tag:theconversation.com,2011:/us/topics/internet-of-things-1724/articlesInternet of Things – The Conversation2024-03-13T12:28:21Ztag:theconversation.com,2011:article/2254652024-03-13T12:28:21Z2024-03-13T12:28:21ZWhat we know so far about the rumoured Apple smart ring<figure><img src="https://images.theconversation.com/files/581294/original/file-20240312-18-nq5gb9.jpg?ixlib=rb-1.1.0&rect=5%2C0%2C3858%2C2583&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">A generic image of a smart ring in use.</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/modern-payment-new-technology-payments-using-691766359">Fotos593 / Shutterstock</a></span></figcaption></figure><p>Samsung officially announced the launch of a new smart ring-shaped wearable device, Galaxy Ring, as <a href="https://www.youtube.com/watch?v=J7x0E0hLaJ8">part of its Galaxy Unpacked event</a> earlier this year. The ring, expected to be on sale in late summer 2024, will be able to monitor the user’s health parameters and provide insights based on the health metrics observed, which is very similar to what a smartwatch can do.</p>
<p>The global smart ring <a href="https://exactitudeconsultancy.com/reports/34772/smart-ring-market/">market is expected to grow</a> from USD$314.52 billion (£246.3 billion) in 2023 to USD$2,570.30 billion (£2,012 billion) by 2030. So it is no surprise that Apple is now rumoured to be <a href="https://www.forbes.com/sites/davidphelan/2024/02/27/apple-developing-ring-to-beat-samsung-galaxy-ring-report-claims/?sh=53a35fbd4e2c">applying for its smart ring patents</a> and is expected to have the product ready in time to compete with Samsung’s release.</p>
<p>But it might be surprising to learn that neither Samsung nor Apple are pioneers in this new wearable technology. <a href="https://ouraring.com/">Oura was launched in 2015</a> with a Kickstarter campaign for the first generation ring.</p>
<p>Now on its third generation, with the fourth one expected in 2024, this smart ring can measure respiratory rate, heart rate, health rate variability (HRV), blood oxygen levels, and body temperature. The ring also has an accelerator that logs the user’s activity and movement. However, the main question is: is wearable technology worth it?</p>
<h2>What is wearable technology?</h2>
<p>Wearable devices come in many shapes and sizes, including smart watches and sports watches, fitness trackers, head-mounted displays, smart jewellery, smart clothing, and even <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9185336/">implantable devices</a>.</p>
<p>Technological advances have enabled manufacturers to access low-cost, low-power sensor technology and develop this variety of devices. At a minimum, wearable devices are equipped with sensors, software and connecting technology.</p>
<p>The sensors gather information from the person wearing the device, and the software gathers the data and sends it to a device with processing capacity via a wireless connection. The ecosystem on which wearable technology works is <a href="https://www.oracle.com/uk/internet-of-things/what-is-iot/">known as the Internet of Things (IoT)</a>. It is the same principle as smart technology used at home, on devices such as thermostats that can be operated from a mobile device outside the home, or smart speakers, but applied at a personal level. It is important to note that mobile devices do not process the data; it is usually sent to “the cloud” for processing, and the mobile device displays the data to the user.</p>
<p>What makes an IoT solution even more attractive is the interpretation of the data gathered by the sensors. For example, the <a href="https://ouraring.com/oura-experience">Oura Ring and the Oura Membership</a> allow users to monitor their sleep, manage stress and predict when they might get sick by monitoring body temperature and heart rate. This is all possible due to analysis of the data collected by the ring. </p>
<p>With advances in artificial intelligence (AI), it is expected that in 2024, there will be a <a href="https://www.cnet.com/tech/mobile/what-to-expect-from-smartwatches-in-2024-more-ai-new-health-features-and-more/">boost in health tracking</a>.</p>
<figure class="align-center ">
<img alt="Smart watch and smart phone." src="https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=401&fit=crop&dpr=1 600w, https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=401&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=401&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/581298/original/file-20240312-22-xfl78v.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Smart rings are unlikely to replicate the functionality of smart watches and other devices.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/data-synchronization-health-book-between-smartwatch-188507768">Alexey Boldin</a></span>
</figcaption>
</figure>
<h2>Benefits and drawbacks</h2>
<p>Smart rings come with sensors similar to those of a smartwatch. However, because of their proximity to large blood vessels in the fingers, smart rings can provide more accurate readings than smartwatches, because they can use the capillaries (small blood vessels) in your finger to get their readings. Another advantage of smart rings is that they have a longer battery life than smartwatches. However, smart rings are unlikely to come with GPS or a screen.</p>
<p>In terms of price, the cheapest version of the Oura ring starts at £299 and users must pay a membership fee of £5.99 per month, with the first month free. This is required to get all the benefits of data analysis. However, the ring will still work with the Oura mobile app. The most affordable version of the AppleWatch, the SE version, starts at £219, while the Samsung Galaxy Watch6 Bluetooth starts at £239.</p>
<p>Smart rings can’t and won’t be able to replicate the functionality offered by a smartwatch. However, they represent an attractive choice for users interested in health tracking, who also want a simple device with minimalistic features. <a href="https://www.cnet.com/tech/mobile/samsungs-surprise-galaxy-ring-whos-the-wearable-actually-for/">Bryan Ma</a>, the Vice President of devices research at International Data Corporation, has said: “The idea behind such rings is not so much about being cheaper than smartwatches, but instead being a much smaller and discrete device for use in cases like sleep tracking.”</p>
<h2>The future of wearable technology?</h2>
<p>Wearable technology will continue evolving, with a strong focus on health monitoring. For example, Microsoft has been <a href="https://duoskin.media.mit.edu/">exploring smart tattoos</a> as the next generation of wearable tech since 2016. However, due to the labour intensive fabrication technique for gold leaf, which is used in the tattoos, researchers are now focusing on more robust, advanced, and inexpensive materials.</p>
<p>Researchers at the University of Washington have also <a href="https://www.washington.edu/news/2024/02/07/smart-earrings-can-monitor-temperature/">developed the thermal earring</a>. This was able to measure the user’s earlobe temperature but shows promise for other areas of monitoring, including for eating and exercise. Although not commercially available, this device demonstrates how engineers are developing new ideas for wearable devices.</p>
<p>Under Armour already sells <a href="https://www.underarmour.com/en-us/t/connected-shoes-page.html">running shoes embedded with Bluetooth and sensors</a> that track run statistics such as distance and pace. The shoes also measure running from metrics such as cadence (steps per minute), ground contact time, foot strike angle and stride length. </p>
<p>The app provides real time audio coaching, but only focuses on cadence. In future, we can expect to see advances in <a href="https://www.feelgoodcontacts.com/blog/smart-contact-lenses-of-the-future">smart contact lenses</a>, <a href="https://shop.jakcom.com/products/jakcom-n3-smart-nail-chip">smart nails</a>, <a href="https://www.nordicsemi.com/Nordic-news/2018/02/beam-smart-button">smart buttons</a>, and many more.</p>
<h2>Is wearable technology worth it?</h2>
<p>The expected increase in the market size of this technology shows users’ interest in monitoring their health and improving their lifestyle. Developments in the Internet of Things, in general, have improved our way of life and supported our wellbeing.</p>
<p>Connected devices collect, track, and store user data, which is the primary purpose of the technology. What users need to know is that many wearable devices share data with third party apps and services, and it is often unclear how this data is being used. The data can be sold to other companies or utilised for different purposes without the user’s knowledge or consent. Moreover, <a href="https://www.cnbc.com/2016/01/08/theres-a-hack-for-that-fitbit-user-accounts-attacked.html">wearable devices can be hacked</a>.</p>
<p>With this in mind, and as we have done with all new technology, users must consider the advantages of wearable technology and determine if the risks are worth taking. If security and data privacy are a concern, users are encouraged to follow all security recommendations provided by experts and manufacturers to protect their devices and research more on how their data is used and shared.</p><img src="https://counter.theconversation.com/content/225465/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Erika Sanchez-Velazquez does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>What are the benefits and drawbacks of putting smart technology into a ring?Erika Sanchez-Velazquez, Deputy Head of School, Computing and Information Science, Anglia Ruskin UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/2179092023-11-23T17:27:00Z2023-11-23T17:27:00ZWeWork approached physical space as if it were virtual, which led to the company’s downfall<figure><img src="https://images.theconversation.com/files/560964/original/file-20231122-24-25kyz6.jpg?ixlib=rb-1.1.0&rect=53%2C0%2C6000%2C3997&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The pandemic shifted work patterns and reduced the need for space, including shared offices.</span> <span class="attribution"><span class="source">(Shutterstock)</span></span></figcaption></figure><iframe style="width: 100%; height: 100px; border: none; position: relative; z-index: 1;" allowtransparency="" allow="clipboard-read; clipboard-write" src="https://narrations.ad-auris.com/widget/the-conversation-canada/wework-approached-physical-space-as-if-it-were-virtual-which-led-to-the-companys-downfall" width="100%" height="400"></iframe>
<p>On Nov. 6, the co-working firm WeWork filed for bankruptcy. WeWork, founded by Adam Neumann and Miguel McKelvey in 2010, had a simple business model: it signed long-term leases on urban buildings, fitting them out with modern work facilities. Then, it rented out desks, offices and meeting rooms to companies and freelancers seeking an easy-come, easy-go workplace.</p>
<p>WeWork was, in short, <a href="https://www.businessinsider.com/working-in-a-wework-2016-7">in the office subleasing business</a>.</p>
<p>Yet Neumann promoted the firm as if it were a tech company, peppering his presentations with the buzzy language of Silicon Valley. He promised clients his offices would boost workers’ social interaction, leading to untold innovations. The company even <a href="https://www.wired.com/2014/11/wework-commons/">developed an online social network, WeWork Commons</a>.</p>
<p>But the true “platform” for communication and collaboration, Neumann said, was the office space itself. He described WeWork as a “<a href="https://www.ft.com/content/f2e073a2-d0ef-11e5-831d-09f7778e7377">physical social network</a>” offering “<a href="https://www.wsj.com/articles/wework-is-valued-10-times-greater-than-this-profitable-public-rival-11566298801">space as a service</a>.”</p>
<p>WeWork’s collapse casts doubt on analogies between physical workspaces and computers that have proliferated in recent years. Is an office — where people go to work in the morning, sit at desks and talk across conference tables — best understood as a piece of digital infrastructure? </p>
<h2>Digital daydreams</h2>
<p>When Neumann cast offices as a form of information technology, he traded on an idea — wildly popular in the 2010s — that the boundary between physical space and computers was dissolving. </p>
<p>Business leaders and tech journalists predicted a soon-to-be-pervasive “<a href="https://www.bbc.com/news/business-15004063">internet of things</a>” (physical objects with embedded transmitters, so they can exchange data), the rise of “<a href="https://www.greenbiz.com/article/market-smart-city-technology-reach-16b-year-2020">smart cities</a>” (where municipal services are digitally monitored and optimized), and a new collective life in “<a href="https://edition.cnn.com/2009/TECH/10/24/tech.augmented.reality.apps/index.html">augmented reality</a>.”</p>
<p>These ideas are all based in real technology, but were caught up in a vortex of accelerating hype around the time WeWork was founded.</p>
<h2>Cybernetic architecture</h2>
<p>There’s a deeper history to predictions like this. In the 1960s, radical architects were enthralled by the rising field of computer science. They fantasized about buildings that would be as dynamic and responsive as a computer. These visions often had a countercultural tinge. For example, British architect Cedric Price <a href="https://www.moma.org/collection/works/845">designed a giant cultural centre</a> whose rooms would rearrange themselves in real time with the help of a digital algorithm and a built-in crane.</p>
<p><div data-react-class="InstagramEmbed" data-react-props="{"url":"https://www.instagram.com/p/CgY-__QMVc5","accessToken":"127105130696839|b4b75090c9688d81dfd245afe6052f20"}"></div></p>
<p>Hungarian-French artist Nicolas Schöffer tried the idea at an urban scale, <a href="https://www.naimaunlimited.com/biblio/nicolas-schoffer-la-ville-cybernetique/">imagining a “cybernetic city”</a> where citizens could alter their surroundings with the touch of a button. </p>
<p>And Japanese designer Kenzo Tange <a href="https://www.proquest.com/docview/1304275244">conceived buildings as giant communication apparatus</a> with corridors serving as “information channels.”</p>
<h2>Office as platform</h2>
<p>The digital pipe dreams that inspired these radical visions also filtered into the prosaic task of designing corporate offices. Earlier in the twentieth century, offices were thought of as, essentially, industrial buildings. They were factories for paperwork, with documents passing from one desk to another like a car part down an assembly line.</p>
<p>But during World War II, executives witnessed the military use giant mainframes for logistics and deciphering codes. Afterwards, many started thinking of an office filled with workers as a kind of computing infrastructure. </p>
<p>The influential West German consultant Eberhard Schnelle described an office as an “information processing facility, one in which information processing plays out <a href="https://doi.org/10.5169/seals-331536">between people and within people</a>.” To Schnelle, an office was like a programmable computer, with an algorithmic intelligence defined largely by its distinctive configuration of desks.</p>
<p>Amid the booming knowledge economy of the 1960s, CEOs loved the idea that they could improve office work just by freeing up the flow of communication. This theory inspired new office furniture like Herman Miller’s <a href="https://www.wired.com/2014/04/how-offices-accidentally-became-hellish-cubicle-farms/">Action Office</a> line of desks, shelves and partitions. </p>
<p><div data-react-class="InstagramEmbed" data-react-props="{"url":"https://www.instagram.com/p/CrLu05FM2Z0","accessToken":"127105130696839|b4b75090c9688d81dfd245afe6052f20"}"></div></p>
<p>Managers would constantly optimize the flow of information through the office by adjusting the layout of the modular desks, like a programmer feeding an updated algorithm into a mainframe.</p>
<p>That was the idea, anyway.</p>
<p>The fantasy that offices were as dynamic and frictionless as a computer program obscured the fact that real estate is stubbornly physical. As office buildings age, they need constant maintenance. Changing the interior is a messy undertaking. Even rearranging supposedly flexible desks and partitions may involve hundreds of specialized parts. And at the end of the day, there’s no guarantee it will improve how people work.</p>
<h2>The WeWork crash</h2>
<p>Analogies between offices and computers faded during the recession of the 1970s. But they never really died out — especially in the San Francisco Bay Area, where digital networks found a <a href="https://press.uchicago.edu/ucp/books/book/chicago/F/bo3773600.html">surprising following among ex-hippies seeking alternative forms of community</a>. When Neumann and McKelvey founded WeWork in 2010, few Silicon Valley investors stopped to question their analogy of an office to a social network.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="four people sitting around two tables in a coworking space" src="https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=333&fit=crop&dpr=1 600w, https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=333&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=333&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=419&fit=crop&dpr=1 754w, https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=419&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/560965/original/file-20231122-17-d3tx1p.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=419&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Co-working spaces like WeWork marketed their social networking opportunities as a benefit to members.</span>
<span class="attribution"><span class="source">(Shutterstock)</span></span>
</figcaption>
</figure>
<p>Their enterprise rode a wave of enthusiasm for all things digital, and secured ever larger investments from tech venture capitalists. Yet, as analysts pointed out in retrospect, <a href="https://www.penguinrandomhouse.com/books/645810/the-cult-of-we-by-eliot-brown-and-maureen-farrell/">the business model of a tech firm never made sense for WeWork</a>. A real estate company does not enjoy the same economies of scale or network effects as an online platform. Finally, in 2019, WeWork could no longer hide the fact that it was still losing money.</p>
<p>The company’s bankruptcy brings this saga to a close. It also casts doubt on the idea that more communication and connectedness are always better — an article of faith derived from the flower-child utopianism of early Silicon Valley.</p>
<p>Conflating physical space and digital platforms flattens the richness of social interaction into the linear logic of an algorithm. WeWork promoted the virtues of socializing, but only with fellow white-collar millennials — and always with an entrepreneurial sense of self-promotion. </p>
<p>Imagining buildings and cities as digital platforms erodes a sense of place where one could have a palpable sense of belonging, with a legible relation to the <a href="https://press.princeton.edu/books/paperback/9780691208053/a-city-is-not-a-computer">public realm</a>.</p>
<p>Predictions about the future of the office often hang on fantasies of an imminent work revolution that never actually takes place. If history is any guide, office design and online systems will keep evolving in parallel, as distinct — and often complementary — technologies for work. The office will remain a place, not a platform.</p><img src="https://counter.theconversation.com/content/217909/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Joseph L. Clarke receives funding from the Social Sciences and Humanities Research Council of Canada.</span></em></p>WeWork’s bankruptcy casts doubt on hype that the boundaries between physical space and computer technology are dissolving.Joseph L. Clarke, Associate Professor, History of Modern Architecture, University of TorontoLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1931812023-11-08T13:58:08Z2023-11-08T13:58:08ZInternet of Things: tech firms have become our digital landlords – but people are starting to fight back<figure><img src="https://images.theconversation.com/files/556337/original/file-20231027-29-uknyr4.jpg?ixlib=rb-1.1.0&rect=17%2C11%2C3858%2C2481&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/smart-home-concept-remote-control-management-2239959019vvvvv">Hodoimg</a></span></figcaption></figure><p>From smart toasters to fitness collars for dogs, we live in a world where everything around us is gradually being connected to the internet and fitted with sensors so that we can interact with them online. </p>
<p>Many people worry about the privacy risks of using these devices because they may allow hackers to listen to our conversations at home. But the contracts for using them are so long we don’t understand which other rights we might be signing away. </p>
<p>During research for <a href="https://www.taylorfrancis.com/books/oa-mono/10.4324/9780429468377/internet-things-law-guido-noto-la-diega?_gl=1*1ybqum4*_ga*MTUyNDIzODc3OC4xNjk1MTM2Nzkx*_ga_0HYE8YG0M6*MTY5ODY4NzM0MS44LjAuMTY5ODY4NzM0MS4wLjAuMA..">my book</a>, I found that using Alexa’s voice command triggers 246 contracts that we have had to accept in order to use it. These contracts transfer our rights and data to countless, often unidentified, parties. For example, they frequently refer to “affiliates”. </p>
<p>Despite months of research I wasn’t able to clarify who these affiliates are or even whether these affiliates are subsidiaries or advertisers. Of the 246 contracts, I focused on those that are most likely to be relevant to smart speaker Echo’s users. I found they are on average as long as Harry Potter and the Prisoner of Azkaban (317 pages). Not exactly a light read. </p>
<p>Data analysis company <a href="https://9to5mac.com/2021/12/17/read-apples-terms-and-conditions/">Statista found</a>, it would take an hour and a half to read Apple’s terms and conditions for creating an Apple ID. And that’s assuming you don’t need to pause to check the text’s meaning. </p>
<p>Using the Literatin plugin, a Google Chrome extension that assesses the readability of text, I found these contracts are as readable as Machiavelli’s 16th-century political treatise, The Prince. </p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"1471834765959602181"}"></div></p>
<h2>Does this matter?</h2>
<p>Until recently, we might have been forgiven for thinking that the terms and conditions (T&Cs) we accept when browsing the internet were just a box-ticking exercise and nothing to worry about. </p>
<p>But between January and July 2023, Europe’s lead data protection enforcement authorities – the <a href="https://noyb.eu/en/breaking-meta-prohibited-use-personal-data-advertising">European Data Protection Board</a> and the <a href="https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:62021CJ0252">EU Court of Justice</a> – shed light on Meta’s (formerly known as Facebook, Inc) practice of relying on these contracts to target us with ads. And, in an unprecedented move, they banned this practice.</p>
<p>T&Cs are not just about our privacy – and our privacy is not just about our data. By surrounding ourselves with devices with sensors (also known as the “<a href="https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT">Internet of Things</a>)”, we’ve effectively invited <a href="https://www.researchgate.net/publication/332821471_Review_of_Joshua_AT_Fairfield_Owned_Property_Privacy_and_the_New_Digital_Serfdom">digital landlords</a> into our homes.</p>
<p><a href="https://www.primevideo.com/help?nodeId=202095490&view-type=content-only">One example</a> I refer to in my book can be found in an Amazon contract that legally binds anyone watching videos on their Echo devices: “Purchased digital content … may become unavailable … and Amazon will not be liable to you”. </p>
<p>In other words, if you think that you own your digital content only because you are purchasing it, think again: can we call it property if it can be taken away randomly? </p>
<p>Companies do act on these types of hidden clauses. In 2019 <a href="https://www.nytimes.com/2009/07/18/technology/companies/18amazon.html">Amazon (rather fittingly) took back the ebooks</a> of George Orwell’s Animal Farm and 1984 from its Kindle users due to alleged copyright issues.</p>
<p>Another example is how tractor manufacturer John Deere relied on its end-user licence agreement (Eula) to <a href="https://www.eff.org/deeplinks/2016/12/john-deere-really-doesnt-want-you-own-tractor">stop farmers repairing</a> their smart tractors. John Deere’s Eula forbade customers even looking at the software it uses to run its tractors. </p>
<p>Betting giant Spreadex took a customer, Colin Cochrane to court to force him to pay almost £50,000 of gambling losses in 2012, racked up by his stepson. Cochrane’s girlfriend’s son had been “playing” with his computer without his permission while he was away from the house. </p>
<p>Spreadex pointed the UK account owner to a clause in its customer agreement that equated the use of account passwords with a confirmation of who was behind the screen using the device. </p>
<p>Fortunately for Cochrane, the judge held that the clause was not enforceable because it would have been “<a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWHC/Comm/2012/1290.html">quite irrational</a>” for Spreadex to assume the customer read the agreement and understood its implications.</p>
<h2>Regulation won’t work</h2>
<p>Examples of law reform include the <a href="https://www.gov.uk/government/news/uk-children-and-adults-to-be-safer-online-as-world-leading-bill-becomes-law#:%7E:text=The%20Act%20places%20legal%20responsibility,and%20eating%20disorders%2C%20and%20pornography.">online safety bill in the UK</a> and the <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3491">Data Act in the EU</a>. They are both in progress, so we don’t know yet when they will be adopted. </p>
<p>Law reform is a <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2682489">painfully slow process</a>. Big tech and other large stakeholders have a huge influence because they have <a href="https://www.cnbc.com/2020/07/31/big-tech-spends-20-million-on-lobbying-including-on-coronavirus-bills.html">money and influence</a> to fight laws they don’t like. </p>
<p>Sometimes bills end up so diluted they are of little use. This was the case with the General Data Protection Regulation (GDPR) which came into effect at the end of a <a href="https://iapp.org/resources/article/a-brief-history-of-the-general-data-protection-regulation/">nine-year process</a>. It was born out of date. Several studies have underlined GDPR’s <a href="https://www.elgaronline.com/view/edcoll/9781800371675/9781800371675.00031.xml">inadequacy to deal with new technologies</a> such as ChatGPT. </p>
<h2>What does work</h2>
<p>The solution is to collectively organise. Let’s circle back to John Deere and the way the company tried to deprive tractor owners of their right to fix their machines. There is much to learn from those farmers who joined together with hackers to resist “smart power abuses”. </p>
<p>After <a href="https://www.vice.com/en/article/kbgzgz/farmers-right-to-repair">opposing their right to repair campaign</a> for years, at the beginning of 2023 John Deere gave in and authorised farmers and ranchers to <a href="https://www.theverge.com/2023/1/9/23546323/john-deere-right-to-repair-tractors-agreement">fix their own tractors</a>. But only after attendees at a hacker’s convention figured out how to “jailbreak” the code that was locking farmers and engineers out. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/liberate-the-tractors-the-right-to-repair-movement-thats-regaining-control-of-our-devices-188954">'Liberate the tractors': the right to repair movement that's regaining control of our devices</a>
</strong>
</em>
</p>
<hr>
<p>All around the world, groups of computer scientists, digital rights activists, citizens are <a href="https://www.ft.com/content/50e87334-597c-4ef5-adc9-2ea4ee823161">creating cooperatives</a> and <a href="https://www.meetup.com/topics/internet-of-things/">citizen-led movements</a>. They are motivated by partly different <a href="https://www.bbc.co.uk/news/technology-57744091">yet overlapping goals</a> for example making the IoT more open and diverse. </p>
<p>Big tech workers are acting collectively to prevent unethical uses of their employers’ technology. For example, <a href="https://www.cnbc.com/2020/06/22/google-employees-petition-company-to-cancel-police-contracts.html#:%7E:text=The%20announcement%20came%20after%20thousands,are%20using%20it%20for%20harm.">in 2020 Google employees</a> fought to stop the company’s decision to provide its AI to law enforcement agencies despite the <a href="https://sitn.hms.harvard.edu/flash/2020/racial-discrimination-in-face-recognition-technology/">failures of facial recognition</a>, which has often <a href="https://www.scientificamerican.com/article/police-facial-recognition-technology-cant-tell-black-people-apart/">perpetuated racism</a> and other forms of discrimination. </p>
<p>We can win the fight against smart power through alliances between these collectives.</p><img src="https://counter.theconversation.com/content/193181/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Guido Noto La Diega receives funding from the Arts and Humanities Research Council and the German Research Foundation - project ref no AH/W010518/1 "From Smart Technologies to Smart Consumer Laws: Comparative Perspectives from Germany and the United Kingdom". They serve on the Advisory Council of the Open Rights Group Scotland.</span></em></p>No one has time to read the terms and conditions we are often asked to consent to. But we’re sometimes agreeing to things we would rather not.Guido Noto La Diega, Chair in Intellectual Property and Technology Law, University of StirlingLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1981322023-03-13T12:26:07Z2023-03-13T12:26:07ZWhat exactly is the internet? A computer scientist explains what it is and how it came to be<figure><img src="https://images.theconversation.com/files/514565/original/file-20230309-22-6ji5en.jpg?ixlib=rb-1.1.0&rect=0%2C7%2C5190%2C3441&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The internet is used for a lot more than just surfing the web.</span> <span class="attribution"><a class="source" href="https://www.gettyimages.com/detail/photo/fourth-grade-students-work-on-laptops-in-class-royalty-free-image/608052049">Jonathan Kirn/The Image Bank via Getty Images</a></span></figcaption></figure><figure class="align-left ">
<img alt="" src="https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=293&fit=crop&dpr=1 600w, https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=293&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=293&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=368&fit=crop&dpr=1 754w, https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=368&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/281719/original/file-20190628-76743-26slbc.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=368&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
</figcaption>
</figure>
<p><em><a href="https://theconversation.com/us/topics/curious-kids-us-74795">Curious Kids</a> is a series for children of all ages. If you have a question you’d like an expert to answer, send it to <a href="mailto:curiouskidsus@theconversation.com">curiouskidsus@theconversation.com</a>.</em></p>
<hr>
<blockquote>
<p><strong>What exactly is the internet? Nora, age 8, Akron, Ohio</strong></p>
</blockquote>
<hr>
<p>The internet is a global collection of computers that know how to send messages to one another. Practically everything connected to the internet is indeed a computer – or has one “baked inside” of it. </p>
<p>In the early 1960s, computers were used only for special purposes, like <a href="https://www.sciencesource.com/1756131-livermore-advanced-research-computer-1960.html">scientific research</a>. There weren’t a lot of them because they were large and expensive. One computer and its attached accessories could <a href="https://www.pimall.com/nais/pivintage/burroughscomputer.html">easily fill a room</a>. To exchange data, people would plan time to work together, and one computer would <a href="https://medium.com/dish/75-years-of-innovation-acoustic-modem-6a5e56e5b6ee">connect to another with a telephone call</a>.</p>
<p>The U.S. government wanted a network that would allow computers to communicate automatically and <a href="https://www.internethalloffame.org/2012/09/06/what-do-h-bomb-and-internet-have-common-paul-baran/">even if some telephone lines were cut off</a>. Suppose you wanted to send a message from Computer A to Computer B in each of three different types of networks. The first is a network with one central computer connected to all the others as spokes. The second is a network of several of these hub-and-spoke networks with their hubs connected. The third is a network where every computer is connected to several others, forming a kind of mesh. Which do you think would be most reliable if some computers and links were damaged? </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="three diagrams showing many tiny figures connected by lines" src="https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=451&fit=crop&dpr=1 600w, https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=451&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=451&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=567&fit=crop&dpr=1 754w, https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=567&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/514724/original/file-20230310-462-lhuuzz.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=567&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">To get a message from A to B, which type of network is most likely to keep working if some of the lines are cut?</span>
<span class="attribution"><a class="source" href="https://commons.wikimedia.org/wiki/File:P2P_Topology.jpg">Txelu Balboa via Wikimedia Commons</a>, <a class="license" href="http://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA</a></span>
</figcaption>
</figure>
<p>The first network is vulnerable, because if the central computer is lost, then none of the computers can communicate. The second network is vulnerable because if any of the hub computers are lost, the path between A and B is cut. But in the third network, many individual computers and links could be lost and there would still be a path to connect A and B. So the third network would be the most reliable.</p>
<h2>Hot potatoes</h2>
<p>An American engineer named <a href="https://www.rand.org/about/history/baran.html">Paul Baran</a> worked on this problem at a company called the Rand Corp. In 1962, he published a new idea for computer networks, which he called “<a href="https://culture.pl/en/article/how-paul-baran-invented-the-internet">hot potato networking</a>.”</p>
<p>In Baran’s idea, a message would be broken up into lots of little pieces – the potatoes. When Computer A wanted to sent its message to Computer B, it would individually send the little potatoes to a neighbor computer. That computer would pass it along in the right direction as soon as it could. To make sure messages were delivered quickly, the message pieces were treated as if they were hot, so you didn’t want them in your hands for too long.</p>
<p>The messages included a sequence number so when they arrived at Computer B, the final destination computer, that machine would know how to put them in the proper order to receive the full message.</p>
<p>Baran’s idea got implemented as <a href="https://www.ibiblio.org/pioneers/baran.html">the ARPANET</a>. This network was the immediate predecessor to today’s internet. </p>
<p>Instead of hot potatoes, the system got a more formal name, which we still use: “<a href="https://www.geeksforgeeks.org/packet-switched-network-psn-in-networking/">packet switched networking</a>.” The potato got renamed as a packet – a small piece of the full message. </p>
<p><a href="https://en.wikipedia.org/wiki/Vint_Cerf">Vinton Cerf</a>, an American computer scientist, is known as one of the fathers of the internet. He contributed many essential ideas, including that the receiving computer could ask the sending computer for a packet that went missing – which they sometimes do. This has the name <a href="https://www.wired.com/2012/04/epicenter-isoc-famers-qa-cerf/">Transmission Control Protocol</a>, or TCP.</p>
<h2>A web of pages</h2>
<p>Another important contributor was <a href="https://en.wikipedia.org/wiki/Tim_Berners-Lee">Tim Berners-Lee</a>, a British computer scientist. Berners-Lee was working at CERN, the European Organization for Nuclear Research. He wanted to create a system for his colleagues to better share their research results with one another.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="a photograph of a man sitting in front of a cathode ray tube computer monitor" src="https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=385&fit=crop&dpr=1 600w, https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=385&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=385&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=484&fit=crop&dpr=1 754w, https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=484&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/514746/original/file-20230310-22-cbebaz.JPG?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=484&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Tim Berners-Lee invented the World Wide Web in the early 1990s.</span>
<span class="attribution"><a class="source" href="https://cds.cern.ch/images/CERN-GE-9407011-31">CERN</a>, <a class="license" href="http://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC</a></span>
</figcaption>
</figure>
<p>Around 1990, Berners-Lee came up with the idea that a computer could host a collection of “pages,” each of which had <a href="https://webfoundation.org/about/vision/history-of-the-web/">text, images and links to other pages</a>. He created an easy way for links to specify any computer – the concept of the URL, or <a href="https://www.welcometothejungle.com/en/articles/btc-url-internet">Uniform Resource Locator</a>.</p>
<p>Berners-Lee named the system the <a href="https://thenextweb.com/news/how-the-world-wide-web-was-nearly-called-the-information-mesh">World Wide Web</a>. He wrote the code for the first web browser, to view web pages, and web server, to deliver them. If you see a URL that includes “www” – that’s from the original name.</p>
<p>Berners-Lee may have been planning to use the web particularly to share text, images and files. But the earlier work on the internet <a href="https://www.thebroadcastbridge.com/content/entry/10882/a-brief-history-of-ip-audio-networks">made the web suitable for video and sound, too</a>. YouTube, Instagram and TikTok are built using the same rules, or protocols, developed by Cerf and Berners-Lee.</p>
<h2>Internet of Things</h2>
<p>In the past 20 years, computers have become even more powerful and inexpensive. Now, a computer chip that can <a href="https://www.nabto.com/how-much-iot-device-cost-business/">connect directly to the internet sells for US$5</a> – a lot less than today’s laptops and cellphones (about $300) or yesterday’s room-size computers ($1 million or more!). </p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="a refrigerator with a water dispenser on the left door and a large display screen on the right door" src="https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=659&fit=crop&dpr=1 600w, https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=659&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=659&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=829&fit=crop&dpr=1 754w, https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=829&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/514561/original/file-20230309-22-mth9ci.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=829&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Many newer appliances like this smart refrigerator are connected to the internet.</span>
<span class="attribution"><a class="source" href="https://en.wikipedia.org/wiki/Smart_refrigerator#/media/File:Samsungfamilyhub.png">Paul Stefaan Mooij/Wikimedia Commons</a>, <a class="license" href="http://creativecommons.org/licenses/by-nc-sa/4.0/">CC BY-NC-SA</a></span>
</figcaption>
</figure>
<p>This lower cost has led to <a href="https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/">millions upon millions</a> of devices connected to the internet. These devices include sensors. A <a href="https://www.safewise.com/smart-home-faq/how-do-smart-thermostats-work/">smart thermostat</a> monitors your house using a temperature sensor. A security camera keeps an eye on your front porch using an array of tiny light sensors.</p>
<p>These devices also include <a href="https://www.geeksforgeeks.org/actuators-in-iot/">actuators – mechanisms that control activity</a> in the physical world. For example, a smart thermostat can turn on and off the heating and cooling systems in your house.</p>
<p>Together, all these smart devices are called the <a href="https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot">Internet of Things</a>, or IoT. The internet includes not only computers and phones, but all these IoT devices. You may have a <a href="https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot">smart refrigerator</a> that has a camera inside of it. When it notices you’re out of milk, it will send a message to your cellphone, reminding you to buy more.</p>
<p>Just about everything is connected to the internet now.</p>
<hr>
<p><em>Hello, curious kids! Do you have a question you’d like an expert to answer? Ask an adult to send your question to <a href="mailto:curiouskidsus@theconversation.com">CuriousKidsUS@theconversation.com</a>. Please tell us your name, age and the city where you live.</em></p><img src="https://counter.theconversation.com/content/198132/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Fred Martin receives funding from the National Science Foundation and Google.</span></em></p>Almost everybody uses the internet just about every day. But do you really know what the internet is?Fred Martin, Professor of Computer Science, UMass LowellLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1889542022-08-22T16:00:13Z2022-08-22T16:00:13Z‘Liberate the tractors’: the right to repair movement that’s regaining control of our devices<figure><img src="https://images.theconversation.com/files/480316/original/file-20220822-71718-67fm5m.jpeg?ixlib=rb-1.1.0&rect=206%2C4%2C2788%2C1913&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">A software 'jailbreak' gave US farmers the power to repair their vehicles.</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/john-deere-tractor-disc-cultivator-vaderstad-2042555513">Maksim Safaniuk/Shutterstock</a></span></figcaption></figure><p>The software that runs John Deere tractors was successfully “<a href="https://www.kaspersky.com/resource-center/definitions/what-is-jailbreaking">jailbroken</a>” at this year’s <a href="https://defcon.org/">DEF CON</a> hacker convention, enabling farmers to repair or retune their equipment without engaging with the company that sold them their vehicles. </p>
<p>The hacker involved, who calls himself Sick Codes, was responding directly to US farmers’ <a href="https://www.bloomberg.com/news/features/2020-03-05/farmers-fight-john-deere-over-who-gets-to-fix-an-800-000-tractor">long-standing concerns</a> that their “smart” tractors are run on software that only John Deere can access to repair. Smart tractors, including those manufactured by John Deere, are also <a href="https://aea.uk.com/industry-insight/tractor-statistics/">widely used</a> in the UK. </p>
<p>Sick Codes’ jailbreak was undertaken to “<a href="https://www.wired.com/story/john-deere-tractor-jailbreak-defcon-2022/">liberate the tractors</a>”, he said. John Deere responded in a <a href="https://www.wired.com/story/john-deere-tractor-jailbreak-defcon-2022/">statement to Wired magazine</a> that it works closely with cybersecurity partners and also “embraces the broader ethical hacking community” to ensure its security capabilities remain industry-leading. In March 2022, the manufacturer responded to pressure from farmers with the <a href="https://www.deere.com/en/news/all-news/john-deere-expands-access-to-self-repair-resources/">announcement</a> that it would make more of its software repair tools available to customers and mechanics from next year. </p>
<p>The smart tractor is just one of thousands of machines and devices that have come to feature an <a href="https://www.verdict.co.uk/what-is-the-internet-of-things/">additional layer</a> of software on top of their traditional functions. By maintaining control over that software, manufacturers are afforded power over our devices long after the moment we purchase them.</p>
<p>Hacking tractor software is the latest example of the fightback against this power, called the “<a href="https://www.nytimes.com/2020/10/23/climate/right-to-repair.html">right to repair</a>” movement. Motivated by consumer rights and environmental concerns, it’s a movement that’s gathering pace worldwide. But our research shows the power remains firmly in manufacturers’ hands – for now.</p>
<h2>Consumer exploitation</h2>
<p>Owners of smart or “Internet of Things” (IoT) devices – from smartphones to internet-connected <a href="https://www.rollingstone.com/product-recommendations/lifestyle/best-smart-coffee-maker-machine-1027282/">coffee makers</a> – may have experienced similar frustrations to the owners of John Deere tractors. </p>
<p>To encourage customers to purchase their latest device, some tech firms effectively shut down older models by withdrawing the digital support services that keep them up and running. Sonos, the smart speaker company, was <a href="https://www.theregister.com/2020/01/24/sonos_support_legacy_speakers/">forced to backtrack</a> in 2020 after criticism of its plans to <a href="https://edition.cnn.com/cnn-underscored/electronics/sonos-legacy-speakers-guide">phase out</a> its older speakers in this way. In an open letter addressing customers’ outrage, Sonos CEO Patrick Spence admitted that “we did not get this right from the start”.</p>
<p>Additional layers of software also allow manufacturers to control their customers’ access to features built in to their products. For instance, BMW now requires new customers to purchase a subscription to use the <a href="https://www.theverge.com/2022/7/12/23204950/bmw-subscriptions-microtransactions-heated-seats-feature">heated seats</a> installed in the vehicles they own.</p>
<p>Many smart devices are purposefully designed to have short lives and to be quickly usurped by newer models, a manufacturing strategy termed <a href="https://durabilitymatters.com/planned-obsolescence/">planned obsolescence</a>. Other practices, such as adjusting a smartphone’s battery performance via its operating system, have led to accusations of deliberate <a href="https://www.techrepublic.com/article/how-to-turn-off-battery-throttling-on-your-iphone/">battery throttling</a> by manufacturers to increase sales.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/7aYJPonRJd8?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>Manufacturers argue that their control over internet-connected products is necessary to protect consumers from cybersecurity threats. But that control sometimes seems to exploit their customers. It’s also a key factor in the increase in the number of devices going to landfill as electronic waste, or <a href="https://globalewaste.org/what-is-e-waste/">e-waste</a>, and the extraction of more and more of the <a href="https://www.salon.com/2022/05/11/rare-earth-metal-ewaste-mining/">planet’s precious resources</a>. </p>
<p>In 2019 alone, the world generated 53.6 million tons of e-waste, a figure which is expected to grow to <a href="https://www.itu.int/en/ITU-D/Environment/Documents/Toolbox/GEM_2020_def.pdf">74.7 million tons by 2030</a>. Across Europe, less than <a href="https://ec.europa.eu/eurostat/databrowser/view/T2020_RT130/bookmark/table?lang=en&bookmarkid=a69be825-957e-473c-a81f-f02866dc9141">40% of e-waste</a> is subject to <a href="https://eprints.lancs.ac.uk/id/eprint/131084/1/Stead_Coulton_Lindley_Coulton._2019._The_Little_Book_of_Sustainability_for_the_Internet_of_Things.pdf">sustainable recovery</a> such as material recycling and reusable component harvesting. </p>
<p>By 2030, it is estimated there will be more than <a href="https://www.statista.com/statistics/1194701/iot-connected-devices-use-case/">25 billion</a> active smart devices worldwide. Many of these will be destined for landfill within a few short years if current manufacturing practices persist.</p>
<h2>The right to repair</h2>
<p>To address these issues, campaign groups like <a href="https://repair.eu/">Repair.EU</a>, <a href="https://www.repair.org/">Repair.org</a> and <a href="https://therestartproject.org/">The Restart Project</a> have successfully lobbied governments to introduce “<a href="https://www.which.co.uk/news/2021/06/new-right-to-repair-laws-introduced-what-do-they-actually-mean-for-you/">right to repair</a>” legislation for electronic products. These laws were first announced at the <a href="https://ec.europa.eu/environment/circular-economy/pdf%2520/new_circular_economy_action_plan.pdf">EU level</a> in 2020 and came into effect across the <a href="https://researchbriefings.files.parliament.uk/documents/CBP-9302/CBP-9302.pdf">UK</a> in the summer of 2021. </p>
<p>On the surface, the legislation seemingly tilts the balance of power into the hands of consumers. The law encourages manufacturers to be more sustainable by designing their electronic products to be easier to repair. It also compels them to supply spare parts for ten years after their products’ initial production.</p>
<p>Yet the reality is that manufacturers still retain the controlling stake. The current right to repair only extends to a <a href="https://www.which.co.uk/news/2021/06/new-right-to-repair-laws-introduced-what-do-they-actually-mean-for-you/">limited number of products</a>, such as washing machines, dishwashers, and refrigerators. It does not include smart, IoT devices, despite the growing volume of IoT e-waste.</p>
<h2>Power to the people?</h2>
<p>Appearing to support the right to repair, Apple initiated a product repair programme in 2022. But the firm loans its repair equipment to customers at a high cost and continues to promote <a href="https://www.youtube.com/watch?v=fz2R7-zTdKk">serialisation</a>, whereby only approved, expensive components can be used for repairs. The repair equipment itself has also been <a href="https://www.theverge.com/2022/5/21/23079058/apple-self-service-iphone-repair-kit-hands-on">criticised</a> for being cumbersome and difficult to use.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/0NCjoUx-KLI?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>In a setback for right to repair activists, the UK government decided in June 2022 <a href="https://www.bbc.co.uk/news/technology-61720276">not to follow Europe</a> and sign up to a common standard for the design of USB ports, which aims to reduce the tangle of different wires we all own. That decision will only bolster the lack of <a href="https://www.techtarget.com/searchapparchitecture/definition/interoperability">interoperability</a> we experience between different devices and will hinder our ability to reduce IoT e-waste in the coming years.</p>
<p>Most importantly, our research has revealed, the general population lacks the capacity to repair their devices – in part because the tools to do so have been withheld from them for so long.</p>
<h2>Community repair shops</h2>
<p>To address this critical issue, we started <a href="https://twitter.com/RepairShop2049">The Repair Shop 2049</a> project to investigate how ordinary people could learn to repair their own devices. With this research, we have sought to challenge the status quo of manufacturer control by developing an open, citizen-led IoT repair centre in Blackburn, UK.</p>
<p>Collaborating closely with <a href="https://www.makingrooms.org/">The Making Rooms</a>, Blackburn’s public makerspace and creative hub for digital innovation, our work is seeking to empower ordinary citizens with the knowledge, tools and confidence to repair and reuse IoT devices within their communities.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/WPMPtilRX5c?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>Our project involves makers, repairers, council leaders, consumers and manufacturing representatives. Our workshops have so far revealed a number of barriers: chiefly, a lack of public awareness of the right to repair, a shortage of practical expertise, and the friction generated by manufacturers’ presiding grip on device repair. However, there is also a deep enthusiasm for the project’s vision among the Blackburn community.</p>
<p>The upcoming <a href="https://www.lancaster.ac.uk/news/fixing-the-future-the-right-to-repair-and-equal-iot">Fixing the Future</a> project will allow us to continue exploring local IoT repair initiatives alongside The Making Rooms, our research colleagues from Edinburgh, Nottingham, and Napier universities, and our new partners at Which? and <a href="https://www.bbc.co.uk/rd">BBC R&D</a>.</p>
<p>Whether liberating tractors or granting consumers the ability to fix their phones, the right to repair movement aims to hand power back to the owners of devices. But by aligning with <a href="https://www.eea.europa.eu/publications/europe2019s-consumption-in-a-circular/benefits-of-longer-lasting-electronics">circular economy</a> principles, the movement can also help communities reduce e-waste and contribute towards a sustainable, <a href="https://cop25.mma.gob.cl/en/climate-ambition-alliance/">net-zero future</a>.</p><img src="https://counter.theconversation.com/content/188954/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Michael Stead receives funding for The Repair Shop 2049 project from the EPSRC ESRC Impact Accelerator Digital Futures scheme at Lancaster University.</span></em></p><p class="fine-print"><em><span>Paul Coulton receives funding from EPSRC for project Experiencing the Future Mundane and Fixing the Future. </span></em></p>From tractors to smartphones, consumers may own their devices but the manufacturers still often hold the keys.Michael Stead, Lecturer in Sustainable Design Futures, Lancaster UniversityPaul Coulton, Senior Lecturer in Design, Lancaster UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1818302022-08-11T12:13:39Z2022-08-11T12:13:39ZFarmers can save water with wireless technologies, but there are challenges – like transmitting data through mud<figure><img src="https://images.theconversation.com/files/478568/original/file-20220810-12-v7tt1o.jpg?ixlib=rb-1.1.0&rect=0%2C0%2C5300%2C3520&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Wireless sensors and data systems can help farmers use water much more efficiently by monitoring soil conditions.</span> <span class="attribution"><a class="source" href="https://www.gettyimages.ie/detail/news-photo/pivot-irrigation-sprinkler-hanover-virginia-september-20-news-photo/623544064">Lance Cheung/USDA via Smith Collection/Gado/Getty Images</a></span></figcaption></figure><p>Water is the most essential resource for life, for both humans and the crops we consume. Around the world, agriculture accounts for <a href="https://blogs.worldbank.org/opendata/chart-globally-70-freshwater-used-agriculture">70% of all freshwater use</a>.</p>
<p>I study <a href="https://www.google.com/search?kgmid=/g/11gr6_nlm6">computers and information technology</a> in the Purdue Polytechnic Institute and direct Purdue’s <a href="https://polytechnic.purdue.edu/facilities/environmental-networking-technology-laboratory">Environmental Networking Technology (ENT) Laboratory</a>, where we tackle sustainability and environmental challenges with interdisciplinary research into the <a href="http://dx.doi.org/10.1007/978-3-030-35291-2_3">Agricultural Internet of Things</a>, or Ag-IoT. </p>
<p>The <a href="https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/">Internet of Things</a> is a network of objects equipped with sensors so they can receive and transmit data via the internet. Examples include wearable fitness devices, smart home thermostats and self-driving cars. </p>
<p>In agriculture, it involves technologies such as wireless underground communications, subsurface sensing and antennas in soil. These systems help farmers track conditions on their land in real time, and apply water and other inputs such as fertilizer exactly when and where they are needed.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="White sticks embedded in soil among corn stalks" src="https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=423&fit=crop&dpr=1 600w, https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=423&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=423&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=532&fit=crop&dpr=1 754w, https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=532&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/460161/original/file-20220427-24-m731go.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=532&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Sensors installed in a corn field.</span>
<span class="attribution"><span class="source">Abdul Salam</span>, <a class="license" href="http://creativecommons.org/licenses/by-nd/4.0/">CC BY-ND</a></span>
</figcaption>
</figure>
<p>In particular, <a href="http://dx.doi.org/10.1007/978-3-030-50861-6_11">monitoring conditions in the soil</a> has great promise for helping farmers use water more efficiently. Sensors can now be wirelessly integrated into irrigation systems to provide real-time awareness of soil moisture levels. Studies suggest that this strategy can reduce water demand for irrigation by anywhere from <a href="https://doi.org/10.1007/s40003-021-00604-5">20%</a> to <a href="http://dx.doi.org/10.1109/WF-IoT.2015.7389138">72%</a> without hampering daily operations on crop fields. </p>
<h2>What is the Agricultural Internet of Things?</h2>
<p>Even in dry places such as the Middle East and North Africa, farming is possible with efficient water management. But extreme weather events driven by climate change are making that harder. <a href="https://www.ers.usda.gov/newsroom/trending-topics/drought-in-the-western-united-states/">Recurrent droughts in the western U.S.</a> over the past 20 years, along with other disasters like wildfires, have caused <a href="https://brownfieldagnews.com/news/drought-and-wildfire-the-costliest-disasters-for-crop-farmers-in-2021/">billions of dollars in crop losses</a>.</p>
<p>Water experts have measured soil moisture to inform water management and irrigation decisions for decades. Automated technologies have largely replaced hand-held soil moisture tools because it is hard to take manual soil moisture readings in production fields in remote locations. </p>
<p>In the past decade, wireless data harvesting technologies have begun to provide real-time access to soil moisture data, which makes for better water management decisions. These technologies could also have many advanced IoT applications in public safety, urban infrastructure monitoring and food safety. </p>
<p>The Agricultural Internet of Things is a network of <a href="https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1014&context=cit_articles">radios, antennas and sensors</a> that gather real-time crop and soil information in the field. To facilitate data collection, these sensors and antennas are <a href="https://doi.org/10.3390/s16122096">interconnected</a> wirelessly with farm equipment. The Ag-IoT is a complete framework that can detect conditions on farmland, suggest actions in response and send commands to farm machinery.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="Graphic showing satellites, drones, wireless underground communications systems and other digital components collecting and sharing signals around a farm" src="https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=368&fit=crop&dpr=1 600w, https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=368&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=368&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=462&fit=crop&dpr=1 754w, https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=462&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/478601/original/file-20220810-24-uwqksn.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=462&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Technologies that together comprise the Agricultural Internet of Things.</span>
<span class="attribution"><span class="source">Abdul Salam/Purdue University</span>, <a class="license" href="http://creativecommons.org/licenses/by-nd/4.0/">CC BY-ND</a></span>
</figcaption>
</figure>
<p>Interconnecting devices such as soil moisture and temperature sensors in the field makes it possible to <a href="https://doi.org/10.1016/j.adhoc.2018.07.017">control irrigation systems and conserve water autonomously</a>. The system can schedule irrigation, <a href="https://doi.org/10.1016/j.biosystemseng.2019.12.013">monitor environmental conditions</a> and control farm machines, such as seed planters and fertilizer applicators. Other applications include <a href="http://dx.doi.org/10.3934/mbe.2019273">estimating soil nutrient levels</a> and <a href="https://doi.org/10.1094/PDIS.2002.86.4.336">identifying pests</a>.</p>
<h2>The challenges of putting networks underground</h2>
<p>Wireless data collection has the potential to help farmers use water much more efficiently, but putting these components in the ground creates challenges. For example, at the Purdue ENT Lab, we have found that when the antennas that transmit sensor data are buried in soil, their operating characteristics change drastically depending on how moist the soil is. My new book, “<a href="https://link.springer.com/book/10.1007/978-3-030-50861-6">Signals in the Soil</a>,” explains how this happens. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="A scientist stands next to a wood-framed test bed containing equipment embedded in soil" src="https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=449&fit=crop&dpr=1 600w, https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=449&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=449&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=565&fit=crop&dpr=1 754w, https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=565&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/460334/original/file-20220428-9923-mehb2j.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=565&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Abdul Salam takes measurements in a test bed at Purdue University to determine the optimum operating frequency for underground antennas.</span>
<span class="attribution"><span class="source">Abdul Salam</span>, <a class="license" href="http://creativecommons.org/licenses/by-nd/4.0/">CC BY-ND</a></span>
</figcaption>
</figure>
<p>Farmers use heavy equipment in fields, so antennas must be buried deep enough to avoid damage. As soil becomes wet, the moisture affects communication between the sensor network and the <a href="https://doi.org/10.3390/jsan7040047">control system</a>. Water in the soil absorbs signal energy, which weakens the signals that the system sends. Denser soil also blocks signal transmission. </p>
<p>We have developed <a href="https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1005&context=cit_articles">a theoretical model and an antenna</a> that reduces the soil’s impact on underground communications by changing the operation frequency and system bandwidth. With this antenna, sensors placed in top layers of soil can provide real-time soil condition information to irrigation systems at <a href="https://docs.lib.purdue.edu/cit_articles/36/">distances up to 650 feet (200 meters)</a> – longer than two football fields. </p>
<p>Another solution I have developed for improving wireless communication in soil is to use <a href="https://docs.lib.purdue.edu/cit_articles/43/">directional antennas</a> to focus signal energy in a desired direction. Antennas that direct energy toward air can also be used for long-range wireless underground communications. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="Two metal radios on the ground" src="https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/460463/original/file-20220429-26112-lm4nw2.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Using software-defined radios to detect soil measurement signals. These radios can adjust their operating frequencies in response to soil moisture changes. In actual operation, the radios are buried in the soil.</span>
<span class="attribution"><span class="source">Abdul Salam</span>, <a class="license" href="http://creativecommons.org/licenses/by-nd/4.0/">CC BY-ND</a></span>
</figcaption>
</figure>
<h2>What’s next for the Ag-IoT</h2>
<p>Cybersecurity is becoming increasingly important for the Ag-IoT as it matures. Networks on farms <a href="https://theconversation.com/rise-of-precision-agriculture-exposes-food-system-to-new-threats-187589">need advanced security systems</a> to protect the information that they transfer. There’s also a need for solutions that enable researchers and agricultural extension agents to merge information from multiple farms. Aggregating data this way will produce more accurate decisions about issues like water use, while preserving growers’ privacy. </p>
