November 25

    Google Scholar 

  46. Dry S (2009) Who owns diagnostic tissue blocks? Lab Med 40(2):69–73

    Article  Google Scholar 

  47. Moore v. Regents of the University of California, 51 Cal. 3d 120; 271 Cal. Rptr. 146; 793 P.2d 479

    Google Scholar 

  48. Feist Publications, Inc. v. Rural Telephone Service Co., Inc., 499 U.S. 340, 350, (1991)

    Google Scholar 

  49. Copyright Act, 17 U.S.C. 101. Available at https://www.govinfo.gov/app/details/USCODE-2011-title17/USCODE-2011-title17-chap1-sec101

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meredith M. Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Johnson, A.D., Lee, M.M., Tronson, S. (2019). Public Safety and Protection by Design: Opportunities and Challenges for IoT and Data Science. In: Hudson, F. (eds) Women Securing the Future with TIPPSS for IoT. Women in Engineering and Science. Springer, Cham. https://doi.org/10.1007/978-3-030-15705-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15705-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15704-3

  • Online ISBN: 978-3-030-15705-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics