SlideShare a Scribd company logo
4
Most read
8
Most read
10
Most read
Ethical Issues – Smart Tech in
IoT
Introduction
• Internet of things
• IoT architecture
• Privacy and Security
Tank, B., Upadhyay, H. & Patel, H. 2016, 'A Survey on IoT Privacy Issues and Mitigation Techniques', paper presented to the Proceedings of the Second International Conference on
Information and Communication Technology for Competitive Strategies, Udaipur, India.
Lucero, S. 2016, IoT platforms: enabling the Internet of Things, IHS, ihs.com.
Stakeholders
• Interests
• Power/interests grid
• Risks
https://www.stakeholdermap.com/images/stakeholder-analysis.gif
Resolutions
• Security Measures
• Perception layer
• Access control – secure tags
• Key management – forward/backward secrecy
• Network layer
• Authentication
• Application layer
• Technical – protection of privacy
• Non-Technical – increase user awareness
Internet of Things
Ethical Issues
Ethical Issues
• What is Ethics?
• IEEE ethic code
• IoT Ethical Issues
Personal message recording leak – Teddy bear
• Ethical Issues:
• Internet connected Teddy bear leak 2 million recordings of parents and their
children
• 800, 000 records of personal information were exposed (emails, password)
Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
Personal message recording leak – Teddy bear
• Ethical Issues:
• Database design flaw
• Irresponsible vendor
• Records were sold
Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
A Case study - FitBit
https://support.endomondo.com/hc/en-us/articles/202228488-Fitbit
A Case study - FitBit
• Ethical Issues:
• Shared their customers’ fitness
information with their business
partners
• Advertisement emails, phone calls,
and ad notices on the phone were
interrupting the customers
Considerations dealing with Ethical issues
• Government regulations of IoT
• When making decisions, follow the ethics code
• Always think about the customers’ benefit
• Improve IoT security
• Customer awareness
Internet of Things
In Businesses
Examples of IoTs used in businesses
1.3 million robots in factories that are at risk of being hacked by 2018 (CNet)
https://www.cnet.com/au/news/factory-robots-industry-machines-can-be-easily-hacked/
Incidents
• In 2014 a German Steel Mill was hacked, some of the furnaces
blasted. Hackers obtained access by infecting emails with malicious
scripts sent to the employees’ inbox.
• A uranium enrichment facility in Iran was infected by a virus called
StuxNet leading a failure to some of the equipment in the facility.
http://www.bbc.com/news/technology-30575104
http://www.abc.net.au/triplej/programs/hack/the-worlds-first-digital-weapon-stuxnet/7926298
Internet of Things
Legal issues
Legal issues is?
• Intellectual property
• Cybercrime
• Liability of providers
• Data protection and privacy
• Telecom
Case Study: Trane
• Connected thermostat vulnerabilities detected by Cisco’s Talos group
allowed foothold into network
• It tooks 12 months to find fixes for 2 vulnerabilities
• 21 months to publish fix for 1 vulnerability
• The device owners may not aware of fixes or have the skill to install
updates
http://blog.talosintel.com/2016/02/trane-iot.html
Solution
• Policies, procedures and standards
• Awareness training
• Risk management and weakness management
• Forensics
• Additional types of logging, log storage
• Increased demand for IP addresses both IPv4 and IPv6 and Increased network complexity
• Strengthen partnerships with researchers, vendors, and procurement department
http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/
http://www.gsma.com/connectedliving/gsma-iot-security-guidelines-complete-document-set/

More Related Content

PPTX
Ethical, Legal and Social issues IoT
PDF
Iot and ethics
PPTX
Internet of things (IoT)
PPTX
Internet of things ppt
PPTX
Internet of things - challenges scopes and solutions
PPTX
Internet of things (IoT)- Introduction, Utilities, Applications
PPTX
10 min IoT ppt
PPTX
Internet of Things (IoT) - IK
Ethical, Legal and Social issues IoT
Iot and ethics
Internet of things (IoT)
Internet of things ppt
Internet of things - challenges scopes and solutions
Internet of things (IoT)- Introduction, Utilities, Applications
10 min IoT ppt
Internet of Things (IoT) - IK

What's hot (20)

PPTX
Internet of things (IOT)
PPTX
Internet of Things Overview
PPTX
Internet of things(IoT)
PPTX
Internet of things(IOT)
PDF
Internet of things
PPTX
Internet of things (IoT)
PPTX
PPTX
Internet of Things (IOT)
PPTX
Iot - Internet of Things
DOCX
Ethical issues in Internet of things
PPTX
Iot audit
PPTX
Internet of things
PPTX
Internet of things startup basic
PDF
Edge Computing
PPTX
Iot and cloud computing
PPTX
IoT presentation
PPTX
Internet of Things ( IoT ) Training
PPTX
Internet of Things(IoT) - Introduction and Research Areas for Thesis
PPTX
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
PPTX
Internet of things
Internet of things (IOT)
Internet of Things Overview
Internet of things(IoT)
Internet of things(IOT)
Internet of things
Internet of things (IoT)
Internet of Things (IOT)
Iot - Internet of Things
Ethical issues in Internet of things
Iot audit
Internet of things
Internet of things startup basic
Edge Computing
Iot and cloud computing
IoT presentation
Internet of Things ( IoT ) Training
Internet of Things(IoT) - Introduction and Research Areas for Thesis
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
Internet of things
Ad

Similar to Ethical issues in internet of things (20)

PPTX
A Wake-Up Call for IoT
PPTX
Internet of things
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PPTX
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
PPTX
IoT and the industrial Internet of Things - june 20 2019
PPTX
CHA_001_IOT.pptx
PPTX
Iot-Internet-of-Things-ppt.pptx
PPTX
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Kijiji 160616
PPTX
L12. Digital Forensics BS.pptx
PPTX
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
PDF
Internet of Things (IoT)
PPTX
,mnk,jjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj...
PDF
IOT Security - ICCT College of Engineering
PDF
internet of things computer engineering.pdf
PPTX
IoT.ppt
PPTX
IOT PPTbbdbfbfbfbfbfbfbfbfbfbfbffbb.pptx
PPTX
Iot-Internet-of-Things-ppt-download.pptx
A Wake-Up Call for IoT
Internet of things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Chapter 6 - IT Culture and the Society - Lesson 1.pptx
IoT and the industrial Internet of Things - june 20 2019
CHA_001_IOT.pptx
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things_Industrial revolution 4.0-ppt.pptx
All The Things: Security, Privacy & Safety in a World of Connected Devices
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Kijiji 160616
L12. Digital Forensics BS.pptx
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Internet of Things (IoT)
,mnk,jjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj...
IOT Security - ICCT College of Engineering
internet of things computer engineering.pdf
IoT.ppt
IOT PPTbbdbfbfbfbfbfbfbfbfbfbfbffbb.pptx
Iot-Internet-of-Things-ppt-download.pptx
Ad

More from Mohammad Emrul Hassan Emon (20)

PDF
Offer Letter_EC (20201116-163318543) - Mohammad Emrul Hassan Emon Signed.pdf
PDF
Last_Payslip_(8-10-2021).PDF
PDF
Fundemental of interaction designs
PDF
Enterprise software testing
DOCX
Enterprise Software Architecture Project
PPTX
Industry Project Pitch presentation
PDF
Industry project developling full it software solutions and project management
DOCX
Developing Movie Recommendation System
DOCX
Inspection of Software Requirements Specifications (srs)
DOCX
Software requirement specification(SRS)
DOCX
Group Project Quality and Operation Management
PDF
Emon,Mohammad Emrul Hassan-MBA degree certificate
PDF
Emon,Mohammad Emrul Hassan-MIT Testamur
PDF
Technology innovative products and services solution reports
PDF
software system design
PPTX
Customer engagement on mobile application research
DOCX
Technology Research on customer enagement
PPTX
Technology innovation project
DOCX
Designing prototype of system project
Offer Letter_EC (20201116-163318543) - Mohammad Emrul Hassan Emon Signed.pdf
Last_Payslip_(8-10-2021).PDF
Fundemental of interaction designs
Enterprise software testing
Enterprise Software Architecture Project
Industry Project Pitch presentation
Industry project developling full it software solutions and project management
Developing Movie Recommendation System
Inspection of Software Requirements Specifications (srs)
Software requirement specification(SRS)
Group Project Quality and Operation Management
Emon,Mohammad Emrul Hassan-MBA degree certificate
Emon,Mohammad Emrul Hassan-MIT Testamur
Technology innovative products and services solution reports
software system design
Customer engagement on mobile application research
Technology Research on customer enagement
Technology innovation project
Designing prototype of system project

Recently uploaded (20)

PPTX
TLE Review Electricity (Electricity).pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Modernising the Digital Integration Hub
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Architecture types and enterprise applications.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting Started with Data Integration: FME Form 101
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
August Patch Tuesday
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
The various Industrial Revolutions .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
TLE Review Electricity (Electricity).pptx
Web App vs Mobile App What Should You Build First.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Modernising the Digital Integration Hub
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
cloud_computing_Infrastucture_as_cloud_p
Architecture types and enterprise applications.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting Started with Data Integration: FME Form 101
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
What is a Computer? Input Devices /output devices
August Patch Tuesday
Hindi spoken digit analysis for native and non-native speakers
NewMind AI Weekly Chronicles - August'25-Week II
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
The various Industrial Revolutions .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Ethical issues in internet of things

  • 1. Ethical Issues – Smart Tech in IoT
  • 2. Introduction • Internet of things • IoT architecture • Privacy and Security Tank, B., Upadhyay, H. & Patel, H. 2016, 'A Survey on IoT Privacy Issues and Mitigation Techniques', paper presented to the Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India. Lucero, S. 2016, IoT platforms: enabling the Internet of Things, IHS, ihs.com.
  • 3. Stakeholders • Interests • Power/interests grid • Risks https://www.stakeholdermap.com/images/stakeholder-analysis.gif
  • 4. Resolutions • Security Measures • Perception layer • Access control – secure tags • Key management – forward/backward secrecy • Network layer • Authentication • Application layer • Technical – protection of privacy • Non-Technical – increase user awareness
  • 6. Ethical Issues • What is Ethics? • IEEE ethic code • IoT Ethical Issues
  • 7. Personal message recording leak – Teddy bear • Ethical Issues: • Internet connected Teddy bear leak 2 million recordings of parents and their children • 800, 000 records of personal information were exposed (emails, password) Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
  • 8. Personal message recording leak – Teddy bear • Ethical Issues: • Database design flaw • Irresponsible vendor • Records were sold Chester, R. 2017, 'Millions of recorded messages between parents and children targeted in teddy bear toy hack'.
  • 9. A Case study - FitBit https://support.endomondo.com/hc/en-us/articles/202228488-Fitbit
  • 10. A Case study - FitBit • Ethical Issues: • Shared their customers’ fitness information with their business partners • Advertisement emails, phone calls, and ad notices on the phone were interrupting the customers
  • 11. Considerations dealing with Ethical issues • Government regulations of IoT • When making decisions, follow the ethics code • Always think about the customers’ benefit • Improve IoT security • Customer awareness
  • 12. Internet of Things In Businesses
  • 13. Examples of IoTs used in businesses 1.3 million robots in factories that are at risk of being hacked by 2018 (CNet) https://www.cnet.com/au/news/factory-robots-industry-machines-can-be-easily-hacked/
  • 14. Incidents • In 2014 a German Steel Mill was hacked, some of the furnaces blasted. Hackers obtained access by infecting emails with malicious scripts sent to the employees’ inbox. • A uranium enrichment facility in Iran was infected by a virus called StuxNet leading a failure to some of the equipment in the facility. http://www.bbc.com/news/technology-30575104 http://www.abc.net.au/triplej/programs/hack/the-worlds-first-digital-weapon-stuxnet/7926298
  • 16. Legal issues is? • Intellectual property • Cybercrime • Liability of providers • Data protection and privacy • Telecom
  • 17. Case Study: Trane • Connected thermostat vulnerabilities detected by Cisco’s Talos group allowed foothold into network • It tooks 12 months to find fixes for 2 vulnerabilities • 21 months to publish fix for 1 vulnerability • The device owners may not aware of fixes or have the skill to install updates http://blog.talosintel.com/2016/02/trane-iot.html
  • 18. Solution • Policies, procedures and standards • Awareness training • Risk management and weakness management • Forensics • Additional types of logging, log storage • Increased demand for IP addresses both IPv4 and IPv6 and Increased network complexity • Strengthen partnerships with researchers, vendors, and procurement department http://krebsonsecurity.com/2016/02/iot-reality-smart-devices-dumb-defaults/ http://www.gsma.com/connectedliving/gsma-iot-security-guidelines-complete-document-set/