Skip to main content

Protecting Privacy from Internet Abuses in the Smart City

  • Chapter
  • First Online:

Abstract

Digital technology and artificial intelligence in the smart city can do a lot of good things, right? You’d better believe it!

This is a preview of subscription content, log in via an institution.

Buying options

eBook
USD   19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   29.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    “Helping children unplug” Washington Post, Jan.16, 2018, P. A16.

  2. 2.

    Joseph N. Pelton, e-Sphere: The Rise of the World-Wide Mind, (2001) Bridgeport, Conn.: Quorum Press.

  3. 3.

    Elizabeth Dwoskin, “Big tech will confront their dark side”, Washington Post, December 31, 2017, p. B3.

  4. 4.

    Zeynei Tufekci, “The [divisive, corrosive, democracy poisoning}Age of Free Speech” Wired Magazine, Feb, 2018, pp.

  5. 5.

    Karoun Demirjian, “Key NSA surveillance program’s reauthorization stalls in Congress, Washington Post, December 21, 2017.

  6. 6.

    John Avalon, “How Nixon’s Hatred of the Press Led to His Downfall, The Daily Beast, Sept. 5, 2017 https://www.thedailybeast.com/how-nixons-hatred-of-the-press-led-to-his-downfall-5.

  7. 7.

    Eugene Scott, “Omarosa: Trump Campaign Keeping an Enemies List” CNN, Nov. 9, 2016 http://www.cnn.com/2016/11/09/politics/omarosa-list-donald-trump/index.html.

  8. 8.

    Matthew Braga, “Welcome to the Neighbourbood” CBC News, Jan. 16, 2018 http://www.cbc.ca/news/technology/smart-cities-privacy-data-personal-information-sidewalk-1.4488145Math.

  9. 9.

    Marcello Ienca and Effy Vayena, “Cambridge Analytica and Online Manipulation”. Scientific American, March 30, 2018, https://blogs.scientificamerican.com/observations/cambridge-analytica-and-online-manipulation/.

  10. 10.

    Sapna Maheshwari, “Hey, Alexa, What Can You Hear? And what Will You Do with It?” New York Times, April 1, 2018. P. 1 and 20.

  11. 11.

    Lee Rainie, Sara Kiesler, Ruogu Kang and Mary Madden, “Part 2: Concerns About Personal Information Online”, September 5, 2013 http://www.pewinternet.org/2013/09/05/part-2-concerns-about-personal-information-online/.

  12. 12.

    Andrew Roth, “Letter from Moscow: Surveillance grows along with the city’s tech”, Washington Post, December 19, 2017, P. A5.

  13. 13.

    Ibid.

  14. 14.

    Christina Zhao, “China Used Its Vast CCTV Surveillance Network to Track Down Reporter in Just Seven Minutes” Newsweek, December 14, 2017 http://www.newsweek.com/tasked-trying-remain-undetected-long-possible-sudworth-filmed-himself-selfie-747843.

  15. 15.

    “China: Minority Region Collects DNA from Millions” Human Rights Watch, Dec. 13, 2017. https://www.hrw.org/news/2017/12/13/china-minority-region-collects-dna-millions.

  16. 16.

    “Here’s Looking at You” Washington Post, Dec. 18, 2017 p A16.

  17. 17.

    Simon Denyer, “The all-seeing ‘Sharp Eyes’ of China’s security state” Washington Post, January 8, 2018, pp. A1 and A9.

  18. 18.

    Ibid.

  19. 19.

    Privacy Today: A Review of Current Issues, March 1, 2001 https://www.privacyrights.org/blog/privacy-today-review-current-issues.

  20. 20.

    “New Totalitarian Surveillance Technology, The Guardian, Aug. 15, 2012. http://www.guardian.co.uk/commentisfree/2012/aug/15/new-totalitarianism-surveillance-technology?newsfeed=true.

  21. 21.

    Kay Ranade, “Customer Loyalty – What Is It? How Can You Measure and Manage It?” Loyalty Research Center, December 12, 2012 http://www.loyaltyresearch.com/insights/customer-loyalty-what-is-it-how-can-you-measure-and-manage-it/.

  22. 22.

    Lee Mathews, “Fake VPNs Are Trying to Cash In On Your Online Privacy Fears” Forbes CyberSecurity, April 5, 2017. https://www.forbes.com/sites/leemathews/2017/04/05/fake-vpns-are-trying-to-cash-in-on-your-online-privacy-fears/#f329bdc7c1cd.

  23. 23.

    Cryptocurrency Market Capitalizations, December 21, 2017 https://coinmarketcap.com/.

  24. 24.

    Ryan Kh, “Cybersecurity Is a Mess; Can Blockchains Fix It? Catalyst for Business, December 21, 2017. https://www.infosecurity-magazine.com/next-gen-infosec/cybersecurity-mess-blockchains-fix/.

  25. 25.

    Steven Johnson, “Crypto-currencies aren’t just about making a fortune”, New York Times Sunday Magazine, Jan. 21, 2018, pp. 36–40.

  26. 26.

    Ibid.

  27. 27.

    Tom Risen, “CO2 Watchdogs” Aerospace America, January 2017, pp. 22–28.

  28. 28.

    Brian Fung, “Wireless for drones, trains and automobiles” Washington Post, May 7, 2017, pp. G1 and G4.

  29. 29.

    White Paper on IoT for Defense, Wind River, Dec, 2017 http://www.windriver.com/whitepapers/iot-for-defense/wind-river_%20IoT-in-Defense_white-paper.pdf.

  30. 30.

    Cynthia Harvey “Public Cloud Computing Providers” Datamation, April 26, 2017 https://www.datamation.com/cloud-computing/public-cloud-providers.html.

  31. 31.

    Setphanie Overby “Outsourcing the top ten IT service providers” Dec. 4, 2017 Everest Group, CIO https://www.cio.com/article/3030989/outsourcing/the-top-10-it-outsourcing-service-providers-of-the-year.html.

  32. 32.

    “Welcome to Sealand, Now Bugger Off” Wired, July 1, 2000 https://www.wired.com/2000/07/haven-2/.

  33. 33.

    Terrence Cullen and Leonard Greene, “At least three killed after Amtrak train derails in Washington” Daily News, Dec. 19, 2017 http://www.nydailynews.com/news/national/high-speed-amtrak-train-derails-washington-state-article-1.3707034.

  34. 34.

    Craig Timberg, Griff Witte and Ellen Nakashima, “Malware Attack Hits Global Networks” Washington Post, May 14, 2017. pp. A.1 and A11.

  35. 35.

    Kai-Fu Lee, “The Real Threat of Artificial Intelligence” Washington Post, New York Times, June 25, 2017.

  36. 36.

    Emily Badger, “The Megacity, Untethered”, The New York Times, Sunday Business Section, Dec. 24, 2017. pp. 1 and 6.

  37. 37.

    Andrew Roth, “Surveillance grows along with city’s tech”, Washington Post, December 19, 2017, p. A5.

  38. 38.

    Ibid.

  39. 39.

    Michael Morell and Mike Rogers, “Russian Cyber-attacks Never Stopped” Washington Post, December 26, 2017, p. A17.

  40. 40.

    Adam Entous, Ellen Nakashima, and Greg Jaffe, “Kremlin’s trolls beset Web as U.S. dithered” Washington Post, December 26, 2017, pp. A1 and A6-A7.

  41. 41.

    “Twitter’s Haphazard Purge,” Washington Post, December 26, 2017, p. A16.

  42. 42.

    Denis Stukal, Sergey Sanovich, Richard Bonneau, and Joshua A. Tucker, Detecting Bots on Russian Political Twitter, Research Briefings, December 2017. http://online.liebertpub.com/doi/full/10.1089/big.2017.0038.

  43. 43.

    Op cit Z. Tufekci.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pelton, J.N., Singh, I.B. (2019). Protecting Privacy from Internet Abuses in the Smart City. In: Smart Cities of Today and Tomorrow. Copernicus, Cham. https://doi.org/10.1007/978-3-319-95822-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95822-4_6

  • Published:

  • Publisher Name: Copernicus, Cham

  • Print ISBN: 978-3-319-95821-7

  • Online ISBN: 978-3-319-95822-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics