Internet of Things
Internet of Things
Internet of things (IoT) is a term that describes a network of physical devices that
communicate and share data through data protocols and network protocols. IoT allows separate
devices to collect data and perform tasks autonomously which have vast potential applications
within almost any industry (IBM). However, with the rise of IoT devices in a multitude of
industries, more social and ethical issues emerge, potentially threatening the convenience,
privacy, safety, and well-being of its users. IoT systems connected through the internet that have
weak security are vulnerable to hackers since they can easily gain access to devices in insecure
networks. This allows the hacker to gain control over the device and let personal data be stolen
or destroyed. Because of this, upholding data integrity, security, and the privacy of user data
must be a priority for businesses or organizations that implement IoT devices. This essay will
discuss the social and ethical issues stemming from compromise of integrity of data, security
and privacy as well as common strategies used to uphold them.
Integrity of data - as in the accuracy and completeness of user or environmental data
collected and shared in an IoT system - can be easily compromised. Data corruption can be
caused by cyber attacks, hardware failures, and human error among other things (Océane
Mourisard). Loss or inaccuracy of data can lead to many issues, especially in applications where
accurate and complete data is absolutely crucial such as healthcare and finance. In IoT
applications in these fields, autonomous decision-making based on inaccurate data can lead to
significant consequences such as health risks, safety risks, financial losses, or security risks for
its users. For example, an IoT device that monitors blood sugar levels of patients with diabetes
and administers insulin as needed requires accurate data to ensure that the right dosage of
insulin is injected. Hardware failures or human error in configuring the device could lead to
errors in monitoring sugar levels and administering insulin, endangering the user. Some
common strategies for protecting accuracy and completeness of data in IoT systems are, data
validation and verification, performing regular data backups, and implementing error handling
mechanisms. Implementing data validation checks to verify the accuracy and consistency during
data entry helps to ensure that the data collected passes through predefined rules or constraints.
Regular data backups having recovery plans ensures that important data is stored in case of
accidental hardware failures or cyber attacks. Meanwhile, implementing error handling
mechanisms can help to easily detect and respond to data integrity issues, preventing data
errors (Team Atlan).
Security of an IoT system refers to protecting the hardware and software components as
well as data from outside threats. IoT devices are usually connected in networks, so if one is
compromised, it can potentially trigger issues across the whole system. Security vulnerabilities,
such as weak passwords, lack of regular patches and updates, insufficient data protection, etc.
create opportunities for hackers to access and steal data or inject malware (Thales). Weak
security can lead to serious consequences for users, especially in IoT devices that collect
personal information from its users. Weak security can result in unauthorized access to
sensitive, personal information such as age, location, health, etc., which hackers or corporations
exploit for profit. This could also lead to less consumer trust or even fear of surveillance towards
IoT in general. For example, a children's smart toy named “Cayla the Doll”, which could hear
and answer questions by accessing the internet, had insecure communication and storage. This
allowed people to access recordings of children’s voices stored in the doll’s memory as well as
instruct it to speak anything, endangering the privacy and safety of children. To prevent security
vulnerabilities, more security strategies are being more commonly used. Biometric
authentication, two-factor authentication, multi-factor authentication, or digital certificates help
to prevent unauthorized access to IoT devices. Regular patches and updates to the firmware help
prevent hackers from exploiting security issues or bugs. Data encryption prevents unauthorized
people from seeing the information in the case of a security breach or eavesdropping attacks
(Thales).
Maintaining confidentiality of customer data is also a large issue. Many IoT devices are
able to collect personal information of its users, which corporations have an ethical and social
responsibility to keep confidential. However, it is easy for corporations to overlook this and
exploit their easy access to customer data and sell it for profit or to manipulate customer
decisions towards specific products/services. Additionally, personal data can be stolen by those
with unauthorized access, compromising user’s privacy. This raises ethical concerns regarding
customer’s lack of consent and autonomy over personal information. It also can cause greater
risk to users if people with malicious intent are able to access private data, as it might make
them more vulnerable to identity theft or extortion. To ensure that individuals retain autonomy
over their personal information, companies must be transparent about data collection, include
an option to not collect specific data, and implement security measures to prevent unauthorized
access (IoT.Business.News).
In conclusion, IoT can bring benefits and create opportunities in numerous applications.
However, it also brings social and ethical challenges related to data integrity, security, and
confidentiality. As IoT continues to expand, businesses and organizations that use it must
prioritize protecting user data, implement strategies to mitigate security risks, and be
transparent with data collection to ensure that the technology is both secure and ethically
responsible.
Works Cited:
IBM. “Internet of Things.” Ibm.com, 12 May 2023,
www.ibm.com/topics/internet-of-things. Accessed 27 Sept. 2024.
IoT.Business.News. “The Ethical Implications of the Internet of Things (IoT).” IoT
Business News, 9 Nov. 2023,
iotbusinessnews.com/2023/11/09/50511-the-ethical-implications-of-the-int
ernet-of-things-iot/. Accessed 28 Sept. 2024.
Océane Mourisard. “IoT Data Integrity Validation: A Security Imperative.” Synox,
12 Oct. 2023,
www.synox.io/en/smart-security/iot-data-integrity-validation/. Accessed 27
Sept. 2024.
Team Atlan. “7 Data Integrity Best Practices You Need to Know.” Atlan.com, Atlan,
4 Aug. 2023,
atlan.com/data-integrity-best-practices/#what-are-the-best-practices-for-da
ta-integrity. Accessed 27 Sept. 2024.
Thales. “IoT Security Issues in 2022: A Business Perspective.” Thales Group, 9
Apr. 2021,
www.thalesgroup.com/en/markets/digital-identity-and-security/iot/magazi
ne/internet-threats. Accessed 27 Sept. 2024.