<p>These networks also need to adapt to changing local conditions, such as temperature, rainfall and wind. Seasonal changes and crop growth cycles can temporarily alter operating conditions for Ag-IoT equipment. By using cloud computing and machine learning, scientists can help the Ag-IoT respond to shifts in the environment around it.</p>
<p>Finally, lack of high-speed internet access is <a href="https://www.theregreview.org/2022/07/09/saturday-seminar-regulating-the-digital-divide/">still an issue in many rural communities</a>. For example, many researchers have integrated wireless underground sensors with Ag-IoT in <a href="https://www.youtube.com/watch?v=2bILpvH3EuQ">center pivot irrigation systems</a>, but farmers without high-speed internet access can’t install this kind of technology. </p>
<p>Integrating satellite-based network connectivity with the Ag-IoT can assist nonconnected farms where <a href="https://www.ntia.doc.gov/report/2019/american-broadband-initiative-milestones-report">broadband connectivity is still unavailable</a>. Researchers are also developing vehicle-mounted and mobile Ag-IoT platforms that use drones. Systems like these can provide continuous connectivity in the field, making digital technologies accessible for more farmers in more places.</p><img src="https://counter.theconversation.com/content/181830/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Abdul Salam does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>The Agricultural Internet of Things is making farming more efficient. An information technology expert describes some of the challenges of working with sensors and antennas underground.Abdul Salam, Assistant Professor of Computer and Information Technology, Purdue UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1883552022-08-09T05:13:50Z2022-08-09T05:13:50ZiRobot’s Roomba will soon be owned by Amazon, which raises privacy questions<figure><img src="https://images.theconversation.com/files/478211/original/file-20220809-24-mtzcdn.jpg?ixlib=rb-1.1.0&rect=24%2C344%2C5422%2C2744&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><span class="source">stocker193/Shutterstock</span></span></figcaption></figure><p>Less than two weeks after the announcement of its acquisition of US healthcare company One Medical, Amazon is continuing its expansion with a <a href="https://www.theguardian.com/technology/2022/aug/05/amazon-buy-roomba-maker-irobot-vaccum">US$1.7 billion offer</a> for iRobot, the manufacturer of Roomba automated vacuum cleaners.</p>
<p>The acquisition will bolster Amazon’s line of smart home products and add to the retail giant’s vast store of consumer data. The move also raises a number of questions. </p>
<p>Why is Amazon doing this? Should we, as consumers, be concerned? What will Amazon do with yet another product that generates large volumes of data about its users?</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/amazon-just-took-over-a-primary-healthcare-company-for-a-lot-of-money-should-we-be-worried-187627">Amazon just took over a primary healthcare company for a lot of money. Should we be worried?</a>
</strong>
</em>
</p>
<hr>
<h2>What has happened?</h2>
<p>The purchase seems like a natural fit for Amazon’s apparent plan to conquer the home. The tech giant already has a foothold in houses around the world, through the Alexa voice assistant system and products such as <a href="https://www.amazon.com.au/alexa-Echo-smart-home-devices-audio-speakers/b?ie=UTF8&node=5425434051">Echo smart speakers</a>, <a href="https://ring.com/au/en/security-cameras">Ring surveillance cameras</a>, and <a href="https://www.amazon.com/Ring-Always-Home-Cam/dp/B08YH144XD">drones</a>.</p>
<p>Amazon already produces a “home monitoring” robot called <a href="https://www.amazon.com/Introducing-Amazon-Astro/dp/B078NSDFSB">Astro</a>, although it is only sold “by invitation”.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/sj1t3msy8dc?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
<figcaption><span class="caption">Amazon’s Astro Home Robot.</span></figcaption>
</figure>
<p>However, the purchase of iRobot may be less about products and <a href="https://www.bloomberg.com/news/articles/2022-08-05/amazon-s-irobot-deal-is-about-roomba-s-data-collection">more about data</a>. That US$1.7 billion price tag may seem a lot, but Amazon gains not only iRobot’s trove of consumer data, but also access to its existing fleet of constantly scanning robots.</p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"1555678809424363523"}"></div></p>
<h2>Mapping our homes</h2>
<p>Roombas gather a particular kind of data about customers – or, to be precise, about their homes. While the original robot vacuum cleaners bumbled around, avoiding obstacles as best they could, the latest models <a href="https://www.digitaltrends.com/home/how-to-map-house-with-roomba/">map users’ homes in great detail</a>. </p>
<p>This is great if you want your vacuum cleaner to autonomously clean your house and avoid falling down the stairs – but it raises a number of privacy concerns.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="iRobot's Braava jet m6 smart mapping" src="https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=747&fit=crop&dpr=1 600w, https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=747&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=747&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=939&fit=crop&dpr=1 754w, https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=939&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/477990/original/file-20220808-18-hajau1.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=939&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">iRobot’s Braava can use smart mapping to understand your home’s layout.</span>
<span class="attribution"><span class="source">iRobot</span></span>
</figcaption>
</figure>
<h2>What about privacy?</h2>
<p>A vacuum cleaner storing the layout of your home is not of great concern in itself – it simply makes it more efficient. But when the map data are stored in the cloud, we lose some control over them. </p>
<p>At present, Roomba maps are, in theory, only accessible by iRobot. But under Amazon’s ownership, we can’t be sure <a href="https://www.buzzfeednews.com/article/blakemontgomery/your-roomba-is-making-a-map-of-your-house-and-it-might-sell">who will have access to the data</a> or how the data will be used.</p>
<p>When asked about the potential use and storage of map data, an Amazon spokesperson noted that the deal hasn’t yet been closed with iRobot, so they do not have the details to share.</p>
<p>They added that the company doesn’t sell customer data to third parties or use customer data for purposes to which customers haven’t consented.</p>
<p>In the recent One Medical takeover, Amazon <a href="https://www.cnbc.com/2022/07/23/amazon-one-medical-deal-gives-it-access-to-my-most-personal-info.html">made very clear</a> that medical data would be “handled separately from all other Amazon businesses as required by law”. However, it added:</p>
<blockquote>
<p>Amazon will never share One Medical customers’ personal health information outside of One Medical for advertising or marketing purposes of other Amazon products and services without clear permission from the customer.</p>
</blockquote>
<p>“Clear permission” sounds good, but in practice consumers routinely give “permission” to all kinds of activities explained only in lengthy and rarely read terms and conditions. In practice, this means permission is often ill-informed. </p>
<p>So it should come as no surprise if Roomba users are one day asked to agree to an update to the terms and conditions in which they grant permission for Amazon to use their in-home location data to enable greater optimisation of products and services. In essence, to sell more stuff, or make other products work “better”.</p>
<h2>The future?</h2>
<p>While Roomba owners are unlikely to see any significant change in the coming months, it is very likely they will soon have updated user agreements hitting their email inboxes and apps.</p>
<p>While these will initially simply reflect the change in ownership and associated legal responsibilities, at some point we may also see data sharing requests.</p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="Amazon offers a range of smart and intelligent devices" src="https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=338&fit=crop&dpr=1 600w, https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=338&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=338&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=424&fit=crop&dpr=1 754w, https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=424&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/478027/original/file-20220808-19-so3g8w.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=424&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Amazon offers a range of smart and intelligent devices.</span>
<span class="attribution"><span class="source">Amazon</span></span>
</figcaption>
</figure>
<p>Where could this take us? Well, smart homes might actually becomes a little bit smart (yes, there are some positives).</p>
<p>If Roomba integrates with in-home cameras, for instance, it might automatically detect and clean up spills. Using location data, the Roomba could make sure it finishes cleaning before its owner arrives home from work.</p>
<p>Even home security systems could use future Roomba devices with cameras as a sentry. (It’s probably for the best that iRobot <a href="https://arstechnica.com/gadgets/2016/02/irobot-sells-off-military-unit-will-stick-to-friendlier-consumer-robots/">sold off its military division</a> in 2016.)</p>
<p>While gun-toting robots are probably not on the Amazon product road map just yet, the Roomba maps may give the company an even more detailed view of customers.</p>
<h2>Where is all this going?</h2>
<p>With smart speakers and cameras already listening and watching, vast amounts of consumer purchasing behaviour monitored through its website and partners, and security systems integrated into our homes, Amazon already knows a lot about us.</p>
<p>In a <a href="https://www.netflix.com/au/title/70264888">Black Mirror</a>-style extrapolation of the tech giant’s recent moves, you can imagine a future where Amazon health insurance (discounted for Prime subscribers, naturally) uses Ring cameras and Roomba to study your living conditions and behaviour patterns, and suggest interventions and set prices accordingly.</p>
<p><a href="https://amazon.care/">Amazon Care</a> (this already exists) might inform you that it knows you haven’t taken a recommended trip to the gym because you’ve been at home all day. Or perhaps it’s a question of diet – and the ever-dutiful <a href="https://www.irobot.com.au/Terra">Amazon Robot Mower</a> has reported a pile of empty pizza boxes and beer bottles outside by the bins.</p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="iRobot Terra" src="https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=338&fit=crop&dpr=1 600w, https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=338&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=338&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=424&fit=crop&dpr=1 754w, https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=424&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/477993/original/file-20220808-23-so3g8w.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=424&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">iRobot Terra extends the mapping of your home outside.</span>
<span class="attribution"><span class="source">iRobot</span></span>
</figcaption>
</figure>
<p>For now, this is just a fantasy - but Amazon is in possession of most of the technology and data to make it reality.</p><img src="https://counter.theconversation.com/content/188355/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Paul Haskell-Dowland does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>In the development of ever smarter homes, Amazon could soon have access to the maps of our houses created and stored by Roomba vacuums.Paul Haskell-Dowland, Professor of Cyber Security Practice, Edith Cowan UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1745792022-03-14T12:20:18Z2022-03-14T12:20:18ZSmart devices spy on you – 2 computer scientists explain how the Internet of Things can violate your privacy<figure><img src="https://images.theconversation.com/files/451472/original/file-20220310-19-e8kbmc.jpg?ixlib=rb-1.1.0&rect=51%2C0%2C5760%2C3811&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Appliances that make your life easier could also put your privacy at risk.</span> <span class="attribution"><a class="source" href="https://newsroom.ap.org/detail/SamsungHomeAppliancesatPCBC/c7b3590269f74c88b17f8cf86efd9119/photo">Eric Kayne/AP Images for Samsung</a></span></figcaption></figure><p>Have you ever felt a creeping sensation that someone’s watching you? Then you turn around and you don’t see anything out of the ordinary. Depending on where you were, though, you might not have been completely imagining it. There are billions of things sensing you every day. They are everywhere, hidden in plain sight – inside your TV, fridge, car and office. These things know more about you than you might imagine, and many of them communicate that information over the internet.</p>
<p>Back in 2007, it would have been hard to imagine the revolution of useful apps and services that smartphones ushered in. But they came with <a href="https://doi.org/10.1145/2335356.2335358">a cost in terms of intrusiveness and loss of privacy</a>. As <a href="https://scholar.google.es/citations?user=x8h02QMAAAAJ&hl=en">computer scientists</a> <a href="https://scholar.google.com/citations?user=NRhyIlEAAAAJ&hl=en">who study</a> data management and privacy, we find that with internet connectivity extended to devices in homes, offices and cities, privacy is in more danger than ever.</p>
<h2>Internet of Things</h2>
<p>Your appliances, car and home are designed to make your life easier and automate tasks you perform daily: switch lights on and off when you enter and exit a room, remind you that your tomatoes are about to go bad, personalize the temperature of the house depending on the weather and preferences of each person in the household.</p>
<p>To do their magic, they need the internet to reach out for help and correlate data. Without internet access, your smart thermostat can collect data about you, but it doesn’t know what the weather forecast is, and it isn’t powerful enough to process all of the information to decide what to do.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="A disk with a display screen mounted on a wall" src="https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=450&fit=crop&dpr=1 600w, https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=450&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=450&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=566&fit=crop&dpr=1 754w, https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=566&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/451474/original/file-20220310-25-6ddqkf.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=566&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">The Nest smart thermostat tracks your presence and is connected to the internet.</span>
<span class="attribution"><a class="source" href="https://www.smarthomeperfected.com/reset-nest-thermostat/">Smart Home Perfected/Flickr</a>, <a class="license" href="http://creativecommons.org/licenses/by/4.0/">CC BY</a></span>
</figcaption>
</figure>
<p>But it’s not just the things in your home that are communicating over the internet. Workplaces, malls and cities are also becoming smarter, and the smart devices in those places have similar requirements. In fact, the Internet of Things (IoT) is already widely used in transport and logistics, agriculture and farming, and industry automation. There were around 22 billion internet-connected devices in use around the world in 2018, and the number is <a href="https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/">projected to grow to over 50 billion by 2030</a>. </p>
<h2>What these things know about you</h2>
<p>Smart devices collect a wide range of data about their users. Smart security cameras and smart assistants are, in the end, cameras and microphones in your home that collect video and audio information about your presence and activities. On the less obvious end of the spectrum, things like smart TVs use <a href="https://www.cbsnews.com/news/smart-tv-spying-fbi-says-the-device-may-be-spying-on-you-today-2019-12-03/">cameras and microphones to spy on users</a>, smart lightbulbs <a href="https://www.theverge.com/2022/1/3/22864783/sengled-smart-health-monitoring-smart-bulb-ces2022">track your sleep and heart rate</a>, and smart vacuum cleaners <a href="https://in.pcmag.com/robot-vacuums/140156/samsungs-jetbot-90-ai-robot-vacuum-doubles-as-a-roving-security-camera">recognize objects in your home and map every inch of it</a>. </p>
<p>Sometimes, this surveillance is marketed as a feature. For example, some Wi-Fi routers can collect information about users’ whereabouts in the home and even <a href="https://www.linksys.com/us/linksys-aware/">coordinate with other smart devices to sense motion</a>.</p>
<p>Manufacturers typically promise that only automated decision-making systems and not humans see your data. But this isn’t always the case. For example, Amazon workers <a href="https://time.com/5568815/amazon-workers-listen-to-alexa/">listen to some conversations with Alexa</a>, transcribe them and annotate them, before feeding them into automated decision-making systems.</p>
<p>But even limiting access to personal data to automated decision making systems can have unwanted consequences. Any private data that is shared over the internet could be vulnerable to hackers anywhere in the world, and <a href="https://doi.org/10.1109/COMST.2019.2910750">few consumer internet-connected devices are very secure</a>.</p>
<h2>Understand your vulnerabilities</h2>
<p>With some devices, like smart speakers or cameras, users can occasionally turn them off for privacy. However, even when this is an option, disconnecting the devices from the internet can severely limit their usefulness. You also don’t have that option when you’re in workspaces, malls or smart cities, so you could be vulnerable even if you don’t own smart devices. </p>
<p>Therefore, as a user, it is important to make an informed decision by understanding the trade-offs between privacy and comfort when buying, installing and using an internet-connected device. This is not always easy. Studies have shown that, for example, owners of smart home personal assistants <a href="https://nms.kcl.ac.uk/hasp/pubs/SPA-security-privacy-perceptions.pdf">have an incomplete understanding</a> of what data the devices collect, where the data is stored and who can access it.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="a toddler touches the top of a black cylinder on a dining table as a family eats in the background" src="https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/451674/original/file-20220311-25-1jgudva.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Smart speakers continuously listen for your commands.</span>
<span class="attribution"><a class="source" href="https://www.gettyimages.com/detail/photo/curious-young-girl-using-smart-speaker-while-having-royalty-free-image/1296338060">Oscar Wong/Moment via Getty Images</a></span>
</figcaption>
</figure>
<p>Governments all over the world have introduced laws to protect privacy and give people more control over their data. Some examples are the <a href="https://gdpr-info.eu/">European General Data Protection Regulation (GDPR)</a> and <a href="https://oag.ca.gov/privacy/ccpa">California Consumer Privacy Act (CCPA)</a>. Thanks to this, for instance, you can <a href="https://dataprivacymanager.net/what-is-data-subject-access-request-dsar/">submit a Data Subject Access Request (DSAR)</a> to the organization that collects your data from an internet-connected device. The organizations are required to respond to requests within those jurisdictions within a month explaining what data is collected, how it is used within the organization and whether it is shared with any third parties.</p>
<h2>Limit the privacy damage</h2>
<p>Regulations are an important step; however, their enforcement is likely to take a while to catch up with the ever-increasing population of internet-connected devices. In the meantime, there are things you can do to take advantage of some of the benefits of internet-connected without giving away an inordinate amount of personal data. </p>
<p>If you own a smart device, you can take steps to secure it and minimize risks to your privacy. The Federal Trade Commission offers <a href="https://consumer.ftc.gov/articles/securing-your-internet-connected-devices-home">suggestions on how to secure your internet-connected devices</a>. Two key steps are updating the device’s firmware regularly and going through its settings and disabling any data collection that is not related to what you want the device to do. The Online Trust Alliance provides additional <a href="https://www.internetsociety.org/iot/">tips and a checklist for consumers</a> to ensure safe and private use of consumer internet-connected devices.</p>
<p>If you are on the fence about purchasing an internet-connected device, find out what data it captures and what the manufacturer’s data management policies are from independent sources such as <a href="https://foundation.mozilla.org/en/privacynotincluded/categories/smart-home/">Mozilla’s Privacy Not Included</a>. By using this information, you can opt for a version of the smart device you want from a manufacturer that takes the privacy of its users seriously.</p>
<p>[<em>Over 150,000 readers rely on The Conversation’s newsletters to understand the world.</em> <a href="https://memberservices.theconversation.com/newsletters/?source=inline-150ksignup">Sign up today</a>.]</p>
<p>Last but not least, you can pause and reflect on whether you really need all your devices to be smart. For example, are you willing to give away information about yourself to be able to <a href="https://foundation.mozilla.org/en/privacynotincluded/atomi-smart-coffee-maker/">verbally command your coffee machine to make you a coffee</a>?</p><img src="https://counter.theconversation.com/content/174579/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>The authors do not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Internet-connected appliances tempt people with science fictionlike conveniences, but beneath the sparkling surface lurk potential privacy violations.Roberto Yus, Assistant Professor of Computer Science, University of Maryland, Baltimore CountyPrimal Pappachan, Postdoctoral Scholar, Penn StateLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1763312022-02-21T14:52:30Z2022-02-21T14:52:30ZConsidering buying a smart device? To protect your security, ask yourself these five questions<figure><img src="https://images.theconversation.com/files/445979/original/file-20220211-23-m4mhcj.jpg?ixlib=rb-1.1.0&rect=0%2C0%2C8192%2C5464&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/black-woman-connecting-phone-her-virtual-2000212811">Dragana Gordic/Shutterstock</a></span></figcaption></figure><p>Houses are getting smarter: smart thermostats manage our heating, while smart fridges can monitor our food consumption and help us order groceries. Some houses even have smart doorbells that tell us who is on our doorstep. And of course, smart TVs allow us to stream the content we want to watch, when we want to watch it. </p>
<p>If that all sounds very futuristic, a recent survey tells us that <a href="https://cujo.com/wp-content/uploads/2021/10/Cybersecurity-Perceptions-Survey-2021.pdf">23% of people</a> in western Europe and 42% of people in the US use smart devices at home.</p>
<p>While these smart devices are certainly convenient, they can also present <a href="https://www.zdnet.com/article/iot-devices-can-be-hacked-in-minuteswarn-researchers/">security risks</a>. Any device with an internet connection can be compromised and taken over by attackers.</p>
<p>If a compromised smart device has a camera or microphone, an attacker may access these and any data on the device can be read, viewed, copied, edited or erased. The compromised smart device may start to look at your network traffic, trying to find your usernames, passwords and financial data. It may look to take over other smart devices that you own.</p>
<p>For example, an attacker could <a href="https://www.computerworld.com/article/3105001/hackers-demonstrated-first-ransomware-for-iot-thermostats-at-def-con.html">adjust the temperature</a> on a smart thermostat, making the house too warm, and demand a ransom be paid to let you take back control of your central heating. Alternatively, a smart CCTV system <a href="https://www.which.co.uk/news/2019/10/the-cheap-security-cameras-inviting-hackers-into-your-home/">can be taken over</a> and the data watched by an attacker or deleted after a burglary.</p>
<p>Smart devices can also be made to attack other systems. Your smart device can become part of a “<a href="https://cujo.com/iot-botnet-report-2021-malware-and-vulnerabilities-targeted/">botnet</a>” (a network of compromised smart devices under the control of a single person). Once compromised, it will search for other smart devices to infect and recruit into the botnet.</p>
<p>The most common form of botnet attack is called a distributed denial of service attack (DDoS). This is where the botnet sends hundreds of thousands of requests per second to a target website, which prevents legitimate users from accessing it. In 2016 a <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet">botnet called Mirai</a> temporarily blocked internet access for much of North America and <a href="https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">parts of Europe</a>.</p>
<p>In addition to DDoS attacks, your smart devices can be used to spread <a href="https://cujo.com/iot-botnet-report-2021-malware-and-vulnerabilities-targeted/">ransomware</a> – software that encrypts a computer so it can only be used after a ransom has been paid. They can also be engaged in <a href="https://www.trendmicro.com/vinfo/de/security/news/cybercrime-and-digital-threats/security-101-the-impact-of-cryptocurrency-mining-malware">cryptomining</a> (the “mining” of digital currencies which earns the attacker money) and financial crime.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/its-far-too-easy-for-abusers-to-exploit-smart-toys-and-trackers-161946">It's far too easy for abusers to exploit smart toys and trackers</a>
</strong>
</em>
</p>
<hr>
<p>There are two main ways for a smart device to be compromised. The first is via simple default credentials, which is where a smart device has a very basic username and password pre-installed, such as “admin” and “password”, and the user hasn’t changed these.</p>
<figure class="align-center ">
<img alt="A hand holds a smartphone in a living room. A temperature control app is open on the screen." src="https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/445978/original/file-20220211-27-1deii9e.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Smart devices can be handy, but they also come with security risks.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/controlling-home-heating-temperature-smart-close-1584383977">RossHelen/Shutterstock</a></span>
</figcaption>
</figure>
<p>The second is by mistakes in the code of the smart device, which an attacker can use to get access to the device. These mistakes (called <a href="https://www.zdnet.com/article/these-new-vulnerabilities-millions-of-iot-devives-at-risk-so-patch-now/">vulnerabilities</a>) can only be fixed by a security update released by the maker of the device and known as a “patch”.</p>
<h2>How to be smart AND safe</h2>
<p>If you’re thinking about buying a new smart device, here are five questions to keep in mind which can help increase the security of your new device and your home. These questions can also help you ensure that the smart devices that you already own are secure. </p>
<p><strong>1. Do I really need a smart device?</strong></p>
<p>While internet connectivity can be a convenience, is it actually a requirement for you? Devices which don’t have a remote connection are not a security risk, so you shouldn’t buy a smart device unless you actually need your device to be smart. </p>
<p><strong>2. Does the device have simple default credentials?</strong></p>
<p>If so, this is a serious risk until you change the credentials. If you buy this device and the default username and password are easy to guess, you will need to change them to something that only you will know. Otherwise the device is very vulnerable to being taken over by an attacker. </p>
<p><strong>3. Can the device be updated?</strong></p>
<p>If the device can’t be updated, and a vulnerability is discovered, neither you nor the manufacturer will be able to prevent an attacker from taking it over. So always check with the seller that the device’s software can be updated. If you have a choice, you should choose a device with automatic updates, rather than one where you have to install updates manually.</p>
<p>If you already own devices which can’t be updated, consider either removing their internet access (by disconnecting them from your wifi) or buying new ones.</p>
<p><strong>4. How long has the manufacturer committed to supporting the device?</strong></p>
<p>If the manufacturer stops releasing security updates your device will be open to compromise if a vulnerability is subsequently found. You should confirm with the seller that the device will be supported for at least as long as you expect to use it.</p>
<p><strong>5. Does the manufacturer run a ‘bug bounty’ programme?</strong></p>
<p>These are schemes where a company will pay a reward to anybody who identifies vulnerabilities in their code base. Not every company runs them, but they suggest that the manufacturer takes the security of their products seriously. Details will be on the manufacturer’s website.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/smart-speakers-why-sales-are-rocketing-despite-all-our-privacy-fears-145781">Smart speakers: why sales are rocketing despite all our privacy fears</a>
</strong>
</em>
</p>
<hr>
<p>It’s not easy to tell if your smart device has been hacked. But as long as your smart devices are supported by their manufacturers, update themselves when they need to and come with strong credentials, it won’t be easy for an attacker to gain access.</p>
<p>If you are worried that your device has been hacked, perform a factory reset, change the username and password to something new and unique, and apply any available updates.</p><img src="https://counter.theconversation.com/content/176331/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Iain Nash does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Smart devices can make our lives easier. But they also present security risks.Iain Nash, PhD candidate, Centre for Commercial Law Studies, Queen Mary University of LondonLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1619462021-06-04T14:31:45Z2021-06-04T14:31:45ZIt’s far too easy for abusers to exploit smart toys and trackers<figure><img src="https://images.theconversation.com/files/404523/original/file-20210604-13-u44na8.jpeg?ixlib=rb-1.1.0&rect=0%2C0%2C5439%2C3620&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/little-boy-using-smartwatch-call-parents-1017040465">JpegPhotographer/Shutterstock</a></span></figcaption></figure><p>The wearable technology market is booming, with <a href="https://news.strategyanalytics.com/press-releases/press-release-details/2021/Strategy-Analytics-Half-Billion-Wearables-Sold-Worldwide-in-2020/default.aspx">half a billion wearables</a> sold globally in 2020. Apps on these devices, or the devices themselves, often claim to monitor our health to spot illnesses, track our workouts to help us reach our fitness goals, or keep an eye on our children’s whereabouts to enhance their safety.</p>
<p>But they’re also divisive. Supporters of wearable technology claim that health trackers should be <a href="https://theconversation.com/why-the-nhs-should-prescribe-wearable-fitness-trackers-60817">prescribed by the NHS</a> and could even deliver an <a href="https://theconversation.com/wearable-fitness-devices-deliver-early-warning-of-possible-covid-19-infection-143388">early warning</a> of a possible COVID-19 infection. GPS tracking devices designed to be worn by children, meanwhile, are seen as a <a href="https://www.abc.net.au/news/2019-04-04/digitally-tracking-kids-more-parents-use-devices/10957906">safety asset</a> for parents. </p>
