Me, us, him and those internet

as if Paul Rosenzwig, George Washington University School of Law

Writing in Forbes magazine, Tim Sparapani posted that the Internet of Things is actually made up of four different groups of active products. He calls my Internet, our Internet, his and those internet. How serious should we think about our privacy and civil liberties?

Smart clock and e-mountain bike.
The Internet and I are Internet tools that collect information on individuals and groups. (Image: riopatuca / Shutterstock)

The Internet and I are Internet tools that collect information on individuals and groups. Internet-enabled automatic insulin pump is an example of the Internet for me, and Nest, a thoughtful home architect, collects information about the whole family and becomes part of our Internet.

An example of the Internet would be the new tire pressure sensor in cars: a smart device connected to the Internet that speaks when the air pressure in one tire is low. And, at the very least, such a device does not collect any known information about the driver. Limited to vehicle and safety assessment only.

This is a copy of the video series Monitoring status – great information, freedom and you. Check it out now on Wondrium.

Civil liberties

Matters of privacy and civil liberties around the Internet vary, depending on the type of Internet one is talking about. Let’s start by thinking about me and our Internet.

In such collection systems, at least three privacy questions may be included: one – who owns or controls the data. Two: What are their responsibilities in protecting that information? And the three – what are they allowed to do with it?

Law and contract law

The claim of ownership / control is generally established by contract or law. Under the terms of the contract, the supplier of the device will certainly claim ownership of the information. As a result, Nest and Google generally think they can process more or less information about a thermostat.

In that case, they are also responsible for the security of this data.

Learn more about the modern concept of privacy.

Privacy-Protection Products

Image of the person pressing the buttons on the laser printer panel.
A study by Columbia University found that Helett Packard laser printers were vulnerable to hacking. (Image: Cactus G / Shutterstock)

A few years ago, US Chamber of Commerce officials were surprised to learn that their office printer was talking to a Chinese computer and pouring Chinese characters.

Similarly, a Columbia University study found that tens of millions of Howlett Packard laser printers were vulnerable to hacking. Even your cloud-based tutor may have been hacked.

One might ask, how can this be? That happens, the producers manage the information they collect on their own preferences. And some don’t care if the tire pressure information is misused or misused. It does not affect them.

However, it seems appropriate to ask a more sophisticated question: Why aren’t competitive markets producing more privacy products? Traditionally, we expect the word Nest to emerge, giving us more privacy and security if another company calls it Safety. Why hasn’t something happened yet on the Internet?

Industrial Economics

The answer, like many things, lies in the industrial economy. At present, Internet manufacturers may not have sufficient economic incentives to build a better product.

Personal information is a commodity – an economic product that can be bought in the private market. The sale of goods may have benefits for both the buyer and the seller. However, the sale can sometimes affect third parties who are not part of the transaction.

Third-party results

The Internet of Things is full of these third-party products. Some of the results are excellent. When data is collected on a home’s energy consumption, for example, it uses other people on the same network, whose energy efficiency can be improved, or who have more energy for their own consumption.

In fact, in some ways, almost every piece of information collected in any cyber environment adds to the overall knowledge base – theoretically reducing operational costs.

Identification result

But data collection can also have negative consequences. One of them goes by the name of the result of twisting. For example, if we gather more information about health, then insurers may choose only the healthier guidelines – turning their actions into a for-profit business and leaving gaps in the market.

A discount can mean a price increase for others who do not have a good relationship or are undesirable in their business.

Pricing problem

The second negative effect is due to pricing problems. We want people who produce or sell a product to consider all production costs. But they often count on their own expenses. Otherwise, how do you calculate profits?

However, in the case of data breaches in the new Internet market, the cost of goods is likely to fall on the consumer.

Learn more about how geographic location data is collected.

There is no liability of the manufacturer

Now, generally speaking, when the software fails to intervene, or when the service provider fails to interrupt the malware attack – there is no clear way for the Internet manufacturer to handle the costs of those failures.

In a perfect economy, one pays more for an Internet-enabled tire, and the manufacturer builds better privacy and security within it. In the imperfect world, the tire gauge is cheap, making it easy to buy. But consumers experience costs in terms of lost security and privacy.

Common questions about me, us, him and those on the Internet

Q: What is mine and our internet?

Internet From me and from us They are Internet tools that collect information on identifiable individuals, such as the Internet-enabled automatic insulin pump and nest.

Q: What is the effect of conversion?

The effect of transfer For example, when we collect information about health, then insurers choose to insure only those who are healthy – turning their actions into a for-profit business, leaving gaps in the market.

Q: Who owns or controls the data collected by gadgets like Nest?

The claim of ownership / control is generally established by contract or law. Under the terms of the contract, the supplier of the device claims for sure Ownership The information.

Keep reading
The ancient dream of free internet and information
Monitoring ‘How and Why’ in the US
Looking back – and forward – as the Internet turns 50

Leave a Comment