Surveillance and the Built Environment Professor William Webster



Similar documents
Guiding principles for security in a networked society

The Internet of Things (IoT) Opportunities and Risks

Introduction to Cybersecurity Overview. October 2014

ป งบประมาณ พ.ศ.๒๕๕๘ ( ๑ ต ลาคม ๒๕๕๗ ถ ง 30 ก นยายน ๒๕๕๘ ) สร ปผลปร มาณงานพ สด การจ ดซ อ/จ าง/เช า ในรอบเด อนพฤศจ กายน ๒๕๕๗ ส าน กงานท ด นจ งหว ดเช

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5

Connect Renfrewshire

Server Based Desktop Virtualization with Mobile Thin Clients

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

How To Be Prepared For A Cybercrime

The Internet of Things Risks and Challenges

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Kangas Cybersecurity strategy

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Creating Society s Digital Era

Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy

Assessing the strength of your security operating model

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cyber security Building confidence in your digital future

Northrop Grumman Cybersecurity Research Consortium

UK Government Information Economy Strategy

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Social Impact of Privacy in Cloud Computing

How To Understand The Power Of The Internet Of Things

Big Data + Smart City = Weak Privacy + Weak Security?

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

KUDELSKI SECURITY DEFENSE.

Mobile Technologies Index

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

ICT Development Trends (2014): Embracing the Era of Mobile-ICT

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

RC & CREATING DATA PRIVACY OPPORTUNITIES USING BIG IN EUROPE DATA AND ANALYTICS. risk compliance RISK & COMPLIANCE MAGAZINE.

Business Analytics and the Nexus of Information

Oman Broadband Company. 1 st of June 2014

SURVEILLANCE ENHANCED FACE RECOGNITION

Smart Grid. Hva er Smart Grid og hva er det ikke? Tore Langeland/Christopher Greiner 26 oktober 2010

DAY 1 MONDAY, SEPT

Intelligent. Buildings: Understanding and managing the security risks

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Regulation of Investigatory Powers Act 2000

Comments :Incentives To Adopt Improved Cybersecurity Practices

On premise VS Cloud Video Hosting

Overview TECHIS Carry out security testing activities

The Promise of Industrial Big Data

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Business Intelligence of the Future. kpmg.com

Compliance Guide: ASD ISM OVERVIEW


The butterfly effect. How smart technology is set to completely transform utilities

Internet of Things to Shape Smart Cities - Learnings to date. Damien Callaghan Intel Internet of Things Group

Big Data: Business Insight for Power and Utilities

Summer projects for Dept. of IT students in the summer 2015

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

Self assessment tool. Using this tool

Water Sector Approach to Cybersecurity Risk Management

Big Data and Analytics: Challenges and Opportunities

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

THE Internet is a powerful tool used in all kinds of the

Nokia Networks. security you can rely on

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

Internet of Things: Consumerisation of Technology.

Converged Private Networks. Supporting voice and business-critical applications across multiple sites

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

Onboarding with Saba Cloud

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

The Data Lifecycle: Managing Data through Business. Ewan Willars Friday 27 February

How To Write A Report On The Role Of Information And Communication Technology In The Design And Planning Of Smart Infrastructure

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability

Cyber Threats in Physical Security Understanding and Mitigating the Risk

Development of a Service Robot System for a Remote Child Monitoring Platform

Enterprise Capabilities Descriptions

Dr Louise Schaper, PhD CEO, Health Informatics Society of Australia

RC:

Industrial Internet of Things - Transformation of Products to Services and new Business Models. Frank Schinzel Managing Director Accenture Digital

A Future Without Secrets. A NetPay Whitepaper. more for your money

Transcription:

BSRIA Briefing Smart Data: Silver Lining or Black Cloud? London, 13 th November 2015 Surveillance and the Built Environment Professor William Webster Centre for Research into Information, Surveillance and Privacy (CRISP) University of Stirling #@CrispSurv crisp-surveillance.com william.webster@stir.ac.uk

Surveillance and the Built Environment A surveillance studies perspective, taking into account: How to get the most out of Big (Smart) Data The implications of Big Data for the built environment And, the changing nature of society, human relations and working practices emerging alongside the Big Data revolution

The Surveillance Society Surveillance is ubiquitous, it is everywhere, a defining feature of modern society the surveillance society It is embedded in the information flows generated by new information and communication technologies It is normal, unsurprising, part of everyday life Incorporates the processing of vast quantities of personal data Some surveillance practices/technologies are explicit, such as CCTV or Body Worn Video, others less so, such as tracking and profiling Surveillance is therefore also subtle, discrete and hidden from sight

The Surveillance Perspective Surveillance is often closely aligned to security The surveillance society integrates many industrial sectors sociologists call this the industrial surveillance complex Surveillance impacts on our life chances and shapes our lives Surveillance should not be assumed to be good or bad The surveillance perspective is not anti-surveillance It seeks to understand new power relationships, new working practices, evolving social norms, and human relations The built environment is not immune from the surveillance revolution

Big/Smart Data and Surveillance Big Data (re)use of existing large data sets, often in the public domain to shape services and aid decision making Can include the integration of official data, privately owned data and data defining from social media and the Internet Relies of sophisticated algorithms and data matching The Internet of Things More (and more) devices attached to the internet The Internet interacts directly with the physical environment

Emerging Issues Where does all this information go and how is it used? Who decides what happens to our personal information? Can we influence what happens to our personal information? Are there safeguards to make sure it is not misused? How reliable and robust are Big Data processes? Will our data be held securely? Are such privacy concerns such as these taken into account when commercial opportunities around Big Data are exploited? How does this impact on those responsible for building design, construction and management take account of these issues?

And the Built Environment? The built environment commercial and domestic is evolving to accommodate surveillance Building to incorporate IT infrastructure and a plethora of access points (broadband, fibre optic, wifi) Also, new sensory devises watching, listening, smelling To provide new smart products intelligent lighting, smart energy meters, remote security applications Relevant to domestic property, critical infrastructure & civic engineering The emergence of Smart Cities

A New Dependency on Digital Technologies in the Built Environment This requires those responsible for planning and building design to have access to new skill sets those associated with physical building and engineering, IT requirements and informational security requirements The future of building design and engineering will need to blend these together Implies a high level of information sharing and a requirement to so securely to identify security threats to information

Concluding Comments The emergent surveillance society poses a number of challenges: How should the build environment evolve to accommodate security and informational requirements? Includes cyber security and records management To what extent should privacy concerns be considered? How is this knowledge acquired by those responsible for building design, construction and management? Security and privacy should not be afterthoughts, they should be designed in from the start