<p>Yet studies have found fitness trackers to be too <a href="https://theconversation.com/why-fitness-trackers-may-not-give-you-all-the-credit-you-hoped-for-128585">inaccurate</a> and <a href="https://theconversation.com/do-fitness-trackers-make-you-fitter-52404">misleading</a> to be used by <a href="https://eu.usatoday.com/story/tech/2019/08/14/how-doctors-really-feel-data-your-apple-watch-fitbit/1900968001/">medical professionals</a>, and that, because they’ve been rushed to market, wearables of all kinds are an insecure “<a href="https://theconversation.com/why-health-apps-are-like-the-wild-west-with-apple-just-riding-into-town-103512">Wild West</a>” region of technology that requires urgent regulation.</p>
<p>In <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/978692/The_UK_code_of_practice_for_consumer_IoT_security_-_PETRAS_UCL_research_report.pdf">a recent report</a>, we looked at the security risks associated with wearable devices, as well as “smart toys” that can record children in their homes. We found a concerning lack of security – especially for devices aimed at children – which lack even the most basic cybersecurity precautions, leaving them open to abuse.</p>
<h2>Fitness trackers and personal data</h2>
<p>One key issue with wearables is the data they generate and share. For instance, many fitness trackers rely on data on a person’s location to map their workouts. That’s great if you’re keen to track the distance of your jogs, but it’s not especially sensible if you’re embarking on those jogs <a href="https://www.bbc.co.uk/news/technology-42853072">from a military base</a> in hostile territory.</p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"957318498102865920"}"></div></p>
<p>Beyond that specific example, which caused some embarrassment for the US military in 2018, it’s clear that sharing your location publicly, even in a safe civilian setting, comes with significant risks. </p>
<p>And it’s not just the real-time tracking of your running route that could expose your whereabouts. Because these trackers upload your workouts to an app and share them publicly, it’s possible for predators to use historic running, biking or hiking routes to predict where you might be at a given time. This safety issue isn’t only restricted to workouts. Even something as innocuous as <a href="https://www.wareable.com/wearable-tech/terms-and-conditions-privacy-policy-765">sharing a photo through your Apple watch</a> can give away your geolocation. </p>
<h2>Are trackers safe for children?</h2>
<p>Even more concerning are devices designed to be worn by children, sales of which are expected to reach <a href="https://www.prnewswire.com/in/news-releases/global-kids-smartwatch-market-valued-at-364-3-million-us-in-2018-and-will-reach-873-5-million-us-by-the-end-of-2025-at-a-cagr-of-13-19-between-2019-2025-valuates-reports-814713277.html">$875 million (£620 million)</a> by 2025. These watches are marketed as wearable tech to keep kids safe, tracking their location and alerting parents when the watch’s onboard “SOS” button is pressed – or if the child travels beyond a geofenced area. </p>
<p>Smart watches as safety devices on children’s wrists may sound like a <a href="https://www.cbsnews.com/news/wearable-gps-tracking-for-children-to-ease-parents-minds/">boon for anxious parents</a>, but a <a href="https://fil.forbrukerradet.no/wp-content/uploads/2017/10/watchout-rapport-october-2017.pdf">2017 survey</a> of children’s smart watches found that the all-important “SOS” button either got stuck or didn’t work at all in most cases.</p>
<p>Additionally, flaws in some smart watches’ accompanying apps have raised <a href="https://www.which.co.uk/news/2019/11/which-tests-for-security-flaws-in-kids-smartwatches/">serious safety concerns</a>. <a href="https://consumerfed.org/wp-content/uploads/2017/10/smart-watch-security-assessment.pdf">Security researchers</a> have found they could not only easily access children’s historical route data – like their path to and from school – and monitor their geolocation in real time, but they could also speak directly to the child, through the watch, without the call being reported in the parent’s app.</p>
<h2>Connected toys</h2>
<p>Fears that internet of things devices can give people unauthorised access to children also extend to <a href="https://theconversation.com/4-ways-internet-of-things-toys-endanger-children-94092">the “smart toy” market</a>. Some of these toys contain hidden cameras and microphones which, if hacked, could be used to record the interior of your home, including children’s rooms.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/4-ways-internet-of-things-toys-endanger-children-94092">4 ways 'internet of things' toys endanger children</a>
</strong>
</em>
</p>
<hr>
<p>In 2017, German regulators recognised this danger by <a href="https://www.bbc.co.uk/news/world-europe-39002142">banning the sale</a> of the Cayla “smart doll”, labelling it as the kind of “de facto espionage device” that Germany’s <a href="https://www.bundesnetzagentur.de/SharedDocs/Pressemitteilungen/EN/2017/17022017_cayla.html">Telecommunications Act</a> legislates against. In an unusual and unsettling move, the regulator went further by asking parents who’d bought one to <a href="https://www.dw.com/en/german-regulator-tells-parents-to-destroy-spy-doll-cayla/a-37601577">destroy the doll</a> to prevent illicit surveillance.</p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"832974523095986176"}"></div></p>
<p>Even if the manufacturers of smart toys and children’s smart watches can guarantee far better security than that which led to the Cayla ban, there remain other surveillance concerns. In 2019, a <a href="https://www.unicef.org/innovation/reports/memoAIchildrights">UNICEF-led report</a> highlighted how children’s rights – to creativity, freedom of choice and self-determination – are challenged by smart devices. Present in schools, at home, and on the wrist, this kind of round-the-clock surveillance, the report argues, restricts carefree childhood and hurts kids’ development.</p>
<h2>Making trackers safer</h2>
<p>Trackers and toys can be made safer. Before we allow these devices to flood the market, it’s essential <a href="https://discovery.ucl.ac.uk/id/eprint/10117734/">we standardise</a> the minimum security requirements that manufacturers must comply with – no matter where in the world these devices are made. </p>
<p>Key among these standards should be the removal of <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/971440/Code_of_Practice_for_Consumer_IoT_Security_October_2018_V2.pdf">factory-default passwords</a> on devices – which, like “admin” or “1234”, are easily guessed or discovered by even the most novice hacker. Manufacturers should also publish a <a href="https://www.iotsecurityfoundation.org/expanding-the-view-of-consumer-vulnerability-disclosure-practice/">vulnerability disclosure</a> to help users understand risks, and make regular software updates in response to vulnerabilities unearthed by security researchers.</p>
<p>Clearly, monitoring people’s health via wearable trackers has the potential to radically improve access to medical care. Likewise, every parent wants their child to be safe, and smart devices, like mobile phones before them, could be a reliable tool for checking in with them. But without safety standards, these devices have the potential to cause more harm than they offset. Regulators must act fast to stop this growing market from leading to significant harms.</p><img src="https://counter.theconversation.com/content/161946/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Saheli Datta Burton receives funding from UK Engineering and Physical Sciences Research Council grant number EP/S035362/1 for the PETRAS National Centre of Excellence for IoT Systems Cybersecurity, a consortium of leading UK universities dedicated to understanding critical issues in the privacy, ethics, trust, reliability, acceptability, and security of the Internet of Things. Funding for PETRAS is provided by the UKRI’s Strategic Priorities Fund as part of the Security of Digital Technologies at the Periphery (SDTaP) programme.</span></em></p><p class="fine-print"><em><span>Madeline Carr receives funding from receives funding from UK Engineering and Physical Sciences Research Council grant number EP/S035362/1 for the PETRAS National Centre of Excellence for IoT Systems Cybersecurity, a consortium of leading UK universities dedicated to understanding critical issues in the privacy, ethics, trust, reliability, acceptability, and security of the Internet of Things. Funding for PETRAS is provided by the UKRI’s Strategic Priorities Fund as part of the Security of Digital Technologies at the Periphery (SDTaP) programme.. </span></em></p>We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.Saheli Datta Burton, Research Fellow, Department of Science Technology Engineering and Public Policy, UCLMadeline Carr, Professor of Global Politics and Cybersecurity, UCLLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1586652021-04-09T12:58:41Z2021-04-09T12:58:41ZNikola Tesla: 5G network could realise his dream of wireless electricity, a century after experiments failed<figure><img src="https://images.theconversation.com/files/394265/original/file-20210409-17-1514onf.jpeg?ixlib=rb-1.1.0&rect=34%2C0%2C3799%2C2155&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">At the turn of the twentieth century, electrical engineer Nikola Tesla began work on a wireless electricity network. It ultimately failed.</span> <span class="attribution"><a class="source" href="https://wallsdesk.com/wp-content/uploads/2016/11/Nikola-Tesla-Images.jpg">Wallsdesk</a></span></figcaption></figure><p>At the height of his career, the pioneering electrical engineer <a href="https://theconversation.com/uk/topics/nikola-tesla-48233">Nikola Tesla</a> became obsessed with an idea. He theorised that electricity could be transmitted wirelessly through the air at long distances – either via a series of strategically positioned towers, or hopping across a system of suspended balloons.</p>
<p>Things <a href="https://www.atlasobscura.com/articles/what-is-wardenclyffe-tower-nikola-tesla">didn’t go to plan</a>, and Tesla’s ambitions for a wireless global electricity supply were never realised. But the theory itself wasn’t disproved: it would have simply required an extraordinary amount of power, much of which would have been wasted.</p>
<p>Now, <a href="https://www.nature.com/articles/s41598-020-79500-x">a research paper</a> has suggested that the architects of the 5G network may have unwittingly built what Tesla failed to construct at the turn of the twentieth century: a “wireless power grid” that could be adapted to charge or power small devices embedded in cars, homes, workplaces and factories.</p>
<p>Because 5G relies upon a dense network of masts and a powerful series of antenna, it’s possible that the same infrastructure, with some tweaks, could beam power to small devices. But the transmission will still suffer from the key drawback of Tesla’s towers: high energy wastage, which may be difficult to justify given the urgency of the climate crisis.</p>
<h2>5G networks</h2>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="A black and white photo of an electricity tower" src="https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=651&fit=crop&dpr=1 600w, https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=651&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=651&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=818&fit=crop&dpr=1 754w, https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=818&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/394247/original/file-20210409-23-6qlxqm.jpeg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=818&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">One of Tesla’s towers, photographed in 1904.</span>
<span class="attribution"><a class="source" href="https://en.wikipedia.org/wiki/Wardenclyffe_Tower#/media/File:Tesla_Broadcast_Tower_1904.jpeg">Wikimedia</a></span>
</figcaption>
</figure>
<p>Decades ago, it was discovered that <a href="https://ntrs.nasa.gov/citations/19760004119">a tightly focused radio beam</a> can transmit power over relatively large distances without using a wire to carry the charge. The same technology is now used in the <a href="https://www.techradar.com/uk/news/5g-uk">5G network</a>: the latest generation of technology to beam internet connection to your phone, via radio waves transmitted from a local antenna. </p>
<p>This 5G technology aims to provide a <a href="https://ieeexplore.ieee.org/abstract/document/9007754">1,000-fold capacity increase</a> over the last generation, 4G, to allow up to one million users to connect per square kilometre – making those moments searching for signal at music festivals or sports events a thing of the past.</p>
<p>To support these upgrades, 5G uses some engineering magic, and this magic comes in three parts: very dense networks with many more masts, special antenna technology, and the inclusion of <a href="https://ieeexplore.ieee.org/abstract/document/9318751">millimetre wave</a> (mmWave) transmission alongside more traditional bands.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/5g-what-will-it-offer-and-why-does-it-matter-109010">5G: what will it offer and why does it matter?</a>
</strong>
</em>
</p>
<hr>
<p>The last of these, mmWave, opens up much more bandwidth at the cost of shorter transmission distances. For context, most WiFi routers operate in the 2GHz band. If your router has a 5GHz option, you’ll have noticed that movies stream more smoothly – but you have to be closer to your router for it to work. </p>
<p>Increase the frequency further (like mmWave, which operates at 30GHz or more) and you see even greater improvements in bandwidth – but you need to be closer to the base station to access it. This is why 5G masts are <a href="https://www.lifewire.com/5g-cell-towers-4584192">more densely clustered</a> than 4G masts.</p>
<figure class="align-center ">
<img alt="A 5G antenna module on a mast" src="https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/394267/original/file-20210409-23-eqybm8.jpeg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">5G masts are more densely clustered than their predecessors.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/5g-cellular-repeaters-on-pole-1296375235">Lisic/Shutterstock</a></span>
</figcaption>
</figure>
<p>The last bit of magic is to add many more antennas - between 128 and 1,024 compared to a much smaller number (just two in some cases) for 4G. Multiple antennas allow masts to form hundreds of pencil-like beams that target particular devices, providing efficient and reliable internet to your phone on the move.</p>
<p>These happen to be the same raw ingredients needed to create a wireless power grid. The increased network density is particularly important, because it opens up the possibility of using mmWave bands to transmit different radio waves which can carry both internet connection and electrical power.</p>
<h2>Experimenting with 5G power</h2>
<p>The <a href="https://www.nature.com/articles/s41598-020-79500-x">experiments</a> used new types of antenna to facilitate wireless charging. In the laboratory, the researchers were able to beam 5G power over a relatively short distance of just over 2 metres, but they expect that a future version of their device will be able to transmit 6μW (6 millionths of a watt) at a distance of 180 metres.</p>
<p>To put that into context, common Internet of Things (IoT) devices consume around <a href="https://www.manualslib.com/manual/808633/Moteiv-Telos.html?page=4#manual">5μW</a> – but only when in their deepest sleep mode. Of course, IoT devices will require less and less power to run as clever algorithms and more efficient electronics are developed, but 6μW is still a very small amount of power. </p>
<p>That means, for the time being at least, that 5G wireless power is unlikely to be practical for charging your mobile phone as you go about your day. But it could charge or power <a href="https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/">IoT devices</a>, like sensors and alarms, which are <a href="https://digital-strategy.ec.europa.eu/en/policies/5g-action-plan">expected to become widespread</a> in the future.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/explainer-the-internet-of-things-16542">Explainer: the Internet of Things</a>
</strong>
</em>
</p>
<hr>
<p>In factories, for instance, hundreds of IoT sensors are likely to be used to monitor conditions in warehouses, to predict failures in machinery, or to track the movement of parts along a production line. Being able to beam power directly to these IoT devices will encourage the move to <a href="https://www.supplychainbrain.com/blogs/1-think-tank/post/31478-how-wireless-power-is-transforming-manufacturing">far more efficient</a> manufacturing practices.</p>
<h2>Teething problems</h2>
<p>But there will be challenges to overcome before then. To provide wireless power, 5G masts will consume around 31kW of energy – equivalent to 10 kettles constantly boiling water. </p>
<p>Though concerns that 5G technology can cause cancer have been widely <a href="https://www.cancer.gov/about-cancer/causes-prevention/risk/radiation/electromagnetic-fields-fact-sheet#r45">debunked by scientists</a>, this amount of power emanating from masts could be unsafe. A <a href="http://hintlink.com/power_density.php">rough calculation</a> suggests that users will need to be kept at least 16 metres away from masts to comply with safety <a href="https://www.itpro.co.uk/policy-legislation/34526/what-is-the-federal-communications-commission-fcc">regulations</a> set by the US Federal Communications Commission.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/four-experts-investigate-how-the-5g-coronavirus-conspiracy-theory-began-139137">Four experts investigate how the 5G coronavirus conspiracy theory began</a>
</strong>
</em>
</p>
<hr>
<p>That said, this technology is in its infancy. It’s certainly possible that future approaches, such as new antenna with narrower and more targeted beams, could significantly reduce the energy required – and wasted – by each mast.</p>
<p>At present, the proposed system is rather reminiscent of the fictional “<a href="https://roalddahl.fandom.com/wiki/Wonkavision">Wonkavision</a>” in Roald Dahl’s Charlie and the Chocolate Factory, which achieved the feat of beaming confectionary into TVs – but had to use a huge block of chocolate to produce a much smaller one at the other end. </p>
<p>Because it’ll consume a high amount of power compared to the power it’ll deliver to devices, 5G wireless power is, for the moment, speculative. But if engineers can find more efficient ways to beam electricity through the air, it may well be that Nikola Tesla’s dream of wireless power could be realised – over 100 years since his attempts failed.</p><img src="https://counter.theconversation.com/content/158665/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>James Peter Brusey receives funding from EU Horizon 2020 as part of the DOMUS project. </span></em></p><p class="fine-print"><em><span>Elena Gaura does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>New 5G technologies also boast the raw ingredients needed to beam wireless power to small devices.Elena Gaura, Associate Dean for Research, Coventry UniversityJames Peter Brusey, Professor of Computer Science, Coventry UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1494282020-11-04T05:29:37Z2020-11-04T05:29:37ZHow Australia can reap the benefits and dodge the dangers of the Internet of Things<figure><img src="https://images.theconversation.com/files/367399/original/file-20201104-23-81noa8.jpg?ixlib=rb-1.1.0&rect=16%2C24%2C5320%2C3536&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><span class="source">Shutterstock</span></span></figcaption></figure><p>The <a href="https://theconversation.com/explainer-the-internet-of-things-16542">Internet of Things</a> (IoT) is already all around us. Online devices have become essential in industries from manufacturing and healthcare to agriculture and environmental management, not to mention our own homes. Digital consulting firm Ovum <a href="https://www.acma.gov.au/sites/default/files/2020-09/Communications%20report%202018-19.pdf">estimates</a> that by 2022 Australian homes will host more than 47 million IoT devices, and the value of the global market will exceed US$1 trillion. </p>
<p>The IoT presents great opportunities, but it brings many risks too. Problems <a href="https://theconversation.com/six-things-every-consumer-should-know-about-the-internet-of-things-78765">include</a> excessive surveillance, loss of privacy, transparency and control, and reliance on unsafe or unsuitable services or devices. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/explainer-the-internet-of-things-16542">Explainer: the Internet of Things</a>
</strong>
</em>
</p>
<hr>
<p>In some places, such as the <a href="http://www.internet-of-things-research.eu/">European Union</a>, <a href="https://ec.europa.eu/growth/tools-databases/dem/monitor/sites/default/files/DTM_Industrie%204.0.pdf">Germany</a>, <a href="https://www.rfid-alliance.com/KOREA-IoT%20Master%20Plan.pdf">South Korea</a> and the <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/666943/DC-IoTUK_for_distribution.pdf">United Kingdom</a>, governments have been quick to develop policies and some limited regulation to take advantage of the technology and mitigate its <a href="https://petras-iot.org/">harmful impacts</a>. </p>
<p>Australia has been late to react. Even recent moves by the federal government to make IoT devices more secure have been <a href="https://theconversation.com/are-your-devices-spying-on-you-australias-very-small-step-to-make-the-internet-of-things-safer-145554">far behind</a> international developments.</p>
<p>A <a href="https://acola.org/hs5-internet-of-things-australia">report</a> launched today by the Australian Council of Learned Academies (<a href="https://acola.org">ACOLA</a>) may help get Australia up to speed. It supplies a wide-ranging, peer-reviewed base of evidence about opportunities, benefits and challenges the IoT presents Australia over the next decade.</p>
<h2>Benefits of the Internet of Things</h2>
<p>The report examines how we can improve our lives with IoT-related technologies. It explores a range of applications across Australian cities and rural, regional and remote areas.</p>
<p>Some IoT services are already available, such as the <a href="https://www.infrastructure.gov.au/cities/smart-cities/">Smart Cities and Suburbs</a> program run by local and federal governments. This program funds projects in areas such as traffic congestion, waste management and urban safety. </p>
<p>Health applications are also on the rise. The University of New England has piloted the remote monitoring of COVID-19 patients with mild symptoms using <a href="https://www.une.edu.au/connect/news/2020/04/unes-covid-19-virtual-care-response-pilot-monitors-arrive">IoT-enabled pulse oximeters</a>. </p>
<p><a href="https://theconversation.com/virtual-tools-real-fires-how-holograms-and-other-tech-could-help-outsmart-bushfires-126830">Augmented and virtual reality</a> applications too are becoming more common. IoT devices can track carbon emissions in supply chains and energy use in homes. IoT services can also help governments make public transport infrastructure more efficient. </p>
<p>The benefits of the IoT won’t only be felt in cities. There may be even more to be gained in rural, regional and remote areas. IoT can aid agriculture in many ways, as well as working to prevent and manage bushfires and other environmental disasters. Sophisticated remote learning and health care will also benefit people outside urban areas.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=536&fit=crop&dpr=1 600w, https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=536&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=536&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=673&fit=crop&dpr=1 754w, https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=673&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/367400/original/file-20201104-23-7rgaei.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=673&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">While some benefits of the IoT will be felt everywhere, some will have more impact in cities and others in rural, remote and regional areas.</span>
<span class="attribution"><span class="source">ACOLA</span>, <a class="license" href="http://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC</a></span>
</figcaption>
</figure>
<h2>Opportunities for the Australian economy</h2>
<p>The IoT presents critical opportunities for economic growth. In 2016-17, IoT activity was already worth A$74.3 billion to the Australian economy. </p>
<p>The IoT can facilitate more data-informed processes and automation (also known as <a href="https://theconversation.com/a-fourth-industrial-revolution-is-powering-the-rise-of-smart-manufacturing-57753">Industry 4.0</a>). This has immediate potential for substantial benefits. </p>
<p>One opportunity for Australia is niche manufacturing. Making bespoke products would be more efficient with IoT capability, which would let Australian businesses reach a consumer market with wide product ranges but low domestic volumes due to our small population.</p>
<p>Agricultural innovation enabled by the IoT, using Australia’s existing capabilities and expertise, is another promising area for investment.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/six-things-every-consumer-should-know-about-the-internet-of-things-78765">Six things every consumer should know about the 'Internet of Things'</a>
</strong>
</em>
</p>
<hr>
<h2>Risks of the Internet of Things</h2>
<p>IoT devices can collect huge amounts of sensitive data, and controlling that data and keeping it secure presents significant risks. However, the Australian community is not well informed about these issues and some IoT providers are slow to explain appropriate and safe use of IoT devices and services. </p>
<p>These issues make it difficult for consumers to tell good practice from bad, and do not inspire trust in IoT. Lack of consistent international IoT standards can also make it difficult for different devices to work together, and creates a risk that users will be “locked in” to products from a single supplier.</p>
<p>In IoT systems it can also be very complex to determine who is responsible for any particular fault or issue, because of the many possible combinations of product, hardware, software and services. There will also be many contracts and user agreements, creating contractual complexity that adds to already difficult legal questions. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/are-your-devices-spying-on-you-australias-very-small-step-to-make-the-internet-of-things-safer-145554">Are your devices spying on you? Australia's very small step to make the Internet of Things safer</a>
</strong>
</em>
</p>
<hr>
<p>The increased surveillance made possible by the IoT can lead to breaches of human rights. Partially or fully automated decision-making can also to discrimination and other socially unacceptable outcomes. </p>
<p>And while the IoT can assist environmental sustainability, it can also increase environmental costs and impacts. The ACOLA report estimates that by 2050 the IoT could consume between 1 and 5% of the world’s electricity.</p>
<p>Other risks of harmful social consequences include an increased potential for domestic violence, the targeting of children by malicious actors and corporate interests, increased social withdrawal and the exacerbation of existing inequalities for vulnerable populations. The recent death of a woman <a href="https://www.abc.net.au/news/2020-10-12/review-of-telehealth-ordered-into-gulgong-hospital-death/12758644">in rural New South Wales being treated via telehealth</a> provides just one example of these risks. </p>
<h2>Maximising the benefits of the IoT</h2>
<p>The ACOLA report makes several recommendations for Australia to take advantage of the IoT while minimising its downsides.</p>
<p>ACOLA advocates a national approach, focusing on areas of strength. It recommends continuing investment in smart cities and regions, and more collaboration between industry, government and education. </p>
<p>ACOLA also recommends increased community engagement, better ethical and regulatory frameworks for data and baseline security standards. </p>
<p>The ACOLA report is only a beginning. More specific work needs to be done to make the IoT work for Australia and its citizens. </p>
<p>The report does outline key areas for future research. These include the actual experiences of people in smart cities and homes, the value of data, environmental impacts and the use of connected and autonomous vehicles.</p><img src="https://counter.theconversation.com/content/149428/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Kayleen Manwaring was commissioned (pro bono) to provide an input report into the ACOLA report. She has previously received funding from iappANZ.</span></em></p><p class="fine-print"><em><span>Peter Leonard chairs (pro bono) the IoT Alliance's Data Workstream. His consultancy Data Synergies advises both suppliers and customers of IoT devices and services as to privacy and other terms of data collection, use and sharing.</span></em></p>The Internet of Things will transform industry, agriculture, and our cities. But we need to consider carefully the risks as well as the rewards.Kayleen Manwaring, Senior Lecturer, School of Taxation & Business Law, UNSW SydneyPeter Leonard, Professor of Practice (IT Systems and Management and Business and Taxation Law), UNSW Business School, Sydney, UNSW SydneyLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1444492020-09-28T20:40:55Z2020-09-28T20:40:55ZDigital technologies will help build resilient communities after the coronavirus pandemic<figure><img src="https://images.theconversation.com/files/359825/original/file-20200924-19-cjdz0g.jpg?ixlib=rb-1.1.0&rect=0%2C0%2C5455%2C3075&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The coronavirus pandemic has resulted in increased adoption of communication and network technologies.</span> <span class="attribution"><span class="source">(Shutterstock)</span></span></figcaption></figure><p>Amid the <a href="https://www.nature.com/articles/d41586-020-01953-x">horrific public health and economic fallout from a fast-moving pandemic</a>, a more positive phenomenon is playing out: COVID-19 has provided opportunities to businesses, universities and communities to become hothouses of innovation. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/coronavirus-disruption-a-chance-for-businesses-to-adapt-and-renew-135516">Coronavirus disruption: A chance for businesses to adapt and renew</a>
</strong>
</em>
</p>
<hr>
<p>Around the world, digital technologies are driving high-impact interventions. Community and public health leaders are handling time-sensitive tasks and meeting pressing needs with technologies that are affordable and inclusive, and don’t require much technical knowledge.</p>
<p>Our research reveals the outsized impact of inexpensive, <a href="https://smith.queensu.ca/insight/content/lightweight-digital-tech-can-do-heavy-lifting-when-disaster-strikes.php">readily available digital technologies</a>. In the midst of a maelstrom, these technologies — among them social media, mobile apps, analytics and <a href="https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to-know-about-the-cloud/">cloud computing</a> — help communities cope with the pandemic and learn crucial lessons. </p>
<p>To gauge how this potential is playing out, our research team looked at how communities incorporate readily available digital technologies in their responses to disasters.</p>
<h2>Community potential</h2>
<p>As a starting point, we used a model of crisis management developed in 1988 by <a href="https://mitroff.net/">organizational theorist Ian Mitroff</a>. The model has five phases: </p>
<ul>
<li>signal detection to identify warning signs</li>
<li>probing and prevention to actively search and reduce risk factors</li>
<li>damage containment to limit its spread</li>
<li>recovery to normal operations</li>
<li>learning to glean actionable insights to apply to the next incident </li>
</ul>
<p>Although this model was developed for organizations dealing with crises, it is applicable to communities under duress and has been used to <a href="https://sprott.carleton.ca/2020/sprott-business-insights-crisis-management/">analyze organizational responses to the current pandemic</a>.</p>
<p>Our research showed that readily available digital technologies can be deployed effectively during each phase of a crisis.</p>
<h2>Phase 1: Signal detection</h2>
