SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
The ethics and risks of urban big data
and smart cities
Rob Kitchin
National University of Ireland Maynooth
@robkitchin
Smart Dublin / open data & tools
Smart city technologies
Domain Example technologies
Government
E-government systems; online transactions; city operating
systems; performance management systems; urban
dashboards
Security and emergency
services
Centralised control rooms; digital surveillance; predictive
policing; coordinated emergency response
Transport
Intelligent transport systems; integrated ticketing; smart
travel cards; bikeshare; real-time passenger information;
smart parking; logistics management; transport apps
Energy Smart grids; smart meters; energy usage apps; smart
lighting
Waste Compactor bins and dynamic routing/collection
Environment Sensor networks (e.g., pollution, noise, weather; land
movement; flood management)
Buildings Building management systems; sensor networks
Homes Smart meters; app controlled smart appliances
Civic Various apps; open data; volunteered data/hacks
Urban big data
• Diverse range of public and private
generation of fine-scale (uniquely
indexical) data about citizens and places in
real-time:
• utilities
• transport providers, logistics systems
• environmental agencies
• mobile phone operators
• app developers
• social media sites
• travel and accommodation websites
• home appliances and entertainment
systems
• financial institutions and retail chains
• private surveillance and security firms
• remote sensing, aerial surveying
• emergency services
• Producing a data deluge that can be
combined, analyzed, acted upon
Ethics and security concerns
• Urban big data and smart city
systems create a number of ethical
and security concerns
• Surveillance and erosion privacy
• Ownership, control, data markets
• Social sorting / redlining
• Predictive profiling / anticipatory
governance
• Nudge / behavioural change
• Dynamic pricing
• Data security
• Control creep
• Buggy, brittle, hackable urban
systems
Privacy
• Privacy debates concern acceptable practices
with regards to accessing and disclosing
personal and sensitive information about a
person
• identity privacy (to protect personal and
confidential data)
• bodily privacy (to protect the integrity of
the physical person);
• territorial privacy (to protect personal
space, objects and property);
• locational and movement privacy (to
protect against the tracking of spatial
behaviour)
• communications privacy (to protect against
the surveillance of conversations and
correspondence);
• transactions privacy (to protect against
monitoring of queries/searches, purchases,
and other exchanges)
A Taxonomy of Privacy Harms (compiled from Solove 2006)
Domain Privacy breach Description
Information
Collection
Surveillance Watching, listening to, or recording of an individual’s activities
Interrogation Various forms of questioning or probing for information
Information
Processing
Aggregation The combination of various pieces of data about a person
Identification Linking information to particular individuals
Insecurity Carelessness in protecting stored information from leaks and
improper access
Secondary Use Use of information collected for one purpose for a different
purpose without the data subject’s consent
Exclusion Failure to allow the data subject to know about the data that others
have about her and participate in its handling and use, including
being barred from being able to access and correct errors
Information
Dissemination
Breach of Confidentiality Breaking a promise to keep a person’s information confidential
Disclosure Revelation of information about a person that impacts the way
others judge her character
Exposure Revealing another’s nudity, grief, or bodily functions
Increased Accessibility Amplifying the accessibility of information
Blackmail Threat to disclose personal information
Appropriation The use of the data subject’s identity to serve the aims and
interests of another
Distortion Dissemination of false or misleading information about individuals
Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude
Decisional Interference Incursion into the data subject’s decisions regarding her private
affairs
Privacy and big urban data
• Intensifies datafication
• The capture and circulation
data are:
• indiscriminate and exhaustive
(involve all individuals, objects,
transactions, etc.);
• distributed (occur across
multiple devices, services and
places);
• platform independent (data can
flow across platforms, services,
and devices);
• continuous (data are generated
on a routine and automated
basis).
Location/movement data
• Controllable digital CCTV cameras + ANPR + facial
recognition
• Smart phones: cell masts, GPS, wifi
• Sensor networks: capture and track phone identifiers
such as MAC addresses
• Wifi mesh: capture & track phones with wifi turned on
• Smart card tracking: barcodes/RFID chips (buildings &
public transport)
• Vehicle tracking: unique ID transponders for automated
road tolls & car parking
• Other staging points: ATMs, credit card use, metadata
tagging
• Electronic tagging; shared calenders
Data type Data permissions that can be sought by android apps (from Hein 2014)
Accounts log email log
App Activity name, package name, process number of activity, processed id
App Data Usage Cache size, code size, data size, name, package name
App Install installed at, name, package name, unknown sources enabled, version code, version
name
Battery health, level, plugged, present, scale, status, technology, temperature, voltage
Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP,
MAC address, manufacturer, model, OS platform, product, SDK code, total disk
space, unknown sources enabled
GPS accuracy, altitude, latitude, longitude, provider, speed
MMS from number, MMS at, MMS type, service number, to number
NetData bytes received, bytes sent, connection type, interface type
PhoneCall call duration, called at, from number, phone call type, to number
SMS from number, service number, SMS at, SMS type, to number
TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local
area code, MEID, mobile country code, mobile network code, network name,
network type, phone type, SIM serial number, SIM state, subscriber ID
WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID
WifiNeighbors BSSID, capabilities, frequency, level, SSID
Root Check root status code, root status reason code, root version, sig file version
Malware Info algorithm confidence, app list, found malware, malware SDK version, package list,
reason code, service list, sigfile version
Privacy and big urban data
• Intensifies datafication
• Deepens inferencing and
predictive privacy harms
• Weak anonymization and enables
re-identification
• Opacity and automation creates
obfuscation and reduces control
• Data are being shared and
repurposed and used in
unpredictable and unexpected
ways
• Notice and consent is an empty
exercise or absent
•
R
Fair Information Practice Principles (OECD, 1980)
Principle Description
Notice Individuals are informed that data are being generated and the
purpose to which the data will be put
Choice Individuals have the choice to opt-in or opt-out as to whether and
how their data will be used or disclosed
Consent Data are only generated and disclosed with the consent of
individuals
Security Data are protected from loss, misuse, unauthorized access,
disclosure, alteration and destruction
Integrity Data are reliable, accurate, complete and current
Access Individuals can access, check and verify data about themselves
Use Data are only used for the purpose for which they are generated
and individuals are informed of each change of purpose
Accountability The data holder is accountable for ensuring the above principles
and has mechanisms in place to assure compliance
Redundant in the age of big urban data?
Privacy and big urban data
• Intensifies datafication
• Deepens inferencing and
predictive privacy harms
• Weak anonymization and enables
re-identification
• Opacity and automation creates
obfuscation and reduces control
• Data are being shared and
repurposed and used in
unpredictable and unexpected
ways
• Notice and consent is an empty
exercise or absent
• Data security
Hacking the city
• Weak security and encryption
• Insecure legacy systems and poor
maintenance
• Large and complex attack surfaces
and interdependencies
• Cascade effects
• Human error and disgruntled
(ex)employees
Suggested solutions
• Market:
• Industry standards and self-regulation
• Privacy/security as competitive advantage
• Technological
• End-to-end strong encryption, access controls, security controls, audit
trails, backups, up-to-date patching, etc.
• Privacy enhancement tools
• Policy and regulation
• FIPPs
• Privacy by design;
• security by design
• Governance
• Vision and strategy: (1) smart city advisory board and smart city strategy;
• Oversight of delivery and compliance: (2) smart city governance, risk and
compliance board;
• Day-to-day delivery: (3) core privacy/security team, smart city
privacy/security assessments, and (4) computer emergency response team
Background
http://progcity.maynoothuniversity.ie
@progcity
Rob.Kitchin@nuim.ie
@robkitchin
https://www.maynoothuniversity.ie/people/rob-kitchin

Mais conteúdo relacionado

Mais procurados

The emerging role of Generative AI in Healthcare..pdf
The emerging role of Generative AI in Healthcare..pdfThe emerging role of Generative AI in Healthcare..pdf
The emerging role of Generative AI in Healthcare..pdfBluebash LLC
 
210725177 flipkart-final-ppt
210725177 flipkart-final-ppt210725177 flipkart-final-ppt
210725177 flipkart-final-pptAnkur Singh
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Flipkart Services marketing.
Flipkart Services marketing.Flipkart Services marketing.
Flipkart Services marketing.AnupPinge
 
Smartphones powerpoint
Smartphones  powerpointSmartphones  powerpoint
Smartphones powerpointLeeoukz
 
Governance of trustworthy AI
Governance of trustworthy AIGovernance of trustworthy AI
Governance of trustworthy AIsamossummit
 
Customer Churn prediction in ECommerce Sector.pdf
Customer Churn prediction in ECommerce Sector.pdfCustomer Churn prediction in ECommerce Sector.pdf
Customer Churn prediction in ECommerce Sector.pdfvirajkhot5
 
Machine learning for customer classification
Machine learning for customer classificationMachine learning for customer classification
Machine learning for customer classificationAndrew Barnes
 
Consumer behaviour towards online and traditional purchasing
Consumer behaviour towards online and traditional purchasingConsumer behaviour towards online and traditional purchasing
Consumer behaviour towards online and traditional purchasingGopal kumar
 
Presentation on Flipkart By Karachi University Students
Presentation on Flipkart By Karachi University Students Presentation on Flipkart By Karachi University Students
Presentation on Flipkart By Karachi University Students Umair Ahmed
 
Complete marketing analysis of Flipkart.
Complete marketing analysis of Flipkart. Complete marketing analysis of Flipkart.
Complete marketing analysis of Flipkart. Piyush Kapoor
 
AI Overview and Capabilities
AI Overview and CapabilitiesAI Overview and Capabilities
AI Overview and CapabilitiesAnandSRao1962
 
E commerce case study
E commerce case studyE commerce case study
E commerce case studyAmlan Datta
 

Mais procurados (20)

Digital Marketing of Flipkart
Digital Marketing of FlipkartDigital Marketing of Flipkart
Digital Marketing of Flipkart
 
Flipkart
FlipkartFlipkart
Flipkart
 
Flipkart: A brief Introduction
Flipkart: A brief IntroductionFlipkart: A brief Introduction
Flipkart: A brief Introduction
 
The emerging role of Generative AI in Healthcare..pdf
The emerging role of Generative AI in Healthcare..pdfThe emerging role of Generative AI in Healthcare..pdf
The emerging role of Generative AI in Healthcare..pdf
 
210725177 flipkart-final-ppt
210725177 flipkart-final-ppt210725177 flipkart-final-ppt
210725177 flipkart-final-ppt
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Flipkart
FlipkartFlipkart
Flipkart
 
Flipkart Services marketing.
Flipkart Services marketing.Flipkart Services marketing.
Flipkart Services marketing.
 
Smartphones powerpoint
Smartphones  powerpointSmartphones  powerpoint
Smartphones powerpoint
 
Governance of trustworthy AI
Governance of trustworthy AIGovernance of trustworthy AI
Governance of trustworthy AI
 
Insider
InsiderInsider
Insider
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Customer Churn prediction in ECommerce Sector.pdf
Customer Churn prediction in ECommerce Sector.pdfCustomer Churn prediction in ECommerce Sector.pdf
Customer Churn prediction in ECommerce Sector.pdf
 
Machine learning for customer classification
Machine learning for customer classificationMachine learning for customer classification
Machine learning for customer classification
 
Consumer behaviour towards online and traditional purchasing
Consumer behaviour towards online and traditional purchasingConsumer behaviour towards online and traditional purchasing
Consumer behaviour towards online and traditional purchasing
 
Problems in ecommerce
Problems in ecommerceProblems in ecommerce
Problems in ecommerce
 
Presentation on Flipkart By Karachi University Students
Presentation on Flipkart By Karachi University Students Presentation on Flipkart By Karachi University Students
Presentation on Flipkart By Karachi University Students
 
Complete marketing analysis of Flipkart.
Complete marketing analysis of Flipkart. Complete marketing analysis of Flipkart.
Complete marketing analysis of Flipkart.
 
