The latest technology tsunami creates great market opportunities, and simultaneously wreaks havoc on the business world. The Internet of Things (IoT) is all about connecting sensors and other data-generating devices to everyday objects and ultimately to the Internet, generating a wealth of intelligence and real-time data, and merging and blurring the physical and virtual worlds.
Already established in the consumer products world, the IoT offers corporations the opportunity to develop new offerings or to reconfigure existing products to collect intelligence. This will drive an increase in big data implementations, cloud, and other emerging technologies as corporations begin to capitalize on this up and coming phenomenon.
Every new trend comes with its share of challenges and implications. For the IoT, these might include breaches in data privacy, security, and governance that occur as more IT platforms are leveraged, generating and transferring more data that is accessed by more and more people (business and consumers) who themselves generate exponentially more data every day simply through using new devices and technologies. The privacy and information security issues involved with the IoT is such a concern that the U.S. Federal Trade Commission (FTC) is holding a public workshop on November 21, 2013 in Washington, D.C. (http://ftc.gov/opa/2013/04/internetthings.shtm) specifically to discuss the issues involved.
An upcoming issue of Cutter IT Journal, with Guest Editor Rebecca Herold, will address the IoT and provide insight on the challenges and possible solutions to ensuring the privacy and security of valuable data assets as the IoT becomes a reality.
Topics to address may include (but are not limited to the following):
* What current and future privacy challenges does the IoT bring to the enterprise?
* How will the IoT impact the way we do business and how can we prepare for it, including planning for associated privacy protection?
* In what ways can security and privacy risks be minimized?
* What types of regulations/governance/practices will be needed to ensure data privacy/security?
* How will corporate networks be affected, and how can corporations prepare for it?
* How can security controls be applied most effectively to mitigate associated privacy risks?
* How do emerging technologies, such as cloud services and big data analytics, impact privacy within the IoT?
* What privacy tradeoffs are necessary, or unavoidable, in order to realize the benefits from the IoT?
* What privacy problems are already occurring within the IoT?
* Will the IoT bring with it an expansive, Orwellian system of constant, ubiquitous surveillance, from which there will be no turning back to individual control of personal privacy?
* How are other countries outside the U.S. taking action to protect privacy within the IoT?
* Is it even possible to truly de-identify personal information within the IoT? Explain how or why not.
SEND US YOUR ARTICLE IDEA by 5 June 2013.
Please respond to the Guest Editor Rebecca Herold, rherold[at]cutter[dot]com with a copy to Christine Generali, cgenerali[at]cutter[dot]com no later than 5 June 2013 and include an extended abstract and a short article outline showing major discussion points.
Accepted articles are due by 8 July 2013.