<p>Being able to identify potential threats from rivers of data is no easy task. Readily available digital technologies such as social media and mobile apps are useful for signal detection. They offer connectivity any time and anywhere, and allow for rapid sharing and transmission of information. </p>
<p>New Zealand, for example, has been exploring an <a href="https://researchspace.auckland.ac.nz/handle/2292/20759">early warning system for landslides</a> based on both internet-of-things sensors and digital transmission through social media channels such as Twitter.</p>
<h2>Phase 2: Prevention and preparation</h2>
<p>Readily available digital technologies such as cloud computing and analytics enable remote and decentralized activities to support training and simulations that heighten community preparedness. The federal government, for example, has developed <a href="https://www.cbc.ca/news/politics/covid-pandemic-app-ontario-1.5670239">the COVID Alert app for mobile devices</a> that will tell users whether they have been near someone who has tested positive for COVID-19 during the previous two weeks.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/70-of-people-surveyed-said-theyd-download-a-coronavirus-app-only-44-did-why-the-gap-138427">70% of people surveyed said they'd download a coronavirus app. Only 44% did. Why the gap?</a>
</strong>
</em>
</p>
<hr>
<h2>Phase 3: Containment</h2>
<p>Although crises cannot always be averted, they can be contained. Big data analytics can isolate hot spots and “<a href="https://www.scientificamerican.com/article/how-superspreading-events-drive-most-covid-19-spread1/">superspreaders</a>,” limiting exposure of larger populations to the virus. Taiwan implemented <a href="https://www.techuk.org/insights/news/item/17187-how-taiwan-used-tech-to-fight-covid-19">active surveillance and screening systems</a> to quickly react to COVID-19 cases and implement measures to control its spread.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="A Taiwanese postal worker holding a thermometer." src="https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=401&fit=crop&dpr=1 600w, https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=401&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=401&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/359883/original/file-20200924-24-1zkld5.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">A woman checks temperatures at the entrance to a post office in Taipei, Taiwan amid the COVID-19 pandemic.</span>
<span class="attribution"><span class="source">(Shutterstock)</span></span>
</figcaption>
</figure>
<h2>Phase 4: Recovery</h2>
<p>Social capital, personal and community networks and shared post-crisis communication are essential factors for the recovery process. Readily available digital technologies can help a community get back on its feet by enabling people to share experiences and resource information. </p>
<p>For example, residents of Fort McMurray, Alta., have experienced the pandemic, <a href="https://www.cbc.ca/news/canada/edmonton/fort-mcmurray-flood-damage-1.5673962">flooding</a> and <a href="https://srd.web.alberta.ca/fort-mcmurray-area-update/all">the threat of wildfires</a>. As part of the response, the provincial government offers northern Alberta residents <a href="https://www.albertahealthservices.ca/news/Page15494.aspx">virtual addiction treatment support via Zoom videoconferencing</a>. </p>
<p>During recovery, it is also important to foster equity to avoid a privileged set of community members receiving preferential services. To address this need, <a href="https://str.sg/Jpne">anti-hoarding apps</a> for personal protective equipment and apps that promote <a href="https://www.volunteerlocal.com/">volunteerism</a> can prove useful.</p>
<h2>Phase 5: Learning</h2>
<p>It is usually difficult for communities to gather knowledge on recovery and renewal from multiple sources. Readily available digital technologies can be used to provide local and remote computing power, enable information retrieval and analysis and disseminate emergent knowledge. The <a href="https://news.microsoft.com/2020/04/19/unicef-and-microsoft-launch-global-learning-platform-to-help-address-covid-19-education-crisis/">global learning platform launched by UNICEF and Microsoft</a> helps youth affected by COVID-19.</p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"1252219771346653184"}"></div></p>
<h2>A sixth phase</h2>
<p>Our research suggests a sixth phase of crisis management: community resilience, which is the sustained ability of communities to withstand, adapt to and recover from adversity. Communities must <a href="https://www.arunrai.net/s/EdommentsV44_I2-The-COVID-19-Pandemic-Building-Resilience-with-IS-Research.pdf">develop the capacity to absorb the impact of pandemics</a> and other disasters. </p>
<p>When face-to-face interactions are limited — like in a pandemic — readily available digital technologies can enable community participation through social media groups, virtual meeting software and cloud- and mobile-driven engagement and decision-making platforms.</p>
<p>Technologies that provide transparent information services such as analytics-based dashboards and real-time updates can create a sense of equity and caring. Apps and portals can connect vulnerable populations to critical care, resources and infrastructure services. </p>
<p>For example, the government of Karnataka, India, partnered with local vendors and hyper-local food delivery services for <a href="https://inc42.com/buzz/karnataka-rolls-out-delivery-helpline-for-grocery-essentials-in-bengaluru/">home delivery of groceries and other essential materials for households quarantined because of the COVID-19 pandemic</a>.</p>
<p>Readily available digital technologies help remote communities develop a sense of belonging, sharing and self-efficacy while incrementally building shared knowledge over multiple crises.</p>
<h2>Moving forward</h2>
<p>The <a href="https://www.ncbi.nlm.nih.gov/books/NBK92467/">2003 SARS epidemic</a> taught us valuable lessons about the use of technology during a pandemic. At the time, readily available digital technologies were largely overlooked, because bigger and more expensive solutions were the focus.</p>
<p>In responding to the present circumstances, it is time we explore the benefit of common technologies. The federal government’s <a href="https://www.canada.ca/en/office-infrastructure/news/2020/08/direct-help-for-bright-ideas-to-make-safer-pandemic-resilient-communities.html">recent announcement of funding</a> to support the use of digital solutions in community responses to COVID-19 is a promising step. </p>
<p><a href="http://digitalcapital.li/?p=582">Investing in resilient infrastructure</a> is also important, since communities depend on public digital infrastructure for access to the internet and other telecommunication networks. This infrastructure must be affordable, sustainable and inclusive.</p>
<p>But we should not lose sight of the need to support communities in developing their own resiliency — to help them envision their own solutions using readily available digital technologies.</p><img src="https://counter.theconversation.com/content/144449/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Yolande E. Chan receives funding from the Social Sciences and Humanities Research Council of Canada.</span></em></p><p class="fine-print"><em><span>Arman Sadreddin and Suchit Ahuja do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Internet technologies and the devices that enable information access and transfer are useful in crisis management. Accessing these readily available digital technologies can help community resiliency.Yolande E. Chan, Associate Dean (Research & PhD/MSc Programs) and E. Marie Shantz Professor of Information Technology Management, Queen's University, OntarioArman Sadreddin, Assistant Professor, Business Technology Management, Concordia UniversitySuchit Ahuja, Assistant Professor, Business Technology Management, Concordia UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1455542020-09-11T07:42:56Z2020-09-11T07:42:56ZAre your devices spying on you? Australia’s very small step to make the Internet of Things safer<figure><img src="https://images.theconversation.com/files/357407/original/file-20200910-23-1cxqjyw.jpg?ixlib=rb-1.1.0&rect=0%2C57%2C5520%2C2974&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><span class="source">Shutterstock</span></span></figcaption></figure><p>From internet-connected televisions, toys, fridges, ovens, security cameras, door locks, fitness trackers and lights, the so-called “Internet of Things” (IoT) promises to revolutionise our homes.</p>
<p>But it also threatens to increase our vulnerability to malicious acts. Security flaws in IoT devices <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3464277">are common</a>. Hackers can exploit those vulnerabilities to take <a href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">control</a> of devices, <a href="https://www.forbes.com/sites/leemathews/2017/07/27/criminals-hacked-a-fish-tank-to-steal-data-from-a-casino/#36f0856d32b9">steal or change data</a>, and <a href="https://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-be-spying-on-you-even-in-your-own-home/#6823a7fcb859">spy on us</a>. </p>
<p>In recognition of these risks, the Australian government has introduced a new <a href="https://www.homeaffairs.gov.au/reports-and-pubs/files/code-of-practice.pdf">code of practice</a> to encourage manufacturers to make IoT devices more secure. The code provides guidance on secure passwords, the need for security patches, the protection and deletion of consumers’ personal data and the reporting of vulnerabilities, among other things.</p>
<p>The problem is the code is voluntary. Experiences elsewhere, such as the United Kingdom, suggest a voluntary code will be insufficient to deliver the protections consumers need. </p>
<p>Indeed it might even increase risks, by lulling consumers into a false sense of security about the safety of the devices they buy. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/explainer-the-internet-of-things-16542">Explainer: the Internet of Things</a>
</strong>
</em>
</p>
<hr>
<h2>Many IoT devices are insecure</h2>
<p>IoT devices designed for consumers are generally less secure than conventional computers. </p>
<p>In 2017 the Australian Communications Consumer Action Network commissioned researchers from the University of New South Wales to test the security of 20 <a href="https://accan.org.au/files/Grants/UNSW-ACCAN_InsideJob_web.pdf">household appliances</a> capable of being connected and controlled via wi-fi. </p>
<p>These included a smart TV, portable speaker, voice assistant, printer, sleep monitor, digital photo frame, bathroom scales, light bulb, power switch, smoke alarm and Hello Barbie talking doll. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=569&fit=crop&dpr=1 600w, https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=569&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=569&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=715&fit=crop&dpr=1 754w, https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=715&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/357574/original/file-20200911-22-vkf634.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=715&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Devices tested by UNSW researchers for the Australian Communications Consumer Action Network.</span>
<span class="attribution"><a class="source" href="https://accan.org.au/files/Grants/UNSW-ACCAN_InsideJob_web.pdf">Inside Job: Security and privacy threats for smart-home IoT devices, 2017</a>, <a class="license" href="http://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC</a></span>
</figcaption>
</figure>
<p>While some devices (including the Barbie) were found to be relatively secure in terms of confidentiality, all had some form of security flaw. Many “allowed potentially serious safety and security breaches”.</p>
<p>What this could potentially mean is that someone could, for example, hack into a household’s wi-fi network and collect data from IoT devices. It might be as simple as knowing when lights are switched on to determine when a home can be burgled. Someone with more malicious intent could <a href="https://phys.org/news/2017-10-flaw-hackers-smart-ovens.html">turn on your oven</a> while shutting down smoke alarms and other sensors. </p>
<h2>Risks to consumers, and society</h2>
<p>Factors leading to <a href="http://www5.austlii.edu.au/au/journals/DeakinLawRw/2017/3.html">poor security in IoT devices</a> include manufacturers’ desires to minimise componentry and keep costs down. Many makers of consumer goods also have little experience with cyber-security issues. </p>
<p>Allied with the fact many consumers <a href="https://accan.org.au/files/Grants/UNSW-ACCAN_InsideJob_web.pdf">aren’t technologically savvy</a> enough to appreciate the risks and protect themselves, this creates the prospect of IoT devices being exploited. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/the-privacy-paradox-we-claim-we-care-about-our-data-so-why-dont-our-actions-match-143354">The privacy paradox: we claim we care about our data, so why don't our actions match?</a>
</strong>
</em>
</p>
<hr>
<p>On a personal level, you could be <a href="https://www.vice.com/en_au/article/d3akpk/smart-home-technology-stalking-harassment">spied on and harassed</a>. Personal pictures or information could be <a href="https://www.ftc.gov/system/files/documents/cases/140207trendnetcmpt.pdf">exposed to the world</a>, or used to extort you. </p>
<p>On a societal level, IoT devices can be <a href="https://elie.net/static/files/understanding-the-mirai-botnet/understanding-the-mirai-botnet-paper.pdf">hijacked</a> and used collectively to shut down services and networks. Even compromising one device may enable connected infrastructure to be hacked. This is a rising concern as more people connect to <a href="https://www.iotworldtoday.com/2020/03/24/cybersecurity-crisis-management-during-the-coronavirus-pandemic/">workplace networks</a> from home. </p>
<figure class="align-center ">
<img alt="Woman using a smarthome app on her phone." src="https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/357623/original/file-20200911-16-14r5yhc.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Many consumers don’t fully appreciate the security risks from IoT devices.</span>
<span class="attribution"><span class="source">Shutterstock</span></span>
</figcaption>
</figure>
<h2>Voluntary codes of practice</h2>
<p>In recognition of these threats, IoT security “good practice” guidelines have been proposed by standards bodies such as the <a href="https://www.nist.gov/programs-projects/nist-cybersecurity-iot-program">US National Institute of Standards and Technology</a>, the <a href="https://www.etsi.org/deliver/etsi_ts/103600_103699/103645/01.01.01_60/ts_103645v010101p.pdf">European Telecommunications Standards Institute</a> and the <a href="https://datatracker.ietf.org/doc/rfc8520/">Internet Engineering Task Force</a>. But these guidelines are based on voluntary action by manufacturers.</p>
<p>The UK government has already <a href="https://www.gov.uk/government/publications/proposals-for-regulating-consumer-smart-product-cyber-security-call-for-views/proposals-for-regulating-consumer-smart-product-cyber-security-call-for-views">concluded</a> the voluntary code of conduct it <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/773867/Code_of_Practice_for_Consumer_IoT_Security_October_2018.pdf">established in 2018</a> isn’t working. </p>
<p>Britain’s Minister for Digital Infrastructure, Matt Warman, said in July:</p>
<blockquote>
<p>Despite widespread adoption of the guidelines in the <a href="https://www.gov.uk/government/publications/code-of-practice-for-consumer-iot-security">Code of Practice for Consumer Internet of Things Security</a>, both in the UK and overseas, change has not been swift enough, with poor security still commonplace.</p>
</blockquote>
<p>The UK is now <a href="https://www.gov.uk/government/consultations/consultation-on-regulatory-proposals-on-consumer-iot-security">moving</a> to impose a mandatory code, with laws requiring manufacturers to deliver reasonable security features in any device that can connect to the internet.</p>
<h2>A case for co-regulation</h2>
<p>There is little reason to believe Australia’s voluntary code of practice will prove any more effective than in the UK.</p>
<p>A better option would have been a “<a href="http://rogerclarke.com/DV/CACM99.html#RegF">co-regulatory</a>” approach. Co-regulation mixes aspects of industry self-regulation with both government regulation and strong <a href="http://rogerclarke.com/EC/AIR.html#CRF">community input</a>. It includes laws that create incentives for compliance (and disincentives against non-compliance) and regulatory oversight by an independent (and well-resourced) watchdog.</p>
<p>The Australia government has, at least, described its new code of practice as “a first step” to improving the security of IoT devices.</p>
<p>Let’s hope so. If the UK experience is anything to go by, its next steps will include dumping a voluntary code for something with a greater chance of delivering the safety and security consumers – and society – need.</p><img src="https://counter.theconversation.com/content/145554/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Kayleen Manwaring has previously received funding from iappANZ. </span></em></p><p class="fine-print"><em><span>Roger Clarke does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Australia’s new voluntary code of practice to make IoT devices more secure may expose consumers to greater risks.Kayleen Manwaring, Senior Lecturer, School of Taxation & Business Law, UNSW SydneyRoger Clarke, Visiting Professor, Comp Sci at the ANU, and Law, UNSW SydneyLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1433542020-07-29T04:49:41Z2020-07-29T04:49:41ZThe privacy paradox: we claim we care about our data, so why don’t our actions match?<figure><img src="https://images.theconversation.com/files/350056/original/file-20200729-19-1tke6d9.jpg?ixlib=rb-1.1.0&rect=127%2C22%2C4865%2C3502&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><span class="source">Shutterstock</span></span></figcaption></figure><p>Imagine how you’d feel if you discovered footage from your private home security camera had been broadcast over the internet. This is exactly what happened to <a href="https://www.abc.net.au/news/2020-06-24/security-cameras-hacked-streamed-on-russian-website/12380606">several unsuspecting Australians</a> last month, when the website Insecam streamed their personal lives online. </p>
<p>According to an <a href="https://www.abc.net.au/news/2020-06-24/security-cameras-hacked-streamed-on-russian-website/12380606">ABC report</a>, Insecam broadcasts live streams of dozens of Australian businesses and homes at any given time. Some cameras can be accessed because owners don’t secure them. Some may be hacked into despite being “secured”.</p>
<p>When asked if they care about their personal information being shared online, most people say they do. <a href="https://www.oaic.gov.au/updates/videos/australian-community-attitudes-to-privacy-survey-2017">A 2017 survey</a> found 69% of Australians were more concerned about their online privacy than in 2012. </p>
<p>However, a much smaller percentage of people actually take the necessary actions to preserve their privacy. This is referred to as the “privacy paradox”, a concept <a href="https://www.hpl.hp.com/techreports/2001/HPL-2001-49.pdf">first studied</a> about two decades ago.</p>
<p>To investigate this phenomenon further, <a href="https://www.sciencedirect.com/science/article/pii/S0167404820301711">we conducted a research project</a> and found that, despite being concerned about privacy, participants were willing to sacrifice some of it in exchange for the convenience afforded by an internet-connected device. </p>
<h2>Unpacking the privacy paradox</h2>
<p>Any “smart” device connected to the internet is called an <a href="https://www.zdnet.com/article/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now/">Internet of Things</a> (IoT) device. These can be remotely monitored and controlled by the owners.</p>
<p>The projected growth of IoT devices is staggering. By 2025, they’re expected to <a href="https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/">reach 75.44 billion</a> – an increase of 146% from 2020.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=399&fit=crop&dpr=1 600w, https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=399&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=399&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=502&fit=crop&dpr=1 754w, https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=502&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/350059/original/file-20200729-27-17hifh4.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=502&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">The global IoT network is a collection of all the interconnected devices that can communicate online. This includes smart devices, appliances and wearable tech.</span>
<span class="attribution"><span class="source">Shutterstock</span></span>
</figcaption>
</figure>
<p>Are device owners <a href="https://www.researchgate.net/publication/316866340_Yes_I_know_this_IoT_Device_Might_Invade_my_Privacy_but_I_Love_it_Anyway_A_Study_of_Saudi_Arabian_Perceptions">genuinely concerned about their privacy</a>? Recent worldwide anxiety about personal information shared through <a href="https://www.forbes.com/sites/zakdoffman/2020/06/27/covid-19-phone-tracking-apps-this-is-what-youre-not-being-told/#43f6bb502970">COVID-19 tracing apps</a> seems to suggest so. </p>
<p>But as the <a href="https://www.theguardian.com/commentisfree/2019/may/05/privacy-paradox-why-do-people-keep-using-tech-firms-data-facebook-scandal">privacy paradox</a> highlights, users expressing privacy concerns often fail to act in accordance with them. They freely divulge personal information in exchange for services and convenience.</p>
<p>Explanations for the privacy paradox abound. Some suggest:</p>
<ul>
<li>people find it difficult to associate a specific value to their privacy and therefore, the value of protecting it</li>
<li>people do not consider their <a href="https://theconversation.com/we-dont-own-data-like-we-own-a-car-which-is-why-we-find-data-harder-to-protect-98469">personal information to be their own</a> and thus might not appreciate the need to secure it</li>
<li>people completely lack awareness of <a href="https://humanrights.gov.au/our-work/commission-general/privacy">their right to privacy</a> or <a href="https://dl.acm.org/doi/10.1145/1979742.1979887">privacy issues</a> and believe their <a href="https://dl.acm.org/doi/abs/10.1145/2556288.2557421?casa_token=O5o_MevKSSEAAAAA:z9ZBt5DQL0jK0rYulPCO8BGJMi9IqTjKNccYXFx0SGBLlMdwSaByjgVGVDdH7O_9Cg41hspZFq0noBQ">desired goals</a> (such as a personalised experience) outweigh the potential risks (such as big tech companies using their data for profiling).</li>
</ul>
<p>The likely explanation for the privacy paradox is a mix of all these factors.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/how-facebook-uses-the-privacy-paradox-to-keep-users-sharing-94779">How Facebook uses the ‘privacy paradox’ to keep users sharing</a>
</strong>
</em>
</p>
<hr>
<h2>What if we <em>proved</em> your device harvests data?</h2>
<p>To understand whether and how the privacy paradox applies to IoT devices, we conducted an experiment involving 46 Saudi Arabian participants. This is because in Saudi Arabia the use of IoT is <a href="https://saudigazette.com.sa/article/590331">exploding</a> and the country <a href="https://www.financierworldwide.com/cyber-security-and-data-privacy-law-in-saudi-arabia#.XyC-LfgzbVo">does not have</a> strong privacy regulations. </p>
<p>We gave participants a smart plug that let them switch a table lamp on or off using an app on their smartphone. We then showed them the device’s privacy policy and measured participants’ privacy concerns and trust in the device. </p>
<p>None of the participants read the privacy policy. They simply agreed to commence with the study.</p>
<p>After two hours, we presented evidence of how much of their data the IoT-connected plug was harvesting, then remeasured their privacy concerns and trust. </p>
<p>After the participants saw evidence of privacy violation, their privacy concerns increased and trust in the device decreased. However their behaviour did not align with their concern, as shown by the fact that:</p>
<ul>
<li>15 participants continued to use the device regardless</li>
<li>13 continued to use it with their personal information removed</li>
<li>only three opted to block all outbound traffic to unusual IP addresses.</li>
</ul>
<p>The rest preferred “light-touch” responses, such as complaining on social media, complaining to the device’s manufacturer or falsifying their shared information.</p>
<p>After one month, we measured participants’ attitudes a third time and discovered their privacy concerns and trust in the device had reverted to pre-experiment levels.</p>
<h2>How to prevent complacency</h2>
<p>Two decades since the first privacy paradox studies were conducted and despite a great deal of <a href="https://onlinelibrary.wiley.com/doi/abs/10.1002/ejsp.2049">research</a>, there is still a mismatch between people’s stated privacy concerns and their protective behaviours. How can we improve this? </p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=600&fit=crop&dpr=1 600w, https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=600&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=600&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=754&fit=crop&dpr=1 754w, https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=754&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/350061/original/file-20200729-27-tmgoj7.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=754&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Every time you connect a new device to the internet, or opt-in to a new service, ask yourself: ‘do I really need this?’</span>
<span class="attribution"><span class="source">Shutterstock</span></span>
</figcaption>
</figure>
<p>The first step is to simply be aware our judgement of IoT device risks and benefits may not be accurate. With that in mind, we should always take time to read the privacy policies of our devices.</p>
<p>Besides informing us of the risks, reading privacy policies can help us <em>stop</em> and <em>think</em> before connecting a new device to the internet. Ask yourself: “is this really going to benefit me?” </p>
<p>As citizen surveillance increases, it’s not wise to mindlessly scroll through privacy policies, tick a box and move on.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/the-accc-is-suing-google-for-misleading-millions-but-calling-it-out-is-easier-than-fixing-it-143447">The ACCC is suing Google for misleading millions. But calling it out is easier than fixing it</a>
</strong>
</em>
</p>
<hr>
<p>Second, we should not assume our personal information is trivial and would not interest anyone. <a href="https://www.accc.gov.au/media-release/accc-alleges-google-misled-consumers-about-expanded-use-of-personal-data">Time after time</a> we have witnessed how <a href="https://techfruit.com/2018/03/30/the-internet-is-a-privacy-nightmare-be-careful-with-your-personal-data/">our digital traces</a> can be valuable to malicious individuals or large corporations. </p>
<p>And finally, always change the default password on any new IoT device to a <a href="https://www.cnet.com/how-to/strong-passwords-9-rules-to-help-you-make-and-remember-your-login-credentials/">stronger one</a>. Write down this password and secure it, perhaps with other physical valuables, so you don’t have to worry about forgetting it.</p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"1205284700945649666"}"></div></p><img src="https://counter.theconversation.com/content/143354/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.</span></em></p>For decades experts have puzzled over why most people claim to have privacy concerns, but few actually do enough about it.Ivano Bongiovanni, Lecturer in Information Security, Governance and Leadership / Design Thinking, The University of QueenslandKaren Renaud, Visiting Professor, Rhodes UniversityNoura Aleisa, Assistant professor of Computer Science, Saudi Electronic University Licensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1421942020-07-24T14:38:25Z2020-07-24T14:38:25ZPolice surveillance of Black Lives Matter shows the danger technology poses to democracy<p>US police forces have been turning to technology to track down Black Lives Matter protestors. Content from social media platforms and <a href="https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveillance-black-lives-matter-protests/">affiliated sites</a> has <a href="https://www.inquirer.com/news/philly-protests-arrests-fbi-lore-elisabeth-blumenthal-george-floyd-20200617.html">been instrumental</a> in the authorities being able to <a href="https://www.cnet.com/news/police-use-of-social-media-is-under-a-microscope-amid-protests/">identify protestors</a> based on photos of their faces, clothes and hair, or on the fact that they <a href="https://www.theurbanist.org/2020/06/07/council-stands-with-protesters/">posted while at the protests</a>. Meanwhile, drones <a href="https://www.nytimes.com/2020/06/19/us/politics/george-floyd-protests-surveillance.html">have been added</a> to the police’s own means of capturing footage of the protests.</p>
<p>Making technology-driven state surveillance part of the police’s response to democratic protest sets a dangerous precedent. There is a risk that the power this gives to police to target protestors could be abused and have a chilling effect on freedom of speech and assembly. This is particularly true in the case of Black Lives Matter, given alleged evidence of the infiltration of US law enforcement agencies <a href="https://www.thedailybeast.com/inside-the-new-push-to-expose-americas-white-supremacist-cops">by white supremacists</a>.</p>
<p>What’s more, the amount of data on people that is gathered by technology and potentially available to law enforcement is set to grow thanks to the rapid expansion of internet-connected devices (known as the <a href="https://www.statista.com/topics/2637/internet-of-things/">Internet of Things</a>, or IoT).</p>
<p>The Internet of Things could, if left unchecked, give authorities seemingly unlimited ways to mine for information on people, both users of the technology and bystanders. Voice operated assistants such as <a href="https://theconversation.com/amazon-echos-privacy-issues-go-way-beyond-voice-recordings-130016">Amazon Alexa</a> and Google Home record our conversations; <a href="https://www.sciencedirect.com/science/article/pii/S0747563219301748">smart watches</a> and <a href="https://theconversation.com/strava-storm-why-everyone-should-check-their-smart-gear-security-settings-before-going-for-a-jog-90880">fitness trackers</a> monitor our movements, and even many traditional home appliances now collect data on us, from <a href="https://kar.kent.ac.uk/67472/1/2017-pst-wnc-preprint.pdf">smart fridges</a> to <a href="https://www.bbc.co.uk/news/technology-28582479">washing machines</a>.</p>
<p>The growing prevalence and variety of these devices means <a href="https://theconversation.com/amazon-facebook-and-google-dont-need-to-spy-on-your-conversations-to-know-what-youre-talking-about-108792">a huge amount of data can be compiled on us</a> by corporations in the name of improving user services or targeted advertising. But thanks to <a href="https://theconversation.com/how-the-uk-passed-the-most-invasive-surveillance-law-in-democratic-history-69247">recent surveillance laws</a>, state authorities can also request and gather a <a href="https://theconversation.com/the-new-data-retention-law-seriously-invades-our-privacy-and-its-time-we-took-action-78991">large amount of this data</a>. And government bodies are already starting to capitalise on the new capabilities provided by the Internet of Things. </p>
<p>For example, some IoT technologies, such as internet-connected Amazon Ring doorbells that can record video footage, have become an informal addition to <a href="https://www.theguardian.com/technology/2020/jun/09/amazon-black-lives-matter-police-ring-jeff-bezos">state surveillance infrastructure</a>. Ring’s <a href="https://www.eff.org/deeplinks/2020/06/amazon-ring-must-end-its-dangerous-partnerships-police">partnerships with police forces</a> gives them access to camera locations so they can request footage from specific device owners (and obtain it by warrant if they refuse). </p>
<p>Some deals have involved giving away the doorbells to the public <a href="https://www.thetimes.co.uk/article/police-and-amazon-build-surveillance-state-with-free-all-seeing-doorbells-dwdt3t6q0">for free</a>. This effectively creates a cheap state monitoring network that has reportedly led to <a href="https://www.vice.com/en_us/article/qvyvzd/amazons-home-security-company-is-turning-everyone-into-cops">racial profiling</a> among users.</p>
<h2>Threat to protestors</h2>
<p>IoT technology <a href="https://kar.kent.ac.uk/80999/1/EuroUSEC-2020-Journalists-IoT-Risks.pdf">also could be used</a> specifically against protestors, activists and journalists. Not only could collected data be used to identify or track people even more effectively than social media posts, but reliance on the technology could also leave people and groups <a href="https://kar.kent.ac.uk/67476/1/2017-itpro-ncd_author-final.pdf">vulnerable to cyber attacks</a>. </p>
<p>For example, <a href="https://theconversation.com/how-a-cyber-attack-hampered-hong-kong-protesters-118770">in Hong Kong</a> we’ve seen attempts to disrupt the communication of protestors and force them to use less secure channels that can more easily be monitored. There’s even a chance that the <a href="https://www.cnet.com/roadshow/news/2019-automotive-cyber-hack-security-study-upstream">rise of hackable internet-connected cars</a> could lead to more vehicular attacks on protests, as have occurred against <a href="https://slate.com/business/2020/06/george-floyd-protests-cars-ramming-racism.html">anti-racism demonstrations in the US</a>.</p>
<p>Despite these threats, our <a href="https://kar.kent.ac.uk/80999/1/EuroUSEC-2020-Journalists-IoT-Risks.pdf">recent research</a> shows journalists in particular are not generally aware of or protected from IoT technology being used to target them. What’s more, having your data gathered by IoT devices might soon be unstoppable even if you don’t own or use them. As part of our research, we surveyed 34 cyber security experts and found that 76.5% of them believe that it will not be possible for people to opt-out of interaction with the IoT within the next five years. </p>
<p>You might not be able to walk through a residential street without being filmed, or talk to a family member while in a doctor’s waiting room without your conversation being recorded. For activists and protestors, this huge prevalence of technologies and databases that are accessible to the state means an ever-increasing risk of being identified, tracked and surveilled, as shown by the newly released <a href="https://atlasofsurveillance.org/">Atlas of Surveillance</a>.</p>
<p>With the growing threat of state surveillance through the IoT, activists are starting to take measures to protect themselves. More are <a href="https://www.wired.com/story/how-to-protest-safely-surveillance-digital-privacy/">becoming aware</a> of the risks of taking a registered smartphone, which is essentially a personalised tracking device, on a protest. Others are following the example of protesters in Hong Kong, who recently <a href="https://www.scmp.com/lifestyle/fashion-beauty/article/3033312/china-bans-exports-black-clothing-hong-kong-amid-protests">adopted an informal all-black “uniform”</a> complete with face masks to make it harder for authorities to identify individuals from online photos.</p>
<p>As well as providing secure, independent, encrypted messaging, the app Signal has responded to police forces’ technological identification of protesters by creating <a href="https://signal.org/blog/blur-tools/">a tool that blurs people’s faces in photos</a>. Although programs exists that can attempt to unblur pixelated photos, the fact that so much software isn’t built <a href="https://www.wired.com/story/best-algorithms-struggle-recognize-black-faces-equally/">with black people in mind</a> could ironically make it <a href="https://www.businessinsider.com/depixelator-turned-obama-white-illustrates-racial-bias-in-ai-2020-6">worse at revealing</a> the faces of people of colour.</p>
<p>This issue reminds us that technology is never neutral, particularly when people exercising their right to protest have their data used against them. In this case, against people fighting against structural racism and police brutality against black and indigenous people.</p><img src="https://counter.theconversation.com/content/142194/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Anjuli R. K. Shere receives funding from The Engineering and Physical Sciences Research Council (EPSRC).</span></em></p><p class="fine-print"><em><span>Jason Nurse receives funding from The Engineering and Physical Sciences Research Council (EPSRC).</span></em></p>The massive increase in internet-connected devices will create an informal surveillance network that could be used to target protestors and activists.Anjuli R. K. Shere, Doctoral researcher in Cyber Security, University of OxfordJason R.C. Nurse, Assistant Professor in Cyber Security, University of KentLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1352502020-05-12T15:30:09Z2020-05-12T15:30:09ZOur ‘zombie’ solar cells could power indoor devices without sunlight<figure><img src="https://images.theconversation.com/files/333043/original/file-20200506-49538-1em3fre.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/young-woman-controlling-home-digital-touch-1584383902">RossHelen/Shutterstock</a></span></figcaption></figure><p>Internet connected devices need power. That either means connecting them to the grid, which limits what we can use them for, or using batteries. So as the <a href="https://theconversation.com/explainer-the-internet-of-things-16542">Internet of Things</a> grows and more and more internet-enabled devices and sensors are rolled out as is expected, it could produce billions of extra batteries that have to be recycled every year, or else will just be thrown away.</p>
<p>The average UK household already uses an estimated average of <a href="http://www2.eng.cam.ac.uk/%7Edmh/ptialcd/battery/index.htm">21 batteries</a> a year. In total, this leads to an annual figure of 20,000-30,000 tons of general purpose battery waste. Only a very small number of these batteries are recycled (less than 2% of disposable batteries and around 5% of rechargeable ones) and most waste batteries end up in landfill sites.</p>
<p>To avoid this but still make the Internet of Things possible, my colleagues and I are helping develop a new type of smart solar cell that can adapt to the amount of available light, meaning it can work indoors. These cells can even outperform extremely efficient versions that are normally used for trips into space. They’re also based on a surprising discovery, that some solar cells can work better when the liquid electrolyte built into them dries out. For this reason, we call them “zombie solar cells”.</p>
<p>The cells are a type of <a href="https://nanoscalereslett.springeropen.com/articles/10.1186/s11671-018-2760-6">“dye-sensitised” solar cell</a> made from a thin film of material that works on different principle to the common silicon cells that make up solar panels we’re more familiar with. They usually comprise a dye that absorbs lights, freeing electrons to create a current that is then carried to the cell’s electrodes by a liquid electrolyte solution.</p>
<p>When the electrolyte dries out, the cell normally stops functioning. But this is not what happened when scientific curiosity led researchers to measure dried-out “zombie” solar cells made with a new electrolyte based on copper complexes. They discovered the cells <a href="https://doi.org/10.1039/C5EE01204J">actually worked better</a> than when they were liquid-filled.</p>
<p>We are currently still investigating why the solid copper complexes work better. But as well as providing a better rate of electron transfer, these new cells use more readily available materials and are easy to synthesise. The <a href="https://doi.org/10.1039/C9SC06145B">latest generation</a> of zombie solar cells can even run on artificial ambient light instead of sunlight because, like plants, they are optimised to absorb the most energy-rich parts of the light they are exposed to. </p>
<p>These indoor solar cells have power conversion efficiencies of 30%-34%, even when scaling their size to the size of credit cards or mobile phones. In fact, the cells are so efficient that they harvest the equivalent of a small battery every few days.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&rect=0%2C141%2C1189%2C865&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=800&fit=crop&dpr=1 600w, https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=800&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=800&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1005&fit=crop&dpr=1 754w, https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1005&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/330045/original/file-20200423-47815-1ar022u.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1005&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Researcher Hannes Michaels holding a prototype zombie solar cell.</span>
<span class="attribution"><span class="license">Author provided</span></span>
</figcaption>
</figure>
<h2>Smart zombies</h2>
<p>In collaboration with the team led by Prof Alessio Gagliardi from the Technical University of Munich, my research group has now used these new light harvesters to create “smart zombies”. These are wireless devices that harvest indoor light at extremely high efficiencies. They are intelligent enough to adapt to the amount of light available while performing the essential tasks of an <a href="https://www.wired.co.uk/article/internet-of-things-what-is-explained-iot">Internet of Things</a> device (communication, processing and sensing). </p>
<p>Using machine learning algorithms to work out the best pattern of usage, the smart cells intermittently enter a sleep mode to save harvested energy into a small energy buffer. They tend to sleep longer when there is less light available, and execute more of their essential tasks when there is more light available. </p>
<p>Being able to use an ambient light power source so efficiently in this way means that we can develop a new class of Internet of Things devices that just wouldn’t have been practical before. This opens the possibility of devices that can <a href="https://science.sciencemag.org/content/364/6438/326">assist in many more areas</a>, from smart packages that send themselves back if they’re dropped, to environmental sensors that can could detect when everyone has left a room and lower the temperature. </p>
<p>This could also enable some devices to become truly smart as opposed to simply remote controlled. One example here is the thousands of electronic price tags that can be found in supermarkets. They are currently battery-powered and updated as rarely as possible to extend battery life. With indoor photovoltaic panels, they could be developed to automatically change their price when the food is about to expire or overstocks need to be sold. </p>
<p>Without the need for batteries or a grid connection, you could have dozens of small devices and environmental sensors around the home, and hundreds or even thousands around large workplaces such as supermarkets or warehouses.</p>
<p>Our smart zombie cells are currently a lab-scale prototype. But <a href="https://www.pv-magazine.com/2020/02/05/ricoh-launches-solar-cell-for-indoor-applications">other companies</a> have already started to produce indoor solar cells. So, in principle, making our adaptive low-light cells a commercial reality could be done very quickly.</p><img src="https://counter.theconversation.com/content/135250/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Royal Society University Research Fellowship, Göran Gustafsson Foundation</span></em></p>How indoor solar cells could help power the Internet of Things.Marina Freitag, Royal Society University Research Fellow, Newcastle UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1336792020-03-27T12:15:03Z2020-03-27T12:15:03ZSociety’s dependence on the internet: 5 cyber issues the coronavirus lays bare<figure><img src="https://images.theconversation.com/files/322734/original/file-20200324-141843-c1rt4c.jpg?ixlib=rb-1.1.0&rect=8%2C0%2C5982%2C3961&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">The pandemic is increasing society's reliance on digital connections.</span> <span class="attribution"><a class="source" href="https://www.gettyimages.com/detail/photo/internet-of-things-concept-social-icon-on-3d-space-royalty-free-image/1165240659?adppopup=true">MR.Cole_Photographer/Moment via Getty Images</a></span></figcaption></figure><p>As more and more U.S. schools and businesses shutter their doors, the rapidly evolving coronavirus pandemic is helping to expose society’s dependence – good and bad – on the digital world. </p>
<p>Entire swaths of society, including <a href="https://www.american.edu/president/announcements/march-12-2020.cfm">classes we teach at American University</a>, have moved online until the coast is clear. As vast segments of society are temporarily forced into isolation to achieve social distancing, the internet is their window into the world. Online social events like virtual happy hours foster a sense of connectedness amid social distancing. While the online world is often portrayed as a societal ill, this pandemic is a reminder of how much the digital world has to offer.</p>
<p>The pandemic also lays bare the many vulnerabilities created by society’s dependence on the internet. These include the dangerous consequences of censorship, the constantly morphing spread of disinformation, supply chain vulnerabilities and the risks of weak cybersecurity. </p>
<h2>1. China’s censorship affects us all</h2>
<p>The global pandemic reminds us that even <a href="https://slate.com/technology/2020/03/china-coronavirus-tencent-wechat-facebook-consolidation-censorship.html">local censorship can have global ramifications</a>. <a href="https://citizenlab.ca/2020/03/censored-contagion-how-information-on-the-coronavirus-is-managed-on-chinese-social-media/">China’s early suppression of coronavirus information</a> likely contributed to what is now a worldwide pandemic. Had the doctor in Wuhan who spotted the outbreak been able to speak freely, public health authorities might have been able to do more to contain it early. </p>
<p>China is not alone. Much of the world lives in countries that impose <a href="https://freedomhouse.org/report/freedom-net/2016/silencing-messenger-communication-apps-under-pressure">controls on what can and cannot be said about their governments online</a>. Such censorship is not just a free speech issue, but a public health issue as well. Technologies that circumvent censorship are increasingly a matter of life and death. </p>
<h2>2. Disinformation online isn’t just speech – it’s also a matter of health and safety</h2>
<p>During a public health emergency, sharing accurate information rapidly is critical. Social media can be an effective tool for doing just that. But it’s also a source of disinformation and manipulation in ways that can threaten global health and personal safety – something tech companies are desperately, yet imperfectly, trying to combat. </p>
<p>Facebook, for example, has banned ads selling face masks or <a href="https://about.fb.com/news/2020/03/coronavirus/">promising false preventions or cures</a>, while giving the World Health Organization unlimited ad space. Twitter is placing links to the Centers for Disease Control and Prevention and other reliable information sources atop search returns. Meanwhile, Russia and others <a href="https://slate.com/technology/2020/03/coronavirus-china-russia-misinformation-censorship.html">reportedly are spreading rumors</a> about the coronavirus’s origins. Others are using the coronavirus to spread <a href="https://www.economist.com/china/2020/02/17/the-coronavirus-spreads-racism-against-and-among-ethnic-chinese">racist vitriol</a>, in ways that put individuals at risk.</p>
<p>Not only does COVID-19 warn us of the costs – and geopolitics – of disinformation, it highlights the roles and responsibilities of the private sector in confronting these risks. Figuring out how to do so effectively, without suppressing legitimate critics, is one of the greatest challenges for the next decade. </p>
<h2>3. Cyber resiliency and security matter more than ever</h2>
<p>Our university has moved our work online. We are holding meetings by video chat and conducting virtual courses. While many don’t have this luxury, including those on the front lines of health and public safety or newly unemployed, thousands of other <a href="https://thehill.com/policy/healthcare/public-global-health/487386-higher-education-institutions-close-move-classes">universities</a>, <a href="https://www.businessinsider.com/companies-asking-employees-to-work-from-home-due-to-coronavirus-2020#over-in-austin-texas-and-in-the-bay-area-indeed-told-employees-to-from-home-until-the-end-of-march-to-be-cautious-of-the-virus-6">businesses</a> and other institutions also moved online – a testament to the benefits of technological innovation.</p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=402&fit=crop&dpr=1 600w, https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=402&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=402&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=505&fit=crop&dpr=1 754w, https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=505&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/322733/original/file-20200324-155631-1txbb4v.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=505&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">Harvard Business School professor Bharat Anand demonstrates HBX Live, an online classroom.</span>
<span class="attribution"><a class="source" href="http://www.apimages.com/metadata/Index/Harvard-Online-Classroom/308d5bddb0634eb5ba970fe59e305871/76/0">AP Photo/Gretchen Ertl</a></span>
</figcaption>
</figure>
<p>At the same time, these moves remind us of the importance of strong encryption, reliable networks and effective cyber defenses. Today network outages are not just about losing access to Netflix but about losing livelihoods. Cyber insecurity is also a threat to public health, such as when <a href="https://www.reuters.com/article/us-california-hospital-cyberattack/california-hospital-makes-rare-admission-of-hack-ransom-payment-idUSKCN0VS05M">ransomware attacks disrupt entire medical facilities</a>. </p>
<h2>4. Smart technologies as a lifeline</h2>
<p>The virus also exposes the promise and risks of the “internet of things,” the globe-spanning web of always-on, always-connected cameras, thermostats, alarm systems and other physical objects. Smart thermometers, blood pressure monitors and other medical devices are increasingly connected to the web. This makes it easier for people with pre-existing conditions to manage their health at home, rather than having to seek treatment in a medical facility where they are at much greater risk of exposure to the disease. </p>
<p>Yet this reliance on the internet of things carries risks. Insecure smart devices <a href="https://theconversation.com/internet-of-things-could-be-an-unseen-threat-to-elections-132142">can be co-opted to disrupt democracy</a> and society, such as when the <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/">Mirai botnet hijacked home appliances</a> to disrupt critical news and information sites in the fall of 2016. When digitally interconnected devices are attacked, their benefits suddenly disappear – adding to the sense of crisis and sending those dependent on connected home diagnostic tools into already overcrowded hospitals. </p>
<h2>5. Tech supply chain is a point of vulnerability</h2>
<p>The shutdown of Chinese factories in the wake of the pandemic interrupted the supply of critical parts to many industries, including the U.S. tech sector. Even Apple had to temporarily <a href="https://www.apple.com/newsroom/2020/02/investor-update-on-quarterly-guidance/?subId1=xid:fr1583953773221daa">halt production</a> of the iPhone. Had China not begun to recover, the toll on the global economy could have been even greater than it is now.</p>
<p>This interdependence of our supply chain is neither new nor tech-specific. Manufacturing – <a href="https://theconversation.com/medical-supply-chains-are-fragile-in-the-best-of-times-and-covid-19-will-test-their-strength-133688">medical</a> and otherwise – has long depended on parts from all over the world. The crisis serves as a reminder of the global, complex interactions of the many companies that produce gadgets, phones, computers and many other products on which the economy and society as a whole depend. Even if the virus had never traveled outside of China, the effects would have reverberated – highlighting ways in which even local crises have global ramifications.</p>
<h2>Cyber policy in everything</h2>
<p>As the next phase of the pandemic response unfolds, society will be grappling with more and more difficult questions. Among the many challenges are complex choices about how to curb the spread of the disease while preserving core freedoms. How much tracking and surveillance are people willing to accept as a means of protecting public health? </p>
<p>As Laura explains in “<a href="https://yalebooks.yale.edu/book/9780300233070/internet-everything">The Internet in Everything</a>,” cyber policy is now entangled with everything, including health, the environment and consumer safety. Choices that we make now, about cybersecurity, speech online, encryption policies and product design will have dramatic ramifications for health, security and basic human flourishing. </p>
<p>[<em>Get facts about coronavirus and the latest research.</em> <a href="https://theconversation.com/us/newsletters?utm_source=TCUS&utm_medium=inline-link&utm_campaign=newsletter-text&utm_content=upper-coronavirus-facts">Sign up for our newsletter.</a>]</p><img src="https://counter.theconversation.com/content/133679/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Laura DeNardis receives research funding from the Hewlett Foundation Cyber Initiative. </span></em></p><p class="fine-print"><em><span>Jennifer Daskal does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Much of the world is moving online in response to the coronavirus pandemic. Society’s newly increased dependence on the internet is bringing the need for good cyber policy into sharp relief.Laura DeNardis, Professor of Communication Studies, American University School of CommunicationJennifer Daskal, Professor of Law and Faculty Director, Technology, Law & Security Program, American UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1321422020-03-06T13:02:04Z2020-03-06T13:02:04Z‘Internet of things’ could be an unseen threat to elections<figure><img src="https://images.theconversation.com/files/317862/original/file-20200228-24651-13l4r2p.jpg?ixlib=rb-1.1.0&rect=38%2C12%2C4166%2C2809&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Elements of smart homes, including thermostats, may be vulnerable to hackers.</span> <span class="attribution"><a class="source" href="https://www.gettyimages.com/detail/news-photo/nick-delena-adjusts-his-thermostat-from-nest-labs-in-his-news-photo/176512114">Ann Hermes/The Christian Science Monitor via Getty Images</a></span></figcaption></figure><p>The app failure that led to a chaotic <a href="https://www.cnbc.com/2020/02/04/iowa-caucus-app-debacle-is-one-of-the-most-stunning-it-failures-ever.html">2020 Iowa caucus</a> was a reminder of how vulnerable the democratic process is to technological problems – even without any malicious outside intervention. Far more sophisticated foreign hacking continues to try to disrupt democracy, as a <a href="https://www.fbi.gov/news/pressrel/press-releases/joint-statement-from-dos-doj-dod-dhs-odni-fbi-nsa-and-cisa-on-preparations-for-super-tuesday">rare joint federal agency warning</a> advised prior to Super Tuesday. Russia’s attempt to <a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf">interfere in the 2016 election</a> has already revealed how this could happen: social media disinformation, email hacking and probing of voter registration systems. </p>
<p>The threats to the 2020 election may be even more insidious. As I explain in my new book, “<a href="https://yalebooks.yale.edu/book/9780300233070/internet-everything">The Internet in Everything: Freedom and Security in a World with No Off Switch</a>,” election interference may well come through the vast constellation of always-on, always-connected cameras, thermostats, alarm systems and other physical objects collectively known as the “internet of things.” </p>
<p>The social and economic benefits of these devices are tremendous. But, in large part because the devices are not yet adequately secure, they also raise concerns for consumer safety, national security and privacy. And they create new vulnerabilities for democracy.</p>
<p>It is not necessary to hack into voting systems themselves but merely co-opt internet-connected objects to attack political information sites, stop people from voting, or exploit the intimate personal data these devices capture to manipulate voters.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=337&fit=crop&dpr=1 600w, https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=337&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=337&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=424&fit=crop&dpr=1 754w, https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=424&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/317457/original/file-20200226-24668-1y7j8hy.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=424&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">How will people get information now?</span>
<span class="attribution"><span class="source">Twitter</span></span>
</figcaption>
</figure>
<h2>Disrupting political communication</h2>
<p>Connected objects have already been hijacked to shut down internet traffic. </p>
<p>The <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/">Mirai botnet</a> of 2016 hijacked insecure video cameras and other home devices to launch a massive “distributed denial of service” attack that <a href="https://www.theatlantic.com/technology/archive/2016/10/how-a-bunch-of-hacked-dvr-machines-took-down-twitter-and-reddit/505073/">blocked access to many popular sites</a>, including Reddit and Twitter. More recently, the FBI arrested a hacker for <a href="https://thehill.com/homenews/house/484122-fbi-arrests-hacker-linked-to-former-rep-katie-hills-2018-campaign">allegedly disrupting a California congressional candidate’s website</a>, flooding it with so many false requests it became inaccessible for legitimate views.</p>
<p>Similar political attacks that hijack some of the billions of often insecure connected devices could disrupt campaign websites and social media. They could also restrict public access to government websites with information about how and where to vote, as well as news reports on election results.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=316&fit=crop&dpr=1 600w, https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=316&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=316&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=397&fit=crop&dpr=1 754w, https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=397&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/317456/original/file-20200226-24655-1xt9fb6.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=397&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">What if this traffic jam were caused by hacking the traffic light itself?</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/fort-lauderdale-florida-usa-may-traffic-1406298935">Jillian Cain Photography/Shutterstock.com</a></span>
</figcaption>
</figure>
<h2>Preventing people from voting</h2>
<p>Beyond blocking access to political information, a foreign agent or group might seek to stop people from voting by creating targeted chaos, whether by disrupting power systems, generating <a href="https://www.wired.com/story/99-phones-fake-google-maps-traffic-jam/">false weather or traffic reports</a>, or otherwise triggering local emergencies that divert attention on Election Day.</p>
<p>Smart cities and the industrial internet of things are already targets, as evidenced by the yearslong history of <a href="https://www.us-cert.gov/ics/alerts/IR-ALERT-H-16-056-01">Russia-attributed disruptions to Ukrainian power systems</a>. Hacking home alarm or water systems could create <a href="https://www.king5.com/article/news/local/no-emergency-false-alert-over-radiological-incident-sent-by-jefferson-county/281-568c86b3-8aae-4df0-b3b3-5dd4c800e0e8">politically micro-targeted local emergencies</a> that distract people who would otherwise vote.</p>
<p>This type of local disruption in swing districts would be more likely to evade public or press scrutiny than an outright hack of election machines or vote-tallying systems.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=445&fit=crop&dpr=1 600w, https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=445&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=445&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=559&fit=crop&dpr=1 754w, https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=559&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/317460/original/file-20200226-24701-max3wi.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=559&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Your home security systems knows when you leave for work, and when you get back.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/pressing-code-on-house-alarm-100369859">ESB Professional/Shutterstock.com</a></span>
</figcaption>
</figure>
<h2>Making phishing hacks more credible</h2>
<p>The massive amount of intimate data these devices collect – when someone enters a building, drives a car, uses a sink, or turns on a coffee machine – could also make political operatives more susceptible to highly targeted spear <a href="https://theconversation.com/spearphishing-roiled-the-presidential-campaign-heres-how-to-protect-yourself-68274">phishing</a> attacks. These tactics trick people into relinquishing personal information or clicking on malicious links – mistakes that gave hackers access to <a href="https://techcrunch.com/2019/04/18/mueller-clinton-arizona-hack/">Democratic National Committee emails in 2016</a>.</p>
<p>Similar <a href="https://www.cnn.com/2020/01/22/politics/democratic-campaigns-targeted-scams/index.html">phishing attempts on political campaigns continue</a>, seeking to infiltrate email accounts used by presidential and down-ballot candidates. The more believable they are, <a href="https://www.rand.org/blog/2015/10/social-engineering-explained-the-human-element-in-cyberattacks.html">the more effective they are</a> – so an email referencing personal facts gleaned from connected objects would make these attacks more potent. </p>
<h2>Not being surprised again</h2>
<p>More things than people are now connected to the internet. These connected objects are a new terrain for election interference – and people shouldn’t be surprised if they’re used that way.</p>
<p>To address this over the long term, customers will have to demand better privacy and security from their connected devices, such as doorbells and <a href="https://www.usatoday.com/story/tech/2020/02/05/how-to-avoid-smart-lights-getting-hacked/4660430002/">lightbulbs</a>. Companies – and political institutions – that connect these devices to their networks will have to build in appropriate safeguards. Manufacturers will also have to design better protections into their devices. There may also need to be data privacy <a href="https://theconversation.com/fragmented-us-privacy-rules-leave-large-data-loopholes-for-facebook-and-others-94606">laws limiting</a> how personal information is collected and shared.</p>
<p>More immediately, though, it is essential not only for state and local authorities and intelligence communities to remain vigilant, but for citizens to <a href="https://www.us-cert.gov/ncas/current-activity/2019/12/31/secure-new-internet-connected-devices">take security precautions</a> with their own devices, and be on high alert for personalized attempts to influence or disrupt their political participation. </p>
<p>Preserving democracy now requires taking seriously the consequences of the internet being deeply embedded in the physical world – the internet in everything. We are all responsible.</p>
<p>[<em>You’re smart and curious about the world. So are The Conversation’s authors and editors.</em> <a href="https://theconversation.com/us/newsletters/weekly-highlights-61?utm_source=TCUS&utm_medium=inline-link&utm_campaign=newsletter-text&utm_content=weeklysmart">You can get our highlights each weekend</a>.]</p><img src="https://counter.theconversation.com/content/132142/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Laura DeNardis receives research funding from the Hewlett Foundation Cyber Initiative.