AI Overview and Capabilities
AI Overview and CapabilitiesAI Overview and Capabilities
AI Overview and Capabilities
 
E commerce case study
E commerce case studyE commerce case study
E commerce case study
 

Destaque

Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)robkitchin
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/spacerobkitchin
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsrobkitchin
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsrobkitchin
 
How Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesHow Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesSolace
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanismrobkitchin
 
Critical data studies
Critical data studiesCritical data studies
Critical data studiesrobkitchin
 
Platform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven citiesPlatform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven citiesSarah Barns
 
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Mainard Gallagher
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequencesrobkitchin
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...robkitchin
 
Open data: an open and shut case?
Open data: an open and shut case?Open data: an open and shut case?
Open data: an open and shut case?robkitchin
 
The Real-Time City? Data-driven, networked urbanism and the production of sm...
The Real-Time City? Data-driven, networked urbanism  and the production of sm...The Real-Time City? Data-driven, networked urbanism  and the production of sm...
The Real-Time City? Data-driven, networked urbanism and the production of sm...robkitchin
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...robkitchin
 
Privacy in a digital world
Privacy in a digital worldPrivacy in a digital world
Privacy in a digital worldrobkitchin
 
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...Cubic Corporation
 
China smart grid & smart cities
China smart grid & smart citiesChina smart grid & smart cities
China smart grid & smart citiesPatrick Schuler
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboardrobkitchin
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launchrobkitchin
 

Destaque (20)

Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/space
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shifts
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perils
 
How Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart CitiesHow Singapore is Paving the Way for Global Smart Cities
How Singapore is Paving the Way for Global Smart Cities
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanism
 
Critical data studies
Critical data studiesCritical data studies
Critical data studies
 
Platform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven citiesPlatform Urbanism: The politics and practices of data-driven cities
Platform Urbanism: The politics and practices of data-driven cities
 
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequences
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
 
Open data: an open and shut case?
Open data: an open and shut case?Open data: an open and shut case?
Open data: an open and shut case?
 
The Real-Time City? Data-driven, networked urbanism and the production of sm...
The Real-Time City? Data-driven, networked urbanism  and the production of sm...The Real-Time City? Data-driven, networked urbanism  and the production of sm...
The Real-Time City? Data-driven, networked urbanism and the production of sm...
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
 
Privacy in a digital world
Privacy in a digital worldPrivacy in a digital world
Privacy in a digital world
 
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
SmartCity StreamApp Platform: Real-time Information for Smart Cities and Tran...
 
China smart grid & smart cities
China smart grid & smart citiesChina smart grid & smart cities
China smart grid & smart cities
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboard
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launch
 

Semelhante a The ethics and risks of urban big data and smart cities

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart cityrobkitchin
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesKavitha Gupta, CIPP-Asia
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesCharles Mok
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST @ University of Adelaide
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...NCCOMMS
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issuesrobkitchin
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.pptBalwinderKaur626266
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your DataUlf Mattsson
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyCharles Mok
 
20161212_presentation_APSN_LI
20161212_presentation_APSN_LI20161212_presentation_APSN_LI
20161212_presentation_APSN_LIMarcin Betkier
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxgouriuplenchwar63
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 

Semelhante a The ethics and risks of urban big data and smart cities (20)

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart city
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
Security of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart CitiesSecurity of Cloud Computing Applications in Smart Cities
Security of Cloud Computing Applications in Smart Cities
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
CSF18 - Through a Mirror Darkly- a journey to the dark side of metadata - Sas...
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
 
4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt4471_mobile_device_security_handout.ppt
4471_mobile_device_security_handout.ppt
 
