ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Internet Of Things Has Arrived!

Updated on January 28, 2015

Are you connected to the Internet of Things?

Lots of buzz has been created about the Internet of Things; some folks believe that this may lead to self-regulation of gadgetry, information and some sort of highly evolved artificial intelligence system. What may well have been perceived as science fiction in old Flintstones cartoons is now a reality. Everyone is jockeying for position when it comes to safeguarding the Internet, with US regulators scrambling for a modicum of control over how the World Wide Web maintains its freedoms, while also safeguarding the privacy of its users. Recently, a State of the Net conference was hosted in Washington DC. The FTC (Federal Trade Commission) also released a report detailing its position on the Internet of Things. The findings present a unified picture from FTC regulators about the need to maintain security, without expressly detailing what types of measures need to be taken.

Privacy Concerns with the Internet of Things

Chances are there is something, or several things, that you’re doing at this very moment that you wouldn't want to be shared with the general public. We’re not talking anything nefarious or bizarre – just your personal information that you do not want other people to have access to. If you're connected to multiple gadgets with the Internet of Things, your private information may be at risk. Consider for a moment all those devices that you have recently purchased that are able to track your heart rate, your caloric intake, the number of steps you take, your movements back and forth and so on… There's a lot of private information out there that you probably don't want anyone to have access to, right? The question is how are the companies making these devices, gadgets and appliances safeguarding the privacy of the data that they collect? Since the legal framework for the operation of the Internet is several years behind the technological innovations and developments taking place, there are currently no laws in place to manage the flow of information. You wouldn't for example want sensitive information being shared with your insurance company, your boss or your creditors. The recently released report that was mentioned earlier on in this article actually details how this type of data can be detrimental to everyday people. You wouldn't want your homeowners insurance, or car insurance rates increased because of information that is being collected about your movements from smartphones, smartwatches and other wearable technology.

How Advanced is the Technology & How Detailed is the Data Being Collected?

Consider for a moment that today's technology is so sophisticated that it is possible to determine your stress level, your mood, mood disorders, marital status, employment status, gender, health and wellness, smoking habits, sleeping patterns, exercise activity levels and of course your movements. Viewed in perspective, this can present pretty damning evidence about an individual. If insurance companies, creditors and employers are not barred from accessing such sensitive information, it may be detrimental to your well-being. And that's just the tip of the iceberg: inside of our homes are appliances, gadgets and devices that collect even more important information about our dietary habits, moods and beyond. This necessitates the creation of a formal structure of rules as to how this type of big data is accessed, protected and managed. We certainly don't want to create a scenario where the information that is collected about us is invariably used against us. On a practical level, it is easy to see how a smoker (with confirmed evidence thereof) would incur higher risks for healthcare insurance than a non-smoker. Employers are not only looking for dedicated workers, but they are looking for workers that are well balanced in terms of mood stability, fitness and general health. If your home gym appliances report that you are not exercising sufficiently, you may be last in line to get that promotion or that pay raise!

Risks of The Internet of Things

The Onus Is On Consumers to Safeguard Their Own Information

As all these tech gizmos and gadgets make their way onto the markets, it's easy to see how appealing they can be. However, as consumers we have all the power. We determine what we buy, how we use it and whether it is wise to do so. We also have the right to petition lawmakers and companies to put into place privacy controls limiting who gets to access the information that is recorded. Since the data is highly sensitive, consumers need to be in the driver’s seat and have the final say regarding how their information is used. Internet connected devices need mature security frameworks to be in place to protect customers from mismanagement of information. The problem is the lack of consistency of policy across companies and industries. This was also highlighted in the Federal Trade Commission report. At the present time there appears to be an ethos of self-regulation, but the US Congress is implementing measures to beef up the security and privacy protection mechanisms for the Internet. The FTC report also calls for legislation that is neutral where the Internet of Things is concerned. At the present time, self-regulation does not appear to be gaining the right amount of traction with companies, and many of them are selling information to others who seek it.

New Developments with the Internet of Things

Softwarehaus Software AG – a German software company, has now partnered up with an Indian integrator/consulting company Wipro to create software for connected products. They use real-time analytics engines, actionable intelligence and streaming analytics in their mash up technologies. The challenges faced by this joint-venture are new for Internet of Things system designers. Streaming data needs to be continually analysed and new architectures need to be developed for smart decision-making processes to be made. Of equal importance is protecting that data from real-time threats. Apps play a critical component in the evolution of the IOT, and algorithms and analytics with cloud-based technology need to be developed for smart decision-making vis-a-vis big data. Other companies that have announced new working partnerships include Italtel and Cisco for smart manufacturers as they prepare to open industrial plants for information technology enterprise applications.

Meeting the Challenges of Privacy and Security for the IOT

To maintain safety, it is likely that dashboards and management portals will need to be created allowing people to manage app settings. One such way to do this is the privacy option on Android smartphones and tablets. Several safety suggestions have been bandied about, including the following:

  • Companies should only collect data that they need, no more
  • Companies should manufacture devices that are secure from the get go
  • Companies should make it possible for users to choose what they wish to share

Failing the implementation of the aforementioned suggestions, we will always be at risk. Our gadgets and gizmos will become surveillance equipment for insurance companies, creditors and our bosses unless we take action accordingly. As has so often been stated in the past: A life that is quantifiable should be one that is geared towards self-improvement, not self-degradation


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)