NGOs in Human Rights, Peace and Development
4.5K views | +0 today
Follow
NGOs in Human Rights, Peace and Development
Your new post is loading...
Your new post is loading...
Rescooped by Nevermore Sithole from Education and Training
Scoop.it!

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy

The Hierarchy of IoT “Thing” Needs | Internet of Things | CyberSecurity | Privacy | NGOs in Human Rights, Peace and Development | Scoop.it

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.

 

The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Router

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

 


Via Gust MEES, ismokuhanen
more...
Gust MEES's curator insight, February 20, 2016 10:48 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Volkmar Langer's curator insight, March 3, 2016 4:36 AM

To define an IoT “Thing,” I’m going to employ Maslow’s hierarchy of needs — that well-known human psychology paradigm typically displayed in the shape of a pyramid, with the most fundamental human needs (physiological needs like air, food and water) at the bottom and rising to the most esoteric needs (self-actualization or expression of full potential) at the apex.


The reason to think this way is to enable the use of familiar paradigms when “Thing” architecture and interaction models are designed. For example, consider this simple question: “What should you consider when purchasing an IoT thing?” With this new thinking, the answer becomes: “The same stuff you consider when you hire a new employee.” Trustworthiness, reliability and ability to work well with others form a great basis for consideration in both cases.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Rescooped by Nevermore Sithole from 21st Century Learning and Teaching
Scoop.it!

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage

Forensic scientist identifies suspicious 'back doors' running on every iOS device | Privacy | Cyberespionage | NGOs in Human Rights, Peace and Development | Scoop.it
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


Apple is dishing out a lot of data behind our backsIt’s a violation of the customer’s trust and privacy to bypass backup encryptionThere is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.Much of this data simply should never come off the phone, even during a backup.Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminalsOverall, the otherwise great security of iOS has been compromised… by Apple… by design.
Learn more:
http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/
http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

Via Gust MEES
more...
Gust MEES's curator insight, July 21, 2014 9:26 AM
  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Gust MEES's curator insight, July 21, 2014 9:31 AM
During his talk at HOPE/X Jonathan Zdziarski detailed several undocumented services (with names like 'lockdownd,' 'pcapd,' 'mobile.file_relay,' and 'house_arrest') that run in the background on over 600 million iOS devices.


Zdziarski's questions for Apple include:

  • Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?
  • Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone?
  • Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?
  • Why is there still no mechanism to review the devices my iPhone is paired with, so I can delete ones that don’t belong?

... and his last slide (page 57 of the PDF) sums it up nicely: 


  • Apple is dishing out a lot of data behind our backs
  • It’s a violation of the customer’s trust and privacy to bypass backup encryption
  • There is no valid excuse to leak personal data or allow packet sniffing without the user’s knowledge and permission.
  • Much of this data simply should never come off the phone, even during a backup.
  • Apple has added many conveniences for enterprises that make tasty attack points for .gov and criminals
  • Overall, the otherwise great security of iOS has been compromised… by Apple… by design.

Learn more:


Rescooped by Nevermore Sithole from Rights & Liberties
Scoop.it!

Netizen Report: Israel Asserts Right to Search Email

Netizen Report: Israel Asserts Right to Search Email | NGOs in Human Rights, Peace and Development | Scoop.it

Israel’s Attorney General affirmed that Israel's Security Agency can legally demand to search of the contents of foreigners’ email accounts if they wish to enter Israel. The Association for Civil Rights in Israel petitioned the Justice Ministry to overrule the policy after a Palestinian-American woman was denied entry into the country last year for refusing to comply with a search request. The Attorney General’s office said that the policy will only be applied when “suspicious or pertinent information has been identified.” While travellers are not expected to give up their passwords, those who refuse to allow security officials access to their email may be denied entry to the country.


Via dMaculate
Nevermore Sithole's insight:

Gross infringement of personal privacy, human rights and self-expression.

more...
No comment yet.
Rescooped by Nevermore Sithole from Eclectic Technology
Scoop.it!

What is Privacy?

What is Privacy? | NGOs in Human Rights, Peace and Development | Scoop.it

"Earlier this week, Anil Dash wrote a smart piece unpacking the concept of “public.” He opens with some provocative questions about how we imagine the public, highlighting how new technologies that make heightened visibility possible. For example,

Someone could make off with all your garbage that’s put out on the street, and carefully record how many used condoms or pregnancy tests or discarded pill bottles are in the trash, and then post that information up on the web along with your name and your address. There’s probably no law against it in your area. Trash on the curb is public."


Via Beth Dichter
more...
Beth Dichter's curator insight, September 1, 2014 6:38 PM

Is your definition of privacy different from your students definition? Our world is changing quickly and the concept of privacy is also changing. This post by Danah Body explores this issue and will provide ideas that you may want to use with students in your classes. As this school year commences the need to understand the issue of privacy, esp. online where so much information is gathered about each of us, often without us being aware of it, is important for students to understand.

Rescooped by Nevermore Sithole from Technology And The Classroom
Scoop.it!

Privacy Papers for Policy Makers - 2012

2012_Privacy Papers for Policy Makers - Free download as PDF File (.pdf), Text File (.txt) or read online for free.

Via Kathy E Gill
Nevermore Sithole's insight:
Privacy Papers for Policy Makers - 2012
more...
Kathy E Gill's curator insight, July 11, 2013 4:33 AM

Future of Privacy Forum, Nov 2012 - 7 research and analytical essasy on privacy issues [Scribd]

* Bridging the Gap Between Privacy and Design

* How Come I’m Allowing Strangers to go Trough My Phone? Smart Phonesand Privacy Expectations

* Mobile Payments: Consumer Benefts & New Privacy Concerns

* Privacy by Design: A Counteractual Analysis o Google and Facebook Privacy Incidents

* Te ‘Re-identifcation’ o Governor William Weld’s Medical Inormation: A CriticalRe-examination o Health Data Identifcation Risks and Privacy Protections, Ten and Now

* Smart, Useul, Scary, Creepy: Perceptions o Online Behavioral Advertising

* Will Johnny Facebook Get a Job? An Experiment in Hiring Discrimination via OnlineSocial Networks