GDPR: Protecting Your Data
GDPR: Protecting Your DataGDPR: Protecting Your Data
GDPR: Protecting Your Data
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
The Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and PrivacyThe Impact of Cloud: Cloud Computing Security and Privacy
The Impact of Cloud: Cloud Computing Security and Privacy
 
20161212_presentation_APSN_LI
20161212_presentation_APSN_LI20161212_presentation_APSN_LI
20161212_presentation_APSN_LI
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 

Mais de robkitchin

Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart citiesrobkitchin
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart Cityrobkitchin
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...robkitchin
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...robkitchin
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositoriesrobkitchin
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisisrobkitchin
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsrobkitchin
 

Mais de robkitchin (7)

Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart cities
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart City
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositories
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisis
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and maps
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

The ethics and risks of urban big data and smart cities

  • 1. The ethics and risks of urban big data and smart cities Rob Kitchin National University of Ireland Maynooth @robkitchin
  • 2. Smart Dublin / open data & tools
  • 3. Smart city technologies Domain Example technologies Government E-government systems; online transactions; city operating systems; performance management systems; urban dashboards Security and emergency services Centralised control rooms; digital surveillance; predictive policing; coordinated emergency response Transport Intelligent transport systems; integrated ticketing; smart travel cards; bikeshare; real-time passenger information; smart parking; logistics management; transport apps Energy Smart grids; smart meters; energy usage apps; smart lighting Waste Compactor bins and dynamic routing/collection Environment Sensor networks (e.g., pollution, noise, weather; land movement; flood management) Buildings Building management systems; sensor networks Homes Smart meters; app controlled smart appliances Civic Various apps; open data; volunteered data/hacks
  • 4. Urban big data • Diverse range of public and private generation of fine-scale (uniquely indexical) data about citizens and places in real-time: • utilities • transport providers, logistics systems • environmental agencies • mobile phone operators • app developers • social media sites • travel and accommodation websites • home appliances and entertainment systems • financial institutions and retail chains • private surveillance and security firms • remote sensing, aerial surveying • emergency services • Producing a data deluge that can be combined, analyzed, acted upon
  • 5. Ethics and security concerns • Urban big data and smart city systems create a number of ethical and security concerns • Surveillance and erosion privacy • Ownership, control, data markets • Social sorting / redlining • Predictive profiling / anticipatory governance • Nudge / behavioural change • Dynamic pricing • Data security • Control creep • Buggy, brittle, hackable urban systems
  • 6. Privacy • Privacy debates concern acceptable practices with regards to accessing and disclosing personal and sensitive information about a person • identity privacy (to protect personal and confidential data) • bodily privacy (to protect the integrity of the physical person); • territorial privacy (to protect personal space, objects and property); • locational and movement privacy (to protect against the tracking of spatial behaviour) • communications privacy (to protect against the surveillance of conversations and correspondence); • transactions privacy (to protect against monitoring of queries/searches, purchases, and other exchanges)
  • 7. A Taxonomy of Privacy Harms (compiled from Solove 2006) Domain Privacy breach Description Information Collection Surveillance Watching, listening to, or recording of an individual’s activities Interrogation Various forms of questioning or probing for information Information Processing Aggregation The combination of various pieces of data about a person Identification Linking information to particular individuals Insecurity Carelessness in protecting stored information from leaks and improper access Secondary Use Use of information collected for one purpose for a different purpose without the data subject’s consent Exclusion Failure to allow the data subject to know about the data that others have about her and participate in its handling and use, including being barred from being able to access and correct errors Information Dissemination Breach of Confidentiality Breaking a promise to keep a person’s information confidential Disclosure Revelation of information about a person that impacts the way others judge her character Exposure Revealing another’s nudity, grief, or bodily functions Increased Accessibility Amplifying the accessibility of information Blackmail Threat to disclose personal information Appropriation The use of the data subject’s identity to serve the aims and interests of another Distortion Dissemination of false or misleading information about individuals Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude Decisional Interference Incursion into the data subject’s decisions regarding her private affairs
  • 8. Privacy and big urban data • Intensifies datafication • The capture and circulation data are: • indiscriminate and exhaustive (involve all individuals, objects, transactions, etc.); • distributed (occur across multiple devices, services and places); • platform independent (data can flow across platforms, services, and devices); • continuous (data are generated on a routine and automated basis).
  • 9. Location/movement data • Controllable digital CCTV cameras + ANPR + facial recognition • Smart phones: cell masts, GPS, wifi • Sensor networks: capture and track phone identifiers such as MAC addresses • Wifi mesh: capture & track phones with wifi turned on • Smart card tracking: barcodes/RFID chips (buildings & public transport) • Vehicle tracking: unique ID transponders for automated road tolls & car parking • Other staging points: ATMs, credit card use, metadata tagging • Electronic tagging; shared calenders
  • 10. Data type Data permissions that can be sought by android apps (from Hein 2014) Accounts log email log App Activity name, package name, process number of activity, processed id App Data Usage Cache size, code size, data size, name, package name App Install installed at, name, package name, unknown sources enabled, version code, version name Battery health, level, plugged, present, scale, status, technology, temperature, voltage Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP, MAC address, manufacturer, model, OS platform, product, SDK code, total disk space, unknown sources enabled GPS accuracy, altitude, latitude, longitude, provider, speed MMS from number, MMS at, MMS type, service number, to number NetData bytes received, bytes sent, connection type, interface type PhoneCall call duration, called at, from number, phone call type, to number SMS from number, service number, SMS at, SMS type, to number TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local area code, MEID, mobile country code, mobile network code, network name, network type, phone type, SIM serial number, SIM state, subscriber ID WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID WifiNeighbors BSSID, capabilities, frequency, level, SSID Root Check root status code, root status reason code, root version, sig file version Malware Info algorithm confidence, app list, found malware, malware SDK version, package list, reason code, service list, sigfile version
  • 11. Privacy and big urban data • Intensifies datafication • Deepens inferencing and predictive privacy harms • Weak anonymization and enables re-identification • Opacity and automation creates obfuscation and reduces control • Data are being shared and repurposed and used in unpredictable and unexpected ways • Notice and consent is an empty exercise or absent •
  • 12. R Fair Information Practice Principles (OECD, 1980) Principle Description Notice Individuals are informed that data are being generated and the purpose to which the data will be put Choice Individuals have the choice to opt-in or opt-out as to whether and how their data will be used or disclosed Consent Data are only generated and disclosed with the consent of individuals Security Data are protected from loss, misuse, unauthorized access, disclosure, alteration and destruction Integrity Data are reliable, accurate, complete and current Access Individuals can access, check and verify data about themselves Use Data are only used for the purpose for which they are generated and individuals are informed of each change of purpose Accountability The data holder is accountable for ensuring the above principles and has mechanisms in place to assure compliance Redundant in the age of big urban data?
  • 13. Privacy and big urban data • Intensifies datafication • Deepens inferencing and predictive privacy harms • Weak anonymization and enables re-identification • Opacity and automation creates obfuscation and reduces control • Data are being shared and repurposed and used in unpredictable and unexpected ways • Notice and consent is an empty exercise or absent • Data security
  • 14. Hacking the city • Weak security and encryption • Insecure legacy systems and poor maintenance • Large and complex attack surfaces and interdependencies • Cascade effects • Human error and disgruntled (ex)employees
  • 15. Suggested solutions • Market: • Industry standards and self-regulation • Privacy/security as competitive advantage • Technological • End-to-end strong encryption, access controls, security controls, audit trails, backups, up-to-date patching, etc. • Privacy enhancement tools • Policy and regulation • FIPPs • Privacy by design; • security by design • Governance • Vision and strategy: (1) smart city advisory board and smart city strategy; • Oversight of delivery and compliance: (2) smart city governance, risk and compliance board; • Day-to-day delivery: (3) core privacy/security team, smart city privacy/security assessments, and (4) computer emergency response team