@article {1067, title = {Big Data and Individual Privacy in the Age of the Internet of Things}, journal = {Technology Innovation Management Review}, volume = {7}, year = {2017}, month = {04/2017}, pages = {12-24}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {The availability of {\textquotedblleft}big data{\textquotedblright} and {\textquotedblleft}smart{\textquotedblright} products are credited with advancing solutions to complex problems in medicine, transportation, and education, among others. However, with big data comes big responsibility. The collection, storage, sharing, and analysis of data are far outpacing individual privacy protections, whether technological or legislative. The Internet of Things (IoT), with its promise to create networks of networks, will magnify individual data privacy threats. Recent data breaches, exposing the personal information of millions of users, provide insight into the vulnerability of personal data. Although seemingly expansive, there are core individual privacy issues that are central to current big data breaches and anticipated IoT threats. This article examines both big data and the IoT using examples of data privacy breaches to illustrate the impact of individual data loss. Furthermore, the article examines the complexity of tackling technological and legislative challenges in protecting individual privacy. It concludes by summarizing these issues in terms of the future implications of the IoT and the loss of privacy. }, keywords = {big data, cybersecurity, data breaches, Internet of Things, IOT, privacy, smart devices}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/1067}, url = {http://timreview.ca/article/1067}, author = {Mackenzie Adams} } @article {1065, title = {Editorial: Cybersecurity (April 2017)}, journal = {Technology Innovation Management Review}, volume = {7}, year = {2017}, month = {04/2017}, pages = {3-4}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {anomaly detection, automation, big data, cybersecurity, exploration, Hypponen{\textquoteright}s law, Internet of Things, IOT, legislation, medical devices, privacy, real time, risk assessment, security engineering, smart devices, value proposition, vulnerabilities}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/1065}, url = {http://timreview.ca/article/1065}, author = {Chris McPhee and Michael Weiss} } @article {1066, title = {The Internet of (Vulnerable) Things: On Hypponen{\textquoteright}s Law, Security Engineering, and IoT Legislation}, journal = {Technology Innovation Management Review}, volume = {7}, year = {2017}, month = {04/2017}, pages = {5-11}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {The Internet of Things (IoT) and the resulting network-connectedness of everyday objects and appliances in our lives bring not only new features and possibilities, but also significant security concerns. These security concerns have resulted in vulnerabilities ranging from those limited in effect to a single device to vulnerabilities that have enabled IoT-based botnets to take over hundreds of thousands of devices to be used for illegal purposes. This article discusses the vulnerable nature of the IoT {\textendash} as symbolized by Hypponen{\textquoteright}s law {\textendash} and the parts both manufacturers and consumers play in these vulnerabilities. This article makes the case for the importance of security engineering for IoT manufacturers, highlights some significant issues to help consumers address these vulnerabilities, and argues for legislation as perhaps the only reliable means of securing the Internet and its connected devices.}, keywords = {consumers, cybersecurity, Hypponen{\textquoteright}s law, Internet of Things, IOT, legislation, manufacturers, security engineering, smart devices, vulnerability}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/1066}, url = {http://timreview.ca/article/1066}, author = {Mikko Hypponen and Linus Nyman} }