</span></em></p>Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.Laura DeNardis, Professor of Communication Studies, American University School of CommunicationLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1279172020-01-30T19:04:27Z2020-01-30T19:04:27ZAs cities grow, the Internet of Things can help us get on top of the waste crisis<figure><img src="https://images.theconversation.com/files/312356/original/file-20200128-119984-1xoo3s6.jpg?ixlib=rb-1.1.0&rect=0%2C14%2C2943%2C1930&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Melbourne is one Australian city that's moving to improve its waste management and reduce its reliance on trucks to collect waste.</span> <span class="attribution"><span class="source">TK Kurikawa/Shutterstock</span></span></figcaption></figure><p>Total global waste is expected to double from nearly 2 billion tonnes in 2016 to an <a href="https://sustainabledevelopment.un.org/sdg11">estimated 4 billion tonnes</a> by 2050 as consumer-oriented urban populations grow. As population growth increases consumption and waste, managing this waste is becoming an ever greater challenge. The <a href="https://www.zdnet.com/article/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now/">Internet of Things</a> (IoT) can be used to develop smarter and more effective ways of managing and reducing waste. </p>
<p>IoT is a monitoring technology, which enables accurate tracking and collection of real-time data. It can help with problems such as timing of waste collection, and waste treatment and disposal. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/the-next-great-leap-forward-combining-robots-with-the-internet-of-things-108307">The next great leap forward? Combining robots with the Internet of Things</a>
</strong>
</em>
</p>
<hr>
<h2>How a smart city manages waste</h2>
<p>IoT can enable automation, through cyber-physical systems, that changes the way waste management takes place. Some cities are already using a combination of IoT and sensors to operate smart waste management systems. </p>
<p>For example, Songdo in South Korea is a purpose-built smart city that uses a combination of IoT and sensors to operate its <a href="https://culturaldimensionsustainability.wordpress.com/2017/05/09/376/">waste management system</a>. Songdo aims to <a href="https://medium.com/cusp-civic-analytics-urban-intelligence/what-can-we-learn-from-songdo-ibd-a-35-billion-1500-acre-model-for-future-smart-city-7146af64f3d2">recycle 76% of its waste</a> by 2020, through its highly efficient and convenient waste management system. </p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=598&fit=crop&dpr=1 600w, https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=598&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=598&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=752&fit=crop&dpr=1 754w, https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=752&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/312382/original/file-20200129-92954-kfvglf.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=752&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Automated waste disposal bins are connected via underground pipes to a waste-processing centre.</span>
<span class="attribution"><a class="source" href="https://www.flickr.com/photos/welix/7045649479/in/photolist-bJAN8a">Weli'mi'nakwan/Flickr</a>, <a class="license" href="http://creativecommons.org/licenses/by/4.0/">CC BY</a></span>
</figcaption>
</figure>
<p>The city is connected by a <a href="https://www.bbc.com/news/technology-23757738">truck-free waste management system</a>. Automated waste disposal bins are located throughout the city. Pneumatic <a href="https://www.seequent.com/will-tomorrows-waste-feel-the-pressure/">pipes suck waste</a> directly from premises into an underground network of pipes and tunnels. </p>
<p>The system connects to a central waste-processing facility called the “<a href="https://www.theatlantic.com/international/archive/2014/09/songdo-south-korea-the-city-of-the-future/380849/">Third Zone Automated Waste Collection Plant</a>”. Waste is automatically sorted and recycled, buried, or burned for energy. Some of the key reported benefits are greater energy efficiency and reduced landfill and energy costs.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/while-governments-talk-about-smart-cities-its-citizens-who-create-them-59230">While governments talk about smart cities, it's citizens who create them</a>
</strong>
</em>
</p>
<hr>
<h2>World is ‘off track’ on SDGs</h2>
<p>In 2018, 4.2 billion people, or <a href="https://population.un.org/wup/Publications/Files/WUP2018-Highlights.pdf">55% of the world’s population</a>, lived in cities. By 2050, <a href="https://www.un.org/development/desa/en/news/population/2018-revision-of-world-urbanization-prospects.html">two-thirds of the world’s people</a> will be urban. Increasing urbanisation has serious environmental sustainability implications and creates significant burdens on infrastructure, including waste management.</p>
<p>Sustainability planning is critical – it includes investing in public transport systems, creating green public spaces and improving urban planning and waste management. The scale of the problem of urban waste makes smarter approaches to recycling and resource recovery essential. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/business-as-usual-the-sustainable-development-goals-apply-to-australian-cities-too-102641">Business as usual? The Sustainable Development Goals apply to Australian cities too</a>
</strong>
</em>
</p>
<hr>
<p>Managing waste is a major challenge for cities worldwide. At the United Nations <a href="https://sustainabledevelopment.un.org/sdgsummit">Sustainable Development Summit</a> last September, UN Secretary-General Antonio Guterres called for delivery of the Sustainable Development Goals (SDGs) to be accelerated. </p>
<p><div data-react-class="Tweet" data-react-props="{"tweetId":"1176644823945797632"}"></div></p>
<p>The summit formally adopted a new sustainable development agenda and <a href="https://sustainabledevelopment.un.org/sdgactions">145 SDG acceleration actions</a>. Forty-two of these actions are related to <a href="https://sustainabledevelopment.un.org/sdg11">SDG11</a> – Sustainable Cities and Communities.</p>
<h2>Australia’s waste crisis</h2>
<p>Australia, with a fast-growing population population of <a href="https://www.abs.gov.au/ausstats/abs@.nsf/0/1647509ef7e25faaca2568a900154b63?OpenDocument">about 25.5 million</a>, is struggling with a <a href="https://theconversation.com/chinas-recycling-ban-throws-australia-into-a-very-messy-waste-crisis-95522">waste crisis</a>. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/another-coag-meeting-another-limp-swing-at-the-waste-problem-126686">Another COAG meeting, another limp swing at the waste problem</a>
</strong>
</em>
</p>
<hr>
<p>Australia’s fastest-growing city is Melbourne in Victoria. The state has <a href="https://www.abc.net.au/news/2019-10-20/recycling-crisis-victoria-considers-increasing-kerbside-bins/11617258">doubled the amount of waste</a> it generates in the past 20 years. Problems have mounted in <a href="https://www.smh.com.au/environment/sustainability/nsw-waste-crisis-landfill-levy-gains-20190104-p50pp3.html">New South Wales</a> and <a href="https://www.abc.net.au/news/2018-04-19/queensland-council-recycling-dump-to-start-nationwide-reaction/9673370">Queensland</a> too. </p>
<p>In August 2019, SKM Recycling, which has operations in Victoria, Tasmania and South Australia, <a href="https://www.abc.net.au/news/2019-08-21/skm-recycling-enters-receivership/11433932">went into receivership</a>. The company received a <a href="https://www.theage.com.au/national/victoria/government-provides-10m-loan-to-kickstart-victorian-recycling-20190826-p52kyw.html">A$10 million government bailout</a> to pay for repairs and maintenance of waste-sorting machines. Nevertheless, councils were forced to <a href="https://www.abc.net.au/news/2019-08-06/councils-sending-thousands-of-tonnes-of-recycling-to-landfill/11385458">send their recycable materials</a> to landfill after the <a href="https://theconversation.com/the-recycling-crisis-may-be-here-to-stay-112055">Environment Protection Authority ordered</a> the company’s glass recycling service to stop operating. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/dont-just-blame-government-and-business-for-the-recycling-crisis-it-begins-with-us-121241">Don't just blame government and business for the recycling crisis – it begins with us</a>
</strong>
</em>
</p>
<hr>
<p>Infrastructure Victoria has proposed a <a href="https://www.theage.com.au/national/victoria/six-bins-proposed-as-way-out-of-recycling-crisis-20191021-p532kr.html">six-bin rubbish collection system</a> to reduce contamination of recyclable wastes. Single-use plastic bags <a href="https://www.environment.vic.gov.au/sustainability/plastic-bags">have been banned</a> since November 1 2019. The ban is part of state government measures to reduce plastic pollution and the amount of waste going to landfill and to strengthen Victoria’s recycling industry. Similarly, e-waste is banned from landfill. </p>
<p>The state government has <a href="https://www.premier.vic.gov.au/banning-the-bag-to-reduce-plastic-pollution/">invested A$135 million</a> in creating a stable and productive waste and resource recovery sector.</p>
<p>Melbourne continues to modernise its waste management. The city council installed <a href="https://www.ecubelabs.com/melbourne-combats-littering-with-ecubes-smart-bins/">CleanCUBE solar-powered waste compactors</a> in high-density parts of the city in 2018. </p>
<p>Besides reducing the footprint of public litter bins by 49%, the city has greatly reduced the average number of waste collections and therefore of waste trucks roaming the streets. This has eased traffic congestion and reduced carbon emissions. But will such measures be enough to cope with urban population growth? </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/how-recycling-is-actually-sorted-and-why-australia-is-quite-bad-at-it-121120">How recycling is actually sorted, and why Australia is quite bad at it</a>
</strong>
</em>
</p>
<hr>
<h2>What more can be done?</h2>
<p>Infrastructure Victoria is advising the state government on how to create a strong and sustainable recycling and resource recovery industry. Its <a href="https://www.infrastructurevictoria.com.au/project/advice-on-waste-infrastructure-in-victoria/">preliminary report</a> proposes several options, including: </p>
<ul>
<li>tackle food waste, which makes up <a href="https://www.abc.net.au/news/2019-10-20/recycling-crisis-victoria-considers-increasing-kerbside-bins/11617258">more than one-third</a> of household rubbish going to landfill </li>
<li>push manufacturers to use more recycled products</li>
<li>reform the <a href="https://www.audit.vic.gov.au/report/managing-municipal-and-industrial-landfill-levy?section=">landfill levy</a> to create an incentive to reduce disposal of waste to landfills and encourage greater re-use and recycling of resources, with funds raised by the levy able to be used to the support recycling and resource recovery sector</li>
<li>ban single-use plastics.</li>
</ul>
<p>The report also proposes a “waste-to-energy” policy – converting food waste to low-emissions electricity. </p>
<p>We suggest Melbourne (and other Australian cities) can further develop its waste-management strategy and policy to promote resource efficiency with IoT. Having IoT embedded in waste-management systems will improve resource efficiency, tracking and measurement. IoT also acts as an accountability mechanism (for waste management governance and reporting) for cities’ waste management. </p>
<p>Using IoT in this way will strengthen recycling industries and specifically enable Australia to be at the forefront of implementing the SDG 2030 agenda.</p><img src="https://counter.theconversation.com/content/127917/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Cities around the world are struggling to manage their mountains of waste. We can use the Internet of Things for smart waste systems that collect, sort, reuse and recycle most of what is thrown out.Dr David Teh, Sessional Lecturer and Tutor, College of Business, RMIT UniversityTehmina Khan, Lecturer in Accounting, RMIT UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1225592019-09-09T13:55:01Z2019-09-09T13:55:01ZHere’s why the internet will always have enough space for all our devices<figure><img src="https://images.theconversation.com/files/291528/original/file-20190909-109952-winjl.jpg?ixlib=rb-1.1.0&rect=0%2C0%2C7360%2C4912&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">
</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/wires-connected-network-server-249558610?src=RSTyNrEohyWGk3Muo65mxQ-1-22">Stock image/Shutterstock</a></span></figcaption></figure><p>It seems that every five years, news emerges that the digital sky is falling in. Back in <a href="https://www.theatlantic.com/technology/archive/2010/07/the-internet-is-running-out-of-addresses-but-dont-worry/60242/">2010</a> and <a href="https://www.nbcnews.com/news/us-news/internet-now-officially-too-big-ip-addresses-run-out-n386081">2015</a>, rumours spread that the internet would soon run out of IP addresses. Now, the regulator of Europe’s internet domains has <a href="https://www.ripe.net/publications/news/about-ripe-ncc-and-ripe/getting-ready-for-ipv4-run-out">predicted</a> that the region’s 1.91m remaining addressees will most likely run out before 2020. </p>
<p>Every computer and smartphone must have an IP address to access the internet. IP is short for Internet Protocol, and like your postcode, it has to be sufficiently unique, as this ensures all connected devices can accurately send and receive data between themselves. This is how the device you’re using is able to view this article. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=300&fit=crop&dpr=1 600w, https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=300&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=300&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=377&fit=crop&dpr=1 754w, https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=377&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/291523/original/file-20190909-109952-jdpzmg.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=377&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">An IP address is the unique identifying code for each device accessing the internet.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-vector/ip-icon-3-types-color-black-1024076437?src=mzy_Iwzry9IUccMV3nJFKA-1-2">ASAG Studio/Shutterstock</a></span>
</figcaption>
</figure>
<p>But when IP address were designed in the 1980s – (yes, that long ago) – they thought that making digital addresses <a href="https://whatis.techtarget.com/definition/bit-binary-digit">32 numbers long</a> would ensure enough variety for there to be a different address for every electronic device on Earth. A sequence of numbers 32 digits long gives two to the power of 32 combinations, allowing a different internet address for 4.2 billion devices.</p>
<p>Back then, this was more than enough as so few people even knew about the internet. But in 2019, some homes may have as many as 20 IP addresses – one for each electronic device. That includes games consoles, smartphones, smart light bulbs, smart speakers, laptops, smart televisions and so on. These IP addresses are being used up across Europe at a rate of 11 every minute. </p>
<h2>How the internet keeps expanding</h2>
<p>So why am I fairly relaxed about all this? The internet addresses that are running out are “version 4” addresses. Their use increased significantly when the internet was becoming popular for ordinary users from the mid-1990s onwards. But experts recognised over 15 years ago that a better addressing system was needed. The newest one we have is version 6. As you will recall, version 4 addresses are 32 digits long. Version 6 has 128. That gives two to the power of 128 combinations, or 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses. This equals 340 <a href="https://www.merriam-webster.com/dictionary/undecillion">undecillion</a> potential addresses – a magnificently large number. </p>
<p>Electronic devices are more and more often using the new version 6 addresses, but there are still plenty of devices, web servers and internet communication technologies such as your home router which use the old version 4. It will take a long time to replace, especially considering the number of devices already using the internet.</p>
<p>So will longer and longer IP addresses be needed to keep up as the internet expands into new devices? Not quite. New technology can redirect the internet traffic of 16m devices through a single IP address. Chances are, your home router and mobile phone provider are already doing this. </p>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/291525/original/file-20190909-109931-13kaois.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption">The future could allow all kinds of home devices access to the internet – including cat flaps.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/fat-scottish-cat-lying-bed-next-585926387?src=UI5_SlabHuPm50B3epm36w-1-3">Osobystist/Shutterstock</a></span>
</figcaption>
</figure>
<p>That’s the main reason why there’s no particular need to panic when internet authorities announce that addresses are running out. Thanks to technological ingenuity, one single address could now support another 16m, while each of the 16m could be split into another 16m, and so on.</p>
<p>This reminds us of how many devices are probably using the internet at any given <a href="https://www.statista.com/chart/17518/internet-use-one-minute/">moment</a>. Every IP address, every home router could, if it had sufficient processing power, support millions of devices – allowing everything from the cat flap to your fish tank to be connected to the internet.</p><img src="https://counter.theconversation.com/content/122559/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Andrew Smith does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>How can the internet accommodate more and more users every day?Andrew Smith, Senior Lecturer in Networking, The Open UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1197892019-07-24T11:11:34Z2019-07-24T11:11:34ZI visualised how algorithms ‘see’ urban environments and build detailed profiles of citizens<figure><img src="https://images.theconversation.com/files/285522/original/file-20190724-110183-1ipy0xz.png?ixlib=rb-1.1.0&rect=12%2C0%2C1351%2C766&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Machines see better than you think. </span> <span class="attribution"><a class="source" href="https://unsplash.com/photos/d1ngW7SNehM">The Creative Exchange/Unsplash. </a>, <a class="license" href="http://artlibre.org/licence/lal/en">FAL</a></span></figcaption></figure><p>Algorithms, software and smart technologies have a growing presence in cities around the world. Artificial intelligence (AI), agent-based modelling, the internet of things and machine learning can be found <a href="https://theconversation.com/why-ai-cant-solve-everything-97022">practically everywhere</a> now – from <a href="https://www.weforum.org/agenda/2019/06/the-eu-wants-to-create-10-million-smart-lampposts/">lampposts</a> to <a href="https://www.theguardian.com/sustainable-business/2016/jun/14/internet-of-bins-smart-solar-powered-trashcans-in-colombian-cities">garbage bins</a>, <a href="https://www.telegraph.co.uk/news/2018/05/22/smart-traffic-lights-always-turn-green-trialled-britains-roads/">traffic lights</a> and <a href="https://theconversation.com/driverless-cars-are-forcing-cities-to-become-smart-94707">cars</a>. Not only that, these technologies are also influencing how cities are planned, <a href="https://www.ucl.ac.uk/bartlett/casa/abm-agent-based-models-and-simulation">guiding big decisions</a> about new buildings, transport and infrastructure projects.</p>
<p>City-dwellers tend to accept the presence of these technologies passively – if they notice it at all. Yet this acceptance is punctuated by intermittent panic over privacy – take, for example, Transport for London’s <a href="https://techcrunch.com/2019/05/22/mind-the-privacy-gap/?guccounter=1&guce_referrer_us=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_cs=F_UTrpFvPDLvYhJ-yiDhIw">latest plans</a> to track passenger journeys across the transport network using wifi, which <a href="https://www.computing.co.uk/ctg/news/3076227/tfl-underground-wifi-tracking-privacy">drew criticism</a> from privacy experts. If there was more widespread understanding about how these technologies work, then citizens would be in a better position to judge what data they’re comfortable with sharing, and how to better safeguard their privacy as they navigate the city. </p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/your-personal-space-is-no-longer-physical-its-a-global-network-of-data-97140">Your personal space is no longer physical – it's a global network of data</a>
</strong>
</em>
</p>
<hr>
<p>That’s why, in <a href="https://www.routledge.com/Big-Data-Code-and-the-Discrete-City-Shaping-Public-Realms-1st-Edition/Carta/p/book/9781138543096">recent study</a>, I set out to unpack how some of the algorithms behind AI and machine learning operate, and the impact they have on familiar urban contexts such as streets, squares and cafes. But instead of trying to explain the mystifying mathematics behind how algorithms work, I started looking at how they actually “see” the world we live in. </p>
<h2>How algorithms ‘see’</h2>
<p>If we really want to see what machines see, we need to force ourselves to think like computers. This means discounting everything we usually perceive with our senses and rationalise through our brain, and instead go through a step-by-step process of data acquisition. This is exactly what we tried to demonstrate with <a href="https://vimeo.com/346684535">The Machine’s Eye</a>: a simulation that shows the steps through which a hypothetical AI system “reads” a physical environment and is able to profile the people in it. </p>
<figure>
<iframe src="https://player.vimeo.com/video/346684535" width="500" height="281" frameborder="0" webkitallowfullscreen="" mozallowfullscreen="" allowfullscreen=""></iframe>
</figure>
<p>It starts from a pitch-black situation – with no information – and gradually gathers data from a number of interconnected devices: smartphones, microphones, CCTV and other sensors. It starts by detecting and organising information directly from the physical environment: the dimension of the room, type of establishment, the number of people inside, their languages, accents, genders and types of conversation. It then interpolates these data with what can be found about each individual online, data mining from social media, online posts, databases and personal pages. </p>
<p>Our AI machine is finally able to bring all these data together into an accurate profile of a targeted individual, inferring the likelihood of personal relationships, family prospects, life expectancy, productivity or “social worth” – that is, their contribution to society in financial and social terms, within the context of this fiction. </p>
<p>In this simulation, all data are fictitious – the main purpose of the video is to raise awareness about what a truly connected internet of things, operated by an advanced AI system, could hypothetically do. </p>
<h2>Scratching the surface</h2>
<p>A growing number of companies are exploring how algorithms see the built environment. New York-based <a href="http://www.numina.co/solution/%20and%20project%20here:%20https://docsend.com/view/9csy2j8">Numina</a>, for instance, gathers data about urban flows of cars and pedestrians, showing their traces in real time. And Volvo teamed up with renown photographer <a href="https://www.media.volvocars.com/global/en-gb/media/pressreleases/210043/volvos-new-xc60-becomes-camera-in-the-hands-of-pulitzer-prize-winning-photographer">Barbara Davidson</a> to design an automated system, where cameras and on-board sensors depicted the presence of people in the busy streets of Copenhagen. </p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/kKQZw0IjDl0?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>Projects like these combine machine-driven representations of data with a human perspective – but they only scratch the surface of what algorithms really see in our world. In reality, the amount of data detected by sensors and the computational power of the algorithms processing it creates a much richer and more nuanced picture of the urban environment.</p>
<p><a href="https://www.citylab.com/solutions/2017/05/cambridges-fleet-of-smart-garbage-trucks-is-here-to-sniff-out-problems/526545/">City Scanner</a> is a smart city project developed by Cambridge (Massachusetts) in partnership with MIT’s Senseable City Lab. Garbage trucks are equipped with a set of sensors, which can detect a number of urban performance criteria, from the level of pollution of certain areas, to gas leaks and potholes. </p>
<p>The sensors send the data gathered during their usual route to a central server, where a series of algorithms combine, sort and analyse the large amount of data, returning an almost real-time picture of the quality of urban life. This constant monitoring of urban performance builds on previous observations to help continuously improve the city’s infrastructure, and policies that underpin it. </p>
<p>Likewise, engineers at the courier company UPS have created the <a href="https://www.wsj.com/articles/at-ups-the-algorithm-is-the-driver-1424136536">ORION</a> (On-Road Integrated Optimisation and Navigation) algorithm. This <a href="https://www.ups.com/us/en/services/knowledge-center/article.page?name=orion-the-algorithm-proving-that-left-isn-t-right&kid=aa3710c2">1,000-page work</a> not only suggests the quickest pathway between two points in the city, but it gets smarter over time. ORION continuously learns from its own outputs, measuring how fast the trucks travel from A to B, and comparing it with a statistical model, in order to improve its <a href="https://pubsonline.informs.org/doi/abs/10.1287/inte.2016.0875">accuracy and performance</a>. </p>
<p>Clearly, algorithms can be trained to “see” our cities in more detail, and navigate through them more efficiently, than any human. But after all, they are essentially mathematical and statistical models, cleverly applied to real-life problems. That’s why it’s so crucial to demystify these black-box technologies, in order to understand and make the best use of them, to improve the urban environment.</p><img src="https://counter.theconversation.com/content/119789/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Silvio Carta does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>Instead of trying to explain the mystifying mathematics behind how algorithms work, this researcher started looking at how they actually ‘see’ the world we live in.Silvio Carta, Head of Art and Design and Chair of the Design Research Group, University of HertfordshireLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1175652019-06-12T11:30:10Z2019-06-12T11:30:10ZCompanies’ self-regulation doesn’t have to be bad for the public<figure><img src="https://images.theconversation.com/files/278726/original/file-20190610-52758-189aq1l.jpg?ixlib=rb-1.1.0&rect=0%2C162%2C5184%2C3282&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">Managing a shared resource doesn't have to involve fences.</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/sheep-new-zealand-421561492">Caroline Ryan</a></span></figcaption></figure><p>If Boeing is allowed to <a href="https://www.washingtonpost.com/investigations/how-the-faa-allows-jetmakers-to-self-certify-that-planes-meet-us-safety-requirements/2019/03/15/96d24d4a-46e6-11e9-90f0-0ccfeec87a61_story.html">certify that a crash-prone aircraft is safe</a>, and Facebook can <a href="https://www.nytimes.com/2019/03/07/opinion/zuckerberg-privacy-facebook.html">violate users’ privacy expectations</a>, should companies and industries ever be <a href="https://thehill.com/blogs/congress-blog/the-administration/436328-corporate-self-regulation-is-failing">allowed to police themselves</a>? The debate is <a href="https://www.reuters.com/article/us-tech-antitrust-legal-explainer/explainer-should-big-tech-fear-u-s-antitrust-enforcers-idUSKCN1T62K3">heating up</a> particularly in the U.S. tech sector with growing calls to regulate – or even break up – the likes of <a href="https://www.marketwatch.com/story/amazon-retail-chief-says-scrutiny-is-warranted-but-companys-breakup-is-not-2019-06-05">Google, Apple and Amazon</a>. </p>
<p>It turns out to be possible, at least sometimes, for companies and industries to govern themselves, while still protecting the public interest. Groundbreaking work by <a href="http://www.aei.org/publication/elinor-ostrom-and-the-solution-to-the-tragedy-of-the-commons/">Nobel Prize-winning political economist Elinor Ostrom</a> and her husband Vincent found a solution to a classic economic quandary, in which people – and businesses – self-interestedly enrich themselves as quickly as possible with <a href="https://doi.org/10.1111/ablj.12116">certain resources</a> including <a href="http://bierdoctor.com/papers/Rader_derived_data_abstract_May_2017.pdf">personal data</a>, thinking little about the secondary costs they might be inflicting on others.</p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=892&fit=crop&dpr=1 600w, https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=892&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=892&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=1121&fit=crop&dpr=1 754w, https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=1121&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/278729/original/file-20190610-52771-1j02bnf.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=1121&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Elinor Ostrom in 2009, when she won the Nobel Prize in Economics.</span>
<span class="attribution"><a class="source" href="https://commons.wikimedia.org/wiki/File:Nobel_Prize_2009-Press_Conference_KVA-30.jpg">Holger Motzkau/Wikimedia Commons</a>, <a class="license" href="http://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA</a></span>
</figcaption>
</figure>
<p>As the director of the <a href="https://ostromworkshop.indiana.edu/research/internet-cybersecurity/index.html">Ostrom Workshop Program on Cybersecurity and Internet Governance</a>, I have been involved in numerous projects studying how to solve these sorts of problems when they arise, both online and offline. Most recently, my <a href="https://illinoislawreview.org/print/vol-2017-no-2/when-toasters-attack/">work</a> has looked at how to manage the massively interconnected world of sensors, computers and smart devices – what I <a href="https://www.cisco.com/c/dam/en_us/solutions/industries/docs/gov/everything-for-cities.pdf">and others</a> call the “<a href="https://dx.doi.org/10.2139/ssrn.3266188">internet of everything</a>.” </p>
<p>I’ve found that there are ways <a href="https://doi.org/10.1162/002081898550789">companies can become leaders</a> by <a href="https://ssrn.com/abstract=2573787">experimenting with business opportunities</a> and collaborating with peers, while still working with regulators to protect the public, including both in the air and in cyberspace.</p>
<h2>Tragedy revisited</h2>
<p>In a classic economic problem, called “<a href="https://en.wikipedia.org/wiki/Tragedy_of_the_commons">the tragedy of the commons</a>,” a parcel of grassland is made available for a community to graze its livestock. Everyone tries to get the most benefit from it – and as a result, the land is overgrazed. What started as a resource for everyone becomes of little use to anyone. </p>
<p>For many years, economists thought there were only two possible solutions. One was for the government to step in and limit how many people could graze their animals. The other was to split the land up among private owners who had exclusive use of it, and could sustainably manage it for their individual benefit.</p>
<p>The Ostroms, however, found a third way. In some cases, they revealed, <a href="http://www.aei.org/publication/elinor-ostrom-and-the-solution-to-the-tragedy-of-the-commons/">self-organization can work well</a>, especially when the various people and groups involve can <a href="https://www.iucn.org/downloads/policy_matters_19_preface__introductions_and_chapters_1_5.pdf">communicate</a> effectively. They called it “polycentric governance,” because it allows regulation to come from more than just one central authority. Their work can help determine if and when companies can effectively regulate themselves – or whether it’s best for the government to step in.</p>
