Skip to main content

The Internet of Things

  • Chapter
  • First Online:
Book cover Human Rights and Digital Technology
  • 755 Accesses

Abstract

Contrary to the popular perception, the Internet of Things is a physical reality. Often imagined as an amorphous interconnection of machines and people, it generates, stores, transmits and analyses data through physical infrastructure that influences decision-making processes. Decision-making was once the sole purview of humans; today machines organize the bulk of our choices, in an array of activities ranging from an automatic bank withdrawal to putting on the seatbelt in a computerized automobile. This new reality of the physical interconnectivity of machines and data is one that, at first glance, appears to have no precedent in law. This chapter will argue that the legal framework necessary for maintaining our human autonomy and living in harmony with an automated world is already in place. The international human rights body of treaty and customary law provides a principled reference for determining the subordinate place of machines in a digitized environment, but the existing law must be applied to new circumstances. This chapter will present three scenarios of life in a digital world of the not-so-distant future, a future where technology provides relief and autonomy for certain individuals, while subjugating others to subtle forms of discrimination or dependence. It will then discuss the technology embedded in our scenarios and examine some of the major legal principles invoked by the Internet of Things. These scenarios demonstrate the need to engage in a rigorous, comprehensive assessment of ubiquitous technology use in order to preserve our global public goods and individual rights in a digitized world.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  • Ambach, P. (2011). International criminal responsibility of transnational corporate actors doing business in zones of armed conflict. Paper presented at The Interaction of International Investment Law with Other Fields of Public International Law, Leiden Law School.

    Google Scholar 

  • Apple. (2016). Apple privacy policy, Apple Inc. Retrieved March 19, 2016, from http://www.apple.com/ph/privacy/privacy-built-in/

  • Barlow, J. P. (1996). A declaration of the independence of cyberspace, davos, electronic frontier foundation. Retrieved March 20, 2016, from https://www.eff.org/cyberspace-independence

  • Boden, R. (2015). Bucharest buses to use bluetooth beacons to guide the blind. Near Field Communications World. Retrieved March 1, 2016, from http://www.nfcworld.com (home page).

  • Buell, F. (2004). From apocalypse to way of Life: Environmental crisis in the American century. New York: Routledge.

    Google Scholar 

  • Campaign to Stop Killer Robots. (2016). UN rapporteurs call for ban. Campaign to stop killer robots. Retrieved March 20, 2016, from http://www.stopkillerrobots.org/2016/03/unreport

  • Casati, R. (2013). Contre le colonialisme numérique: manifeste pour continuer à lire. Paris: Albin Michel.

    Google Scholar 

  • Cisco. (2015). Cloud and mobile network traffic forecast—Visual Networking Index (VNI). Retrieved February 27, 2016, from http://cisco.com/c/en/us/solutions/serviceprovider/visual-networking-index-vni/index.html

  • Coeckelbergh, M. (2012). Growing moral relations: Critique of moral status ascription. New York: Palgrave Macmillan.

    Book  Google Scholar 

  • Cunche, M., Kaafar, M. A., & Boreli, R. (2012). I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests. World of Wireless, Mobile and Multimedia Networks. 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, San Francisco.

    Google Scholar 

  • Cunche, M., Kaafar, M. A., & Boreli, R. (2013). Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive and Mobile Computing, 11, 56–69. Elsevier.

    Google Scholar 

  • Danova, T. (2013, October 2). Morgan Stanley: 75 billion devices will be connected to the Internet of Things by 2020. Business Insider. Retrieved February 27, 2016, from http://www.businessinsider.com/75-billion-devices-will-be-connected-to-the-internet-by-2020

  • Darnton, R. (2014). Censors at work: How states shaped literature. New York: WW Norton.

    Google Scholar 

  • Department for Environment, Food and Rural Affairs. (2016). UK Air information resource. Gov.uk. Retrieved March 20, 2016, from http://uk-air.defra.gov.uk/index.php

  • Docherty, B. (2015). Mind the gap: The lack of accountability for killer robots. Human Rights Watch Reports. Retrieved March 20, 2016, from https://www.hrw.org/ (home page).

  • Eckersley, P., & Gillula, J. (2014). Is your android device telling the world where you’ve been? Electronic Frontier Foundation, l. Retrieved March 19, 2016, from http://goo.gl/3XezqR

  • Environmental Protection Agency. (2009). Final report: Integrated science assessment for particulate matter. U.S. Environmental Protection Agency. Retrieved March 19, 2016, from http://www.epa.gov (home page).

  • European Telecommunications Network Operators’ Association. (2012) Third Annual Economic Report. EurActiv Press Release. Retrieved March 19, 2016, from http://pr.euractiv.com (home page).

  • Evans, D. (2011). The Internet of Things how the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group White Paper, p. 3.

    Google Scholar 

  • FaberNovel. (2014) GAFAnomics: New economy, new rules. Fabernovel study. Retrieved March 20, 2016, from http://www.fabernovel.com/(home page).

  • Field Trip. (2016). Retrieved March 19, 2016, from https://www.fieldtripper.com (home page).

  • Foursquare Labs, Inc. (2016). Retrieved March 19, 2016, from https://foursquare.com (home page).

  • Freudiger, J. (2015). How talkative is your mobile device? An experimental study of Wi-Fi probe requests. ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM WiSec, 8, 1–6.

    Google Scholar 

  • Gartner. (2015, November 10). Gartner says 6.4 billion connected “things” will be in use in 2016, up 30 percent from 2015. Stamford, CT: Gartner Press Release. Retrieved February 27, 2016, from http://www.gartner.com/newsroom/id/3165317

  • Gasser, U., & Schulz, W. (2015). Governance of online intermediaries: Observations from a series of national case studies: NoC online intermediaries research project. Global Network of Internet & Society Research Centers. Retrieved March 20, 2016, from https://publixphere.net (home page).

  • Gibson, D., Ostashewski, N., Flintoff, K., Grant, S., Knight, E. (2013). Digital badges in education. Education and Information Technologies, 20(2), 1–8. Springer Science and Business Media, New York.

    Google Scholar 

  • Gillula, J., & Schoen, S. (2014). An Umbrella in the hurricane: Apple limits mobile device location tracking. Electronic Frontier Foundation. Retrieved February 28, 2016, from https://www.eff.org (home page).

  • Gunkel, D. J. (2012). The machine question: Critical perspectives on AI, robots, and ethics. Cambridge: MIT Press.

    Google Scholar 

  • Hernandez, G., Arias, O., Buentello, D., & Jin, Y. (2016). Smart nest thermostat: A smart spy in your home. Black Hat USA. https://www.blackhat.com/docs/us-14/materials/us-14-Jin-Smart-Nest-Thermostat-A-Smart-Spy-In-Your-Home.pdf

  • Hotten, R. (2015). Volkswagen: The scandal explained. BBC News. Retrieved March 20, 2016, from http://www.bbc.com (home page).

  • Huawei. (2015). Global Connectivity Index 2015; Benchmarking digital economy transformation. Huawei Technologies Co., Ltd. http://www.huawei.com/minisite/gci/en/huawei-global-connectivity-index-2015-whitepaper-en-0507.pdf

  • International Task Force on Global Public Goods. (2006). Meeting the global challenges: International cooperation in the national interest. Global Public Goods, Global Policy Forum. Retrieved March 19, 2016, from https://www.globalpolicy.org (home page).

  • Karkanias, C. D., et al. (2009). Avatar individualized by physical characteristic, US Patent Application 20090309891, US Trademark and Patent Office, 17 December.

    Google Scholar 

  • Kleiner, T. (2016). Time to unleash the potential of the Internet of Things in Europe. Digital Single Market. European Commission. Retrieved February 15, 2016, from https://ec.europa.eu (home page).

  • London School of Economics Cities. (2014). Innovation in Europe’s cities: A report by LSE cities on Bloomberg Philanthropes 2014 Mayors Challenge. LSE Cities. Retrieved Febraury 28, 2016, from https://lsecities.net (home page).

  • Lucas, G. R. (2014). Legal and ethical precepts governing emerging military technologies: Research and use. Amsterdam Law Forum, 6(1), 23–34.

    Google Scholar 

  • Mindell, D. (2015). Our robots, ourselves. New York: Viking.

    Google Scholar 

  • Misra. (2014a). iOS8 MAC randomization update. Mojo Networks Blog. Retrieved February 28, 2016, from http://blog.mojonetworks.com/ios8-mac-randomgate/

  • Misra, B. (2014b). iOS8 MAC randomization–analyzed! Mojo networks blog. Retrieved February 28, 2016, from http://blog.mojonetworks.com/ios8-mac-randomization-analyzed/

  • Mortier, R., et al. (2014). Human-data interaction: The human face of the data-driven society. Paper presented at IT-as-a-Utility Network and Human-Data Interaction Workshop, Oxford University.

    Google Scholar 

  • Musa, A., & Eriksson, J. (2012). Tracking unmodified smartphones using Wi-Fi monitors. SenSys, 10th Association for Computing Machinery Conference on Embedded Network Sensor Systems (pp. 281–294).

    Google Scholar 

  • Noorman, M., & Johnson, D. G. (2014). Negotiating autonomy and responsibility in military robots. Ethics and Information Technology, 16(1), 51–62.

    Article  Google Scholar 

  • OctoTechnology. (2012). Les Géants du Web: Culture—Pratiques—Architecture. Paris: Octo.

