The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective
Section snippets
The Internet of Things
The Internet of Things (IoT) represents one of the most significant disruptive technologies of this century, consisting of an emerging global Internet-based technical architecture (Gubbi et al, 2013, Weber, 2010). Described by Atzori et al. (2010) as a novel technology that is rapidly gaining ground, the major enabling element of the IoT is the integration of several collaborative and communication technologies allowing for comprehensive data collection. Examples include tracking and
Research approach
This research followed two phases. In Phase 1 a systematic literature review was conducted following two activities: (1) a literature search process to identify and select relevant articles, and (2) a content analysis of the literature to identify themes that represent key concerns related to individual privacy from the perspective of the IoT. In Phase 2, a critical analysis followed that compared themes that emerged from Phase 1 with the APPs. The two phases are outlined below.
Findings
Findings are reported in two sections that follow: (1) the four key themes that emerged from the literature review and content analysis activities, and (2) a critical comparison of the resulting privacy themes with the 13 APPs.
Discussion
In reflection of the research question: To what extent does the Australian Privacy Principles protect an Australian individual's privacy in relation to data collected via the Internet of Things?, findings of this study found that the current APPs has limitations in terms of individual privacy and data collection through the IoT. These limitations impact on the ways in which individual data are collected, used and handled. In the sections that follow, APP limitations are first outlined, followed
Conclusion
This paper analyses the impact of data collected through the IoT by highlighting its impact on the Australian Privacy Principle legal framework. Even though the technology itself is more than five years away from its plateau of productivity (Gartner, 2014a), there are concerns that the IoT is bound to disrupt the idea of information control that forms an integral part of information privacy. The thirteen APPs were used to illustrate gaps in the current APP framework and highlights four key
References (0)
Cited by (100)
Using data mining techniques to explore security issues in smart living environments in Twitter
2021, Computer CommunicationsCitation Excerpt :In this respect, Lin and Bergmann [25] and Chow [26] highlighted the concerns about user privacy and security of users, which is an important topic to thoroughly explore in the future [27]. It is important to note that, to date, several contributions analyzed how IoT sensors are added to the home networks when connecting new devices to the Internet [28]; similarly, other studies investigated the ways to make these devices safer from the technical point of view [29]. Overall, connected devices are linked to platforms that manage the data [30], which implies that security of these cloud-based devices should be a priority [31].
The effect of technological context on smart home adoption in Jordan
2024, Indonesian Journal of Electrical Engineering and Computer ScienceThe applications of Internet of Things (IoT) in industrial management: a science mapping review
2024, International Journal of Production ResearchIntroduction to IoT
2023, arXivSmart cities as a testbed for experimenting with humans? - Applying psychological ethical guidelines to smart city interventions
2023, Ethics and Information Technology