<h2>A polycentric primer</h2>
<p>The concept can seem complicated, but in practice it is increasingly popular, in federal programs and even as a goal for <a href="https://www.washingtonpost.com/news/the-switch/wp/2014/10/07/internet-operations-chief-snowden-disclosures-make-my-job-easier/">governing the internet</a>. </p>
<p>Scholars such as Elinor Ostrom produced a broad swath of research over decades, looking at <a href="https://books.google.hr/books/about/Polycentricity_and_Local_Public_Economie.html?id=iBZ32c7KLWUC&redir_esc=y">public schools and police department performance</a> in Midwestern U.S. cities, coastal overfishing, forest management in nations like Nepal, and even <a href="https://ir.lawnet.fordham.edu/ulj/vol37/iss3/7">traffic jams</a> in New York City. They identified <a href="https://dx.doi.org/10.2139/ssrn.1304697">commonalities among all these studies</a>, <a href="https://www.nobelprize.org/uploads/2018/06/ostrom_lecture.pdf">including</a> whether the group’s members can help set the rules by which their shared resources are governed, how much control they have over who gets to share it, how disputes are resolved, and how everyone’s use is monitored.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/T6OgRki5SgM?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
<figcaption><span class="caption">Nobel Prize winner Elinor Ostrom explains her work in a 2010 lecture.</span></figcaption>
</figure>
<p>All of these factors can help predict whether individuals or groups will successfully self-regulate, whether the challenge they’re facing is <a href="https://ssrn.com/abstract=1494833">climate change</a>, <a href="https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1888&context=aulr">cybersecurity</a>, or anything else. <a href="http://escotet.org/2010/11/interview-with-nobel-laureate-elinor-ostrom/">Trust is key</a>, as Lin Ostrom said, and an excellent way to build trust is to let <a href="http://dx.doi.org/10.1038/nclimate2490">smaller groups make their own decisions</a>.</p>
<p>Polycentric governance’s embrace of self-regulation involves relying on <a href="https://www.ubs.com/microsites/nobel-perspectives/en/laureates/elinor-ostrom.html">human ingenuity</a> and collaboration skills to solve difficult problems – while focusing on practical measures to address specific challenges.</p>
<p>Self-regulation does have its limits, though – as has been clear in the revelations about how <a href="https://www.businessinsider.com/faa-let-boeing-self-regulate-software-believed-737-max-crashes-2019-3">the Federal Aviation Administration allowed Boeing</a> to <a href="https://www.businessinsider.com/faa-let-boeing-self-regulate-software-believed-737-max-crashes-2019-3">certify the safety</a> <a href="https://arstechnica.com/information-technology/2019/03/boeing-downplayed-737-max-software-risks-self-certified-much-of-planes-safety/">of its own software</a>. Facebook has also been heavily criticized for failing to block an <a href="https://www.cbsnews.com/news/facebooks-biggest-fails-before-cambridge-analytica/">anonymous horde</a> of <a href="https://www.wired.com/story/facebook-passwords-plaintext-change-yours/">users across the globe</a> from <a href="https://theconversation.com/facebooks-social-responsibility-should-include-privacy-protection-94549">manipulating people</a>’s <a href="https://www.nytimes.com/2019/04/25/technology/facebook-regulation-ftc-fine.html">political views</a>.</p>
<p>Polycentric regulation is a departure from the idea of “<a href="https://www.dallasnews.com/opinion/commentary/2012/06/14/jeffrey-weiss-elinor-ostroms-enduring-trust-in-the-commons">keep it simple, stupid</a>” – rather, it is a call for engagement by numerous groups to grapple with the complexities of the real world. </p>
<p>Both Facebook and Boeing now need to convince themselves, their employees, investors, policymakers, users and customers that they can be trusted. Ostrom’s ideas suggest they could begin to do this by engaging with peers and industry groups to set rules and ensure they are enforced.</p>
<h2>Governing the ‘internet of everything’</h2>
<p>Another industry in <a href="https://www.forbes.com/sites/annashedletsky/2018/08/06/why-industrial-iot-is-usually-a-failure-and-how-to-fix-it/#2fe576d042ed">serious need of better regulations</a> is the smart-device business, with tens of billions of connected devices around the world, and little to no <a href="https://www.csmonitor.com/World/Passcode/Passcode-Voices/2016/1026/Opinion-How-to-fix-an-internet-of-broken-things">concern</a> for user security or privacy.</p>
<p>Customers often buy the cheapest smart-home camera or digital sensor, <a href="https://www.schneier.com/books/click_here/">without looking at competitors’</a> security and privacy protections. The results are predictable – hackers have hijacked thousands of internet-connected devices and used them to attack the <a href="https://www.forbes.com/sites/davelewis/2017/10/23/the-ddos-attack-against-dyn-one-year-later/#4765cbe51ae9">physical network of the internet</a>, take control of <a href="https://www.bbc.com/news/technology-30575104">industrial</a> equipment, and spy on private citizens through their smartphones and <a href="https://www.marketwatch.com/story/woman-claims-hacker-used-baby-monitor-to-spy-on-her-in-her-bedroom-2018-06-07">baby monitors</a>.</p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=400&fit=crop&dpr=1 600w, https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=400&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=400&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=503&fit=crop&dpr=1 754w, https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=503&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/278730/original/file-20190610-52789-1oe6wxi.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=503&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">Who else might be watching this view, over the internet?</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/closeup-baby-monitor-security-538634722">Saklakova/Shutterstock.com</a></span>
</figcaption>
</figure>
<p>Some governments are starting to get involved. The state of California and the European Union are exploring laws that promote “<a href="https://www.natlawreview.com/article/california-law-iot-devised-to-have-reasonable-security-feature">reasonable</a>” security requirements, at least as a baseline. The EU is encouraging companies to band together to establish <a href="https://iapp.org/news/a/will-the-gdpr-incite-sectoral-codes-of-conduct/">industry-wide codes of conduct</a>. </p>
<h2>Getting governance right</h2>
<p>Effective self-governance may seem impossible in the “Internet of everything” because of the scale and variety of groups and industries involved, but polycentric governance does provide a useful lens through which to view these problems. Ostrom has asserted this approach may be <a href="https://dx.doi.org/10.2139/ssrn.1304697">the most flexible and adaptable way</a> to manage rapidly changing industries. It may also help avoid conflicting government regulations that risk stifling innovation in the name of protecting consumers without helping either cause. </p>
<p>But success is not certain. It requires active engagement by all parties, who must share a sense of responsibility to the customers and mutual trust in one another. That’s not easy to build in any community, let alone the <a href="https://www.digitalistmag.com/digital-economy/2018/07/20/digital-transformation-modern-form-of-creative-destruction-06179806">dynamic tech industry</a>.</p>
<p>Government involvement can help build bridges and solidify trust across the private sector, as happened with cybersecurity efforts from the <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2446631">National Institute for Standards and Technology</a>. Some states, like <a href="https://www.techrepublic.com/article/ohio-law-creates-cybersecurity-safe-harbor-for-businesses/">Ohio</a>, are even rewarding firms for using appropriate self-regulation in their cybersecurity decision-making.</p>
<p>Polycentric governance can be flexible, adapting to new technologies more appropriately – and often more quickly – than pure governmental regulation. It also can be more efficient and cost-effective, though it’s not a cure for all regulatory ills. And it’s important to note that regulation can spur innovation as well as protect consumers, especially <a href="https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/the-simple-rules-of-disciplined-innovation">when the rules are simple</a> and outcome focused.</p>
<p>Consider the North American Electric Reliability Council. That organization was originally created as a group of companies that came together voluntarily in an effort to protect against blackouts. NERC standards, however, were eventually made legally enforceable in the aftermath of the <a href="http://www.eenews.net/stories/1059985876/print">Northeast blackout of 2003</a>. They are an example of an organic code of conduct that was voluntarily adopted and subsequently reinforced by government, consistent with professor Ostrom’s ideas. Ideally, it should not require such a crisis to spur this process forward. </p>
<p>Ultimately, what’s needed – and what professor Ostrom and her colleagues and successors have called for – is more experimentation and less theorizing. As the 10-year anniversary of Ostrom’s Nobel Prize approaches, I believe it is time to put her insights to work, offering industries the opportunity to self-regulate where appropriate while leaving the door open for the possibility of government action, including antitrust enforcement, to protect the public and promote <a href="https://ndias.nd.edu/news-publications/ndias-quarterly/the-meaning-of-cyber-peace/">cyber peace</a>.</p>
<p>[ <em><a href="https://theconversation.com/us/newsletters?utm_source=TCUS&utm_medium=inline-link&utm_campaign=newsletter-text&utm_content=thanksforreading">Thanks for reading! We can send you The Conversation’s stories every day in an informative email. Sign up today.</a></em> ]</p><img src="https://counter.theconversation.com/content/117565/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Scott Shackelford does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.</span></em></p>A Nobel Prize-winning political economist found a way to promote good governance and protect users without the need for heavy-handed government regulation.Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1135852019-05-14T16:12:48Z2019-05-14T16:12:48ZCars will change more in the next decade than they have in the past century<figure><img src="https://images.theconversation.com/files/274334/original/file-20190514-60570-gfti2h.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">shutterstock</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/frankfurtseptember-20-mercedesbenz-f015-luxury-motion-719917177?src=OmsG68JHzirH26Sf6RESWw-1-3">eans/Shutterstock</a></span></figcaption></figure><p>While the look and feel of our cars has changed in the past <a href="https://www.britannica.com/technology/automobile/History-of-the-automobile">100 years</a>, the way we drive them hasn’t. But fundamental change is coming. In the next decade, not only will the way they’re powered and wired have shifted dramatically, but we won’t be the ones driving them anymore.</p>
<p>Some cars already have basic automation features, but the automotive experiments currently being undertaken by the likes of Uber and Google make up a minuscule proportion of the vehicles on our roads. By 2030, the standard car will evolve from merely <a href="https://theconversation.com/five-things-to-consider-before-speed-limiters-are-added-to-cars-114457">assisting the driver</a> to taking full control of <a href="https://www.ertrac.org/uploads/documentsearch/id57/ERTRAC-CAD-Roadmap-2019.pdf">all aspects of driving</a> in most driving conditions. </p>
<p>This widespread automation, together with the electrification and increased connectivity of both the car and society, are set to shake up the car industry in a big way, affecting everything from the way cars look and feel, to how we spend our time inside them, and how they get us from A to B.</p>
<h2>A very different driving experience</h2>
<p>The first major difference we might notice between today’s cars and those of 2030 are their names. Just as Apple and Samsung have taken over a mobile phone market that Nokia and Blackberry once dominated, Tesla, Apple, Dyson, and <a href="https://www.cnbc.com/2019/03/29/alphabet-has-more-than-doubled-its-money-on-lyft.html">Google</a> could become the most recognised automotive brands of the future.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/Mlh-_hoNLaI?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>They’ll likely look a lot different too. From <a href="https://www.autocar.co.uk/car-news/new-cars/nissan-ims-concept-previews-electric-elevated-sports-saloon">the outside</a>, the large air intakes and front grills that cool our combustion engines will no longer be needed, while wing mirrors will be replaced with cameras and sensors. Windows could be larger to allow liberated passengers to enjoy the view, or near non-existent to provide privacy. The <a href="https://www.designboom.com/technology/mercedes-benz-vision-urbanetic-autonomous-09-10-2018/">Mercedes-Benz Vision URBANETIC</a> demonstrates these radical new looks with a modular vehicle that can switch bodies to either move cargo or people.</p>
<p>Cars’ interiors will be much more flexible, some allowing customisation of colour, light, privacy, and layout at the touch of a button. <a href="https://www.youtube.com/watch?v=Mlh-_hoNLaI">Volvo’s recent 360c concept car</a> envisages a multi-functional space that can transform into a lounge, an office and even a bedroom. </p>
<p>Sun visors will become a thing of the past, with smart glass allowing us to control the amount of entering daylight at the touch of a button. The <a href="https://www.autocar.co.uk/car-news/concept-cars/mercedes-benz-f015-autonomous-concept-first-ride">Mercedes F015</a> concept car’s doors even have extra screens that can function as windows or entertainment systems. </p>
<p>Many cars will be fitted with <a href="https://news.harman.com/blog/harman-and-daimler-bring-the-first-ar-capable-infotainment-system-to-market-with-the-mercedes-benz-a-class">augmented-reality systems</a>, which will superimpose computer-generated visualisations onto the windscreen or other suitable display areas, to ease the passenger’s nerves from relinquishing the wheel by showing what the car is about to do.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/RV4fbdcsMT4?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>Drivers will be able to communicate with their cars through speech or gesture commands. In high-end models, we may even see some early versions of <a href="https://www.teslarati.com/spacex-tesla-ceo-elon-musk-major-neuralink-update-soon/">brain-computer interfaces</a>, which would associate patterns of brain activity with commands to control the car or entertain occupants. <a href="https://www.bbc.co.uk/news/business-42894312">Similar technology</a> has already been used to control prosthetic limbs and wheelchairs.</p>
<h2>Connective technology</h2>
<p>The <a href="https://interestingengineering.com/iot-revolution-5-ways-the-internet-of-things-will-change-transportation">ever-growing</a> internet of things will become central to how our integrated cars move us around and communicate with the outside world. Sensors designed to <a href="https://www.bakermckenzie.com/en/insight/publications/2019/01/department-of-transportation-v2x-communications">recognise and communicate</a> with upgraded road signs, markings, networks of cameras, pedestrians, and other vehicles will allow cars to synchronise their movement, minimising fuel consumption and <a href="https://www.its.dot.gov/infographs/predicting_future.htm">improving traffic flow</a>. Cars will also be able to help authorities maintain road infrastructure, for example with tyre sensors that notify them of deteriorating road conditions.</p>
<p>When humans choose to take the wheel, technology will warn drivers about impending collisions with other road users, and attempt to avoid them. Improvements in <a href="https://www.thermal.com/automotive.html#">thermal sensor</a> technology are likely to enable cars to see far beyond the illumination range of car headlights. If sufficiently standardised and legislated for, these technologies should substantially reduce the number of road accidents – albeit probably after an <a href="https://theconversation.com/are-autonomous-cars-really-safer-than-human-drivers-90202">initial spike</a>.</p>
<p>While rural drivers will probably still own their cars, cities may move away from car ownership to the use of on-demand vehicles that take the Uber model to the next level. In Moscow, 9m of these journeys are already made <a href="https://www.themoscowtimes.com/2018/12/10/moscow-residents-turn-to-car-sharing-after-parking-crackdown-a63769">daily</a>, more than 30 times higher than at the start of 2018.</p>
<h2>Fuels of the future</h2>
<p>Multiple countries and cities have announced upcoming bans on the sale of new petrol and diesel cars, <a href="https://en.wikipedia.org/wiki/Phase-out_of_fossil_fuel_vehicles">many by 2030</a>. <a href="https://www.theweek.co.uk/93443/petrol-and-diesel-ban-uk-which-cars-will-be-affected">Older vehicles</a> will still be on the road, so petrol stations are unlikely to disappear by this date. However, car makers are already focusing more and more on vehicles that will support the fuels of the future.</p>
<figure>
<iframe width="440" height="260" src="https://www.youtube.com/embed/nlZe-2f6sSY?wmode=transparent&start=0" frameborder="0" allowfullscreen=""></iframe>
</figure>
<p>Precisely what that future will look like is unclear. <a href="https://www.independent.co.uk/voices/hybrid-cars-ban-carbon-emissions-uk-environment-a8338611.html">Uncertainty</a> over whether currently popular <a href="https://www.telegraph.co.uk/cars/advice/difference-hybrid-plug-in-hybrid-electric-ev-car/">hybrid cars</a> will be included in vehicle bans may discourage businesses and consumers from investing too much in this path. <a href="https://www.autocar.co.uk/car-news/new-cars/future-motoring-what-will-cars-be-25-years">Fully electric</a> vehicles only make up <a href="http://ev-sales.blogspot.com/2019/01/global-top-20-december-2018.html">2%</a> of the global market right now, but as their price drops below that of petrol cars by the <a href="https://www.theccc.org.uk/publication/net-zero-the-uks-contribution-to-stopping-global-warming/">mid 2020s</a>, their market share will surely balloon.</p>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/why-battery-powered-vehicles-stack-up-better-than-hydrogen-106844">Why battery-powered vehicles stack up better than hydrogen</a>
</strong>
</em>
</p>
<hr>
<hr>
<p>
<em>
<strong>
Read more:
<a href="https://theconversation.com/we-accidentally-created-a-new-wonder-material-that-could-revolutionise-batteries-and-electronics-115347">We accidentally created a new wonder material that could revolutionise batteries and electronics</a>
</strong>
</em>
</p>
<hr>
<p>By how much depends on to what degree their as yet limited <a href="https://www.vox.com/2019/3/1/18241489/electric-batteries-aircraft-climate-change">range</a> and <a href="https://theconversation.com/we-accidentally-created-a-new-wonder-material-that-could-revolutionise-batteries-and-electronics-115347">charging time</a> can be improved, and how much governments invest in currently patchy <a href="https://www.zap-map.com/live/">electric charging networks</a>. We expect fully electric vehicles to at least be a viable choice for a wide range of drivers by 2030 – but unforeseen groundbreaking technological developments could easily change the future of vehicle fuel. For example, scientists are working hard to solve the <a href="https://www.autoexpress.co.uk/car-news/electric-cars/93180/hydrogen-fuel-cell-do-hydrogen-cars-have-a-future">production and storage</a> difficulties that currently <a href="https://www.telegraph.co.uk/cars/advice/does-fuel-cell-work-should-buy-hydrogen-car/">limit</a> the potential of clean, fast-fuelling and long-range <a href="https://www.telegraph.co.uk/cars/advice/does-fuel-cell-work-should-buy-hydrogen-car/">hydrogen-powered vehicles</a>.</p>
<p>The year 2030 might not seem too far away, but a decade is a long time for technology to change. In 2008, the first iPhone had only just been <a href="https://www.t3.com/features/a-brief-history-of-the-iphone">released</a>, and climate change was a background issue for governments and media. Now, <a href="https://singularityhub.com/2016/03/22/technology-feels-like-its-accelerating-because-it-actually-is/">technology</a> and <a href="https://www.bbc.co.uk/news/science-environment-48097150">environmental discourse</a> are changing at an unprecedented rate. So don’t be surprised if you look back at the cars of today in a decade’s time and wonder how we ever got by.</p>
<hr>
<figure class="align-center ">
<img alt="" src="https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=140&fit=crop&dpr=1 600w, https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=140&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=140&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=176&fit=crop&dpr=1 754w, https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=176&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/263883/original/file-20190314-28475-1mzxjur.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=176&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px">
<figcaption>
<span class="caption"></span>
</figcaption>
</figure>
<p><em><a href="https://theconversation.com/imagine-newsletter-researchers-think-of-a-world-with-climate-action-113443?utm_source=TCUK&utm_medium=linkback&utm_campaign=TCUKengagement&utm_content=Imagineheader1116704">Click here to subscribe to our climate action newsletter. Climate change is inevitable. Our response to it isn’t.</a></em></p><img src="https://counter.theconversation.com/content/113585/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Claude Chibelushi receives funding from BMW AG. </span></em></p><p class="fine-print"><em><span>Dan Lewis and Debi Roberts do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.</span></em></p>The year 2030 may not seem far away, but a decade is a long time in technological terms. Widespread automation, electrification, and connectivity are set to revolutionise the car of the future.Dan Lewis, Course Leader, Industrial Design; Product & Transport, Staffordshire UniversityClaude C. Chibelushi, Professor of Cognitive Digital Media Computing, Staffordshire UniversityDebi Roberts, Senior lecturer, Staffordshire UniversityLicensed as Creative Commons – attribution, no derivatives.tag:theconversation.com,2011:article/1093912019-01-11T11:47:09Z2019-01-11T11:47:09ZThe quiet threat inside ‘internet of things’ devices<figure><img src="https://images.theconversation.com/files/252900/original/file-20190108-32133-zju0xd.jpg?ixlib=rb-1.1.0&rect=494%2C134%2C4670%2C3233&q=45&auto=format&w=496&fit=clip" /><figcaption><span class="caption">They're small and well-connected, but how safe are 'internet of things' devices?</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-illustration/network-blue-platforms-dark-bots-on-1036755457">BeeBright/Shutterstock.com</a></span></figcaption></figure><p>As Americans increasingly <a href="https://www.nielsen.com/us/en/insights/news/2018/smart-speaking-my-language-despite-their-vast-capabilities-smart-speakers-all-about-the-music.html">buy and install smart devices</a> in their homes, all those cheap interconnected devices create new security problems for individuals and society as a whole. The problem is compounded by businesses radically expanding the <a href="https://en.wikipedia.org/wiki/SCADA">number of sensors and remote monitors</a> it uses to manage overhead lights in corporate offices and detailed manufacturing processes in factories. Governments, too, are getting into the act – cities, especially, want to use new technologies to improve energy efficiency, reduce traffic congestion and improve water quality.</p>
<p>The number of these “internet of things” devices is <a href="https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/">climbing into the tens of billions</a>. They’re creating an interconnected world with the potential to make people’s lives more enjoyable, productive, secure and efficient. But those very same devices, many of which have no real security protections, are also becoming part of what are called “botnets,” vast networks of tiny computers vulnerable to hijacking by hackers.</p>
<p><iframe id="TkGK8" class="tc-infographic-datawrapper" src="https://datawrapper.dwcdn.net/TkGK8/1/" height="400px" width="100%" style="border: none" frameborder="0"></iframe></p>
<p>Botnets have caused problems on the internet, from sending vast amounts of spam mail to disrupting websites around the world. While traditionally most botnets are comprised of laptop and desktop computers, the growth of unsecured devices such as industrial sensors, webcams, televisions and other smart home devices is leading to a growing disruptive capability.</p>
<h2>Tiny computers everywhere</h2>
<p>The “internet of things” includes countless types of devices – <a href="https://theconversation.com/security-risks-in-the-age-of-smart-homes-58756">webcams, pressure sensors</a>, thermometers, <a href="https://theconversation.com/do-i-want-an-always-on-digital-assistant-listening-in-all-the-time-92571">microphones, speakers</a>, <a href="https://theconversation.com/4-ways-internet-of-things-toys-endanger-children-94092">stuffed animals</a> and many more – made by a vast array of companies. Many of these manufacturers are <a href="https://theconversation.com/using-blockchain-to-secure-the-internet-of-things-90002">small and unknown</a>, and don’t have popular brands or public reputations to protect. Their goals are to produce lots of devices to sell as cheaply as possible. Customers’ cybersecurity <a href="https://theconversation.com/using-blockchain-to-secure-the-internet-of-things-90002">isn’t a real concern</a> for them.</p>
<figure class="align-right zoomable">
<a href="https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=237&fit=clip" srcset="https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=397&fit=crop&dpr=1 600w, https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=397&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=397&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=499&fit=crop&dpr=1 754w, https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=499&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/252904/original/file-20190108-32148-3qo844.jpg?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=499&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">A tiny computer on a desk.</span>
<span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/macro-photography-wired-web-camera-stationary-637977274">Mehaniq/Shutterstock.com</a></span>
</figcaption>
</figure>
<p>These devices’ variety means they’re useful for lots of things, but also means they have a <a href="https://resources.infosecinstitute.com/the-top-ten-iot-vulnerabilities/">wide range of vulnerabilities</a>. They include weak passwords, unencrypted communications and insecure web interfaces. With thousands, or hundreds of thousands, of identically insecure devices scattered all over the world, they’re a wealth of targets ripe for the hacking.</p>
<p>If, for instance, a manufacturer has set an <a href="https://arstechnica.com/information-technology/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">unchangeable administrative password</a> on a particular type of device – it <a href="https://www.csoonline.com/article/3038302/application-development/hard-coded-passwords-remain-a-key-security-flaw.html">happens more often</a> than you might think – a <a href="https://blog.avast.com/hacker-creates-seven-new-variants-of-the-mirai-botnet">hacker can run a program</a> searching the internet for those devices, and then logging in, taking control and installing their own malicious software, <a href="https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/">recruiting the device into a botnet army</a>. The devices run normally until the hackers issue instructions, after which they can do more or less anything a computer might do – such as sending meaningless internet traffic to clog up data connections. </p>
<h2>Blocking internet access</h2>
<p>That type of attack when emanating from thousands of devices at once, called a “distributed denial of service,” can shut down companies’ servers or even block wide swaths of the internet from being publicly accessible. A major DDoS attack in 2016 <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/">interrupted connections to Amazon, Netflix and Paypal</a> from customers on the east coast of the U.S. </p>
<figure class="align-center zoomable">
<a href="https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=45&auto=format&w=1000&fit=clip"><img alt="" src="https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&fit=clip" srcset="https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=45&auto=format&w=600&h=352&fit=crop&dpr=1 600w, https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=30&auto=format&w=600&h=352&fit=crop&dpr=2 1200w, https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=15&auto=format&w=600&h=352&fit=crop&dpr=3 1800w, https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=45&auto=format&w=754&h=443&fit=crop&dpr=1 754w, https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=30&auto=format&w=754&h=443&fit=crop&dpr=2 1508w, https://images.theconversation.com/files/252901/original/file-20190108-32148-jrvq1r.png?ixlib=rb-1.1.0&q=15&auto=format&w=754&h=443&fit=crop&dpr=3 2262w" sizes="(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px"></a>
<figcaption>
<span class="caption">A botnet took down connections through a major internet company in October 2016.</span>
<span class="attribution"><a class="source" href="https://commons.wikimedia.org/wiki/File:Level3_Outage_Map_(US)_-_21_October_2016.png">DownDetector/Wikimedia Commons</a>, <a class="license" href="http://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA</a></span>
</figcaption>
</figure>
<p>That attack was linked to a botnet-control software program <a href="https://www.justice.gov/opa/pr/justice-department-announces-charges-and-guilty-pleas-three-computer-crime-cases-involving">created by three teenagers</a> seeking to use more than 100,000 hijacked webcams and other internet-connected devices from around the world to <a href="https://www.wired.com/story/mirai-botnet-minecraft-scam-brought-down-the-internet/">gain an advantage</a> over other players of the “Minecraft” online video game.</p>
<p>The size and scale of these attacks – and the broad range of devices that can contribute to them – make this both a private problem and a public one. People want to secure the devices in their homes and pockets, of course. Yet the same networks that stream television shows and music also link burglar alarms to police, manage traffic lights in congested areas and let <a href="https://theconversation.com/saving-lives-by-letting-cars-talk-to-each-other-59221">self-driving cars talk to each other</a>.</p>
<p>All that activity can be drowned out if hackers flood the internet, or sections of it, with meaningless messages. Traffic would stall across towns, even counties, and police officers would have a hard time communicating with each other to try to straighten everything out. Even small devices, in their hundreds of thousands, all around the world, can work together to have huge repercussions both online and in the physical world.</p><img src="https://counter.theconversation.com/content/109391/count.gif" alt="The Conversation" width="1" height="1" />
<p class="fine-print"><em><span>Charles T. Harry is affiliated with the US Chamber of Commerce. </span></em></p>As the number of ‘internet of things’ devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.Charles T. Harry, Associate Research Professor of Public Policy; Director of Operations, Maryland Global Initiative in Cybersecurity; Senior Research Associate, Center for International and Security Studies, University of MarylandLicensed as Creative Commons – attribution, no derivatives.