    Google Scholar 

  • Organization for Economic Co-operation and Development. (2012). Environmental outlook to 2050: The consequences of inaction: Highlights. OECD. Retrieved March 20, 2016, from https://www.oecd.org (home page).

  • Ostrom, E. (1990). Governing the commons: The evolution of institutions for collective action. Cambridge, UK: Cambridge UniversityPress.

    Book  Google Scholar 

  • Parliament of the United Kingdom. (1875). Public Health Act, Citation 38 & 39 Ch. 55. The National Archives. Retrieved March 20, 2016, from http://www.legislation.gov.uk (home page).

  • Parliament of the United Kingdom. (1956). Clean Air Act. The National Archives. Retrieved March 20, 2016, from http://www.legislation.gov.uk (home page).

  • Parliament of the United Kingdom. (1968). Clean Air Act. The National Archives. Retrieved March 20, 2016, from http://www.legislation.gov.uk (home page).

  • Peeters, M., Baar, T. J., & Harbers, M. (2014). Responsible innovation, development, and deployment of automated technology. Responsible Innovation Conference Paper. Interactive Intelligence Group. Retrieved March 20, 2016, from https://ii.tudelft.nl (home page).

  • Perry, S. (2012). Child soldiers: The pursuit of peace or justice for child combatants? In Gardner & Kobtzeff (Eds.), The Ashgate research companion to war: Origins and prevention. London: Ashgate Press.

    Google Scholar 

  • Prensky, M. (2001). Digital natives, digital immigrants. On the Horizon, 9(5), 1–6.

    Article  Google Scholar 

  • Ramirez, D., McDevitt, J., & Farrell, A. (2000). A resource guide on racial profiling data collection systems: Promising practices and lessons learned. Monograph National Contest Journal. Washington, DC: U.S. Department of Justice.

    Google Scholar 

  • Raths, D. (2013). How badges really work in higher education. Campus Technology. Public Sector Media Group. Retrieved February 28, 2016, from https://campustechnology.com (home page).

  • Riordan, J. (2016). The liability of internet intermediaries. Oxford: Oxford University Press.

    Google Scholar 

  • Rome Statute of the International Criminal Court, U.N. Doc 2187 U.N.T.S. 90, entered into force. July 1, 2002.

    Google Scholar 

  • Rousseau, J. J. (1762). Du contrat social ou Principes du droit politique. Paris: LibrioPhilosophie.

    Google Scholar 

  • Santosuosso, A. (2013). Legal problems of modern robotics. Paper delivered at Legislation for Technical Systems: Robotics, Autonomous Systems and Industry 4.0 are challenging law, European Center for Law, Science and New Technologies, Università degli Studi di Pavia, Wuerzburg, Germany.

    Google Scholar 

  • Shah, R. C., & Kesan, J. P. (2007). The privatization of the internet’s backbone network. Journal of Broadcasting and Electronic Media, 51(1), 93–109.

    Article  Google Scholar 

  • Stewart, J. (2011). Corporate war crimes: Prosecuting the pillage of natural resources. New York: Open Societies Foundation.

    Google Scholar 

  • United Nations General Assembly. (1948). Universal Declaration of Human Rights, G.A. res.217 A (III), adopted by the U.N. Doc. A/810, 10 December.

    Google Scholar 

  • United Nations General Assembly. (1966). International Covenant on Civil and Political Rights, G.A. res. 2200A(XXI), 21 U.N. GAOR Supp. (No. 16) at 52, U.N. Doc. A/6316, 999 U.N.T.S. 171, entered into force 23 March 1976.

    Google Scholar 

  • Van den Bulck, P., & De Bellefroid, M. (2009). Legal regime of avatars created in the framework of video games: Some reflections in light of french and other legal systems. Convergence, 5(2), 257–268.

    Google Scholar 

  • Van den Hoven, M. J. (1998). Moral responsibility, public office and information technology. In Snellen & van de Donk (Eds.), Public Administration in an Information Age: A Handbook. Amsterdam: IOS Press. (pp. 97–112).

    Google Scholar 

  • Walsh, F. (2015). Bionic eye implant world first. BBC News Online. Retrieved February 26, 2016, from http://www.bbc.com (home page).

  • Want, R., Schilit, B. N., & Jenson, S. (2015). Enabling the Internet of Things. IEEE, Computer Society, 48(1), 28–35.

    Article  Google Scholar 

  • Zebra Technology. (2014). Analysis of iOS 8 MAC randomization on locationing. White Paper. Retrieved February 28, 2016, from http://mpact.zebra.com/documents/iOS8-White-Paper.pdf

Download references

Author information

Authors and Affiliations

Authors

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Perry, S., Roda, C. (2017). The Internet of Things. In: Human Rights and Digital Technology. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-58805-0_5

Download citation

Publish with us

Policies and ethics