ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Privacy and Security Reflection: Implications of Smart Sensor and Wi-Fi Networks

Verified

Added on  2023/06/10

|11
|3328
|66
AI Summary
This article discusses the personal and ethical implications of the proposed Government's Smart Sensor and Wi-Fi Networks on privacy and security. It covers the types of people affected, behavioural changes, and steps to ensure the security and privacy of digital identity while operating mobile devices in this environment. The subject is privacy and security, and the course code and name are not mentioned. The university and college are also not mentioned.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: PRIVACY AND SECURITY REFLECTION
Privacy and security reflection
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1PRIVACY AND SECURITY REFLECTION
Task 1: Discussion of the personal and ethical implications for the privacy of the
proposed Government’s Smart Sensor Network.
Task 1a: The types or categories of people affected by this proposal.
According to me sensor network is a system which responds and senses some type of
input from both the corporal or ecological conditions outputs an electrical signal that is
transmitted to a controller for additional processing and I believe that the Smart State Plan
provided by the Australian state government help all the sections of the society to analyse the
information security and privacy implications on their business (De Gante, Aslan & Matrawy,
2014). The system effects standard is aimed at serving the medical, industrial and ecological
challenges. Sensor applications in many fields such as smart power grids, smart buildings and
smart industrial process control significantly contribute to the more efficient use of resources
(Magno et al., 2015). Security and surveillance use sensor networks facilities in the military
and defence area. Sensor networks are used in multiple ways in the healthcare sector such as
tracking the activities of patients and doctors, drug management and diagnostic applications. I
believe the sensory networks are also used for structural strength monitoring of big civil or
urban structures. The advanced sensory networks are effectively used in mesh networking
(Ilyas & Mahgoub, 2016). I believe that the concept of smart cities can be achieved with the
help of sensory networks.
Task 1b: What behavioural changes you might expect to see from normal citizens?
According to me, sensory networks have a direct impact on the behaviour of people.
Intelligently planned systems help in cumulating worker efficiency, energy cost savings and
organizational savings. The criminal activities can also be checked with the active use of the
different types of sensory networks. Citizens can be provided more security by installing
Document Page
2PRIVACY AND SECURITY REFLECTION
more cameras to read license plates and track the vehicles who are disobeying the traffic
regulations. Investigation of any crime can be checked by the use of mobile sensors as it
involves the packing and retrieval of sensed data (Lau, 2015). Application of sensory network
is used to support disabled people providing harmless, safe surroundings. The networks can
allow the user to control many features or automate them and the environment can also be
checked by the smart home system sensory network to ensure security and alert people when
there is some insecure condition.
Task 1c: Would you expect to see changes in individual behaviours, such as choice of
activities, changes in time schedules, etc.
I believe that there will be lots of individual behavioural changes due to the extensive
use of sensory networks which provide great facilities to the disabled persons who do not
have arms or hands. Due of their inability, they fail to reach the key to open and lock the door
of their house but with the help of advanced systems, they can recognize the person who
approaches to the door and decide whether to open or not open the gate according to the
identity of the person (Ransing & Rajput, 2015). The applications of several sensory
networks had a direct impact on the life of citizens of Singapore providing them with more
security and guide them for the overall improvement of their nation. I think the security of the
people has increased to a greater extent with the use of systems such as advanced cameras in
every corner of the streets but it also involves few ethical issues like hacking which needs to
be sorted so that the efficiency of the system is maintained. The other prime ethical issues are
the data of the security of the citizens. The main issue is the safety of this information
collected by the smart sensors for the citizens (Jin et al., 2014). The security of that data is in
doubt as this might can be hacked. Successful hacking of those information can expose the
susceptibility of any individual citizen to the hackers. I think the extensive use of sensory
Document Page
3PRIVACY AND SECURITY REFLECTION
networks makes the city safer at late nights. It helps to maintain the protocols and develop a
perfect approach to face any kind of situation according to the requirement. I believe the
automobile users install wireless connectivity in their cars which enable communications
both with roadside base stations and between vehicles for the purposes of security, driving
assistance and entertainment. Summarising the topic, I would like to say that sensory
networks provide the most advanced monitoring solutions helping them to be more secure.
Task 2: Discuss the personal and ethical implications for the privacy of the proposed
Government’s Smart Wi-Fi Network.
Task 2a: The types or categories of people affected by this proposal
According to me the Wi-Fi technologies are extensively adopted and play a
significant role in increasing the life quality of all types of people as it is helpful
in empowering the city with better services and facilities. I think smart waste management,
smart security and smart lighting in public places are relying on cloud Wi-Fi infrastructure.
The smart Wi-Fi network helps all the citizens who can’t afford internet facilities at home as
they can enjoy a free internet connection and use them for various types of purposes like
access in public services, searching for jobs and personal entertainments (Budde, 2013). I
think that Wi-Fi infrastructure helps the people for more online shopping rather the
conventional shopping techniques as people might like to enjoy various services at sitting in
their home. There can be many changes which can be observed by the effective application of
free Wi-Fi hotspots such as people can have much improved travelling plans with real-time
information about transports by using the Wi-Fi hotspots (Potts, 2014). Public Wi-Fi access
can have a huge impact on the tourism industry as tourists always want to stay associated
with their family and friends share their moments on their social networks and check the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4PRIVACY AND SECURITY REFLECTION
travel information. As a result, they are more incentivized to travel to such a location having
free public Wi-Fi.
Task2b: What behavioural changes you might expect to see from normal citizens using
their mobile devices in the CBD?
I believe that the application of the Wi-Fi hotspots will be having many behavioural
changes because every nation with free Wi-Fi hotspots would be advantageous both for the
travellers who would appreciate internet connection without roaming charges and also for the
local public for facing a large profit from enlarged levels of tourism. I believe that student
and teachers can also effectively use Wi-Fi enabled systems for educational purposes and the
institutions can also develop advanced education methods based on collaborative and
interactive knowledge. I think there will be significant improvements in the sales in retail
stores, restaurants, bars, salons, hotels and shopping malls who provides free Wi-Fi
connection to their customers.
Task 2c: Would you expect to see changes in individual behaviours, such as choice of
activities, changes in time schedules?
According to me, there will be many behavioural changes among the peoples for
using the internet extensively like instant chat or email their family and friends all around the
globe. International friendships will be made easier, online dating will be more practised and
people should be able to create their own websites according to the requirements. For me, the
main problems with public Wi-Fi are the tremendous number of risks that go along with
those networks; I guess we should not allow the public internet connection to get auto-
connected to our systems as it may have a negative impact on the important data and
Document Page
5PRIVACY AND SECURITY REFLECTION
information on our system. After using the free network, the connection should be interrupted
so that there is no chance for any external threats to access the system (Cheng et al., 2013).
Task 2d: What are the implications for you If you had sensitive information on your
mobile device that you did not want to share?
I believe the file sharing options on the mobile phones should always be activated so
that when needed they can be deactivated and made for use. I believe that the biggest risk of
using free Wi-Fi is security as the hackers positions themselves between me and my
connection points. I would personally recommend the habit of using a VPN connection when
connecting to an unsecured connection like a public Wi-Fi hotspot. It will provide us with
more security from the external threats even if the hacker position himself between the two
systems hence our data here will be strongly encrypted. We should preferably use the
websites with https in front of the URL for safety reasons. The free connection should be
deactivated when we are not accessing the internet as it will help them to restrict the
unauthorized access of the threats.
Task 3: If you were visiting the State Capital after the Smart State Plan has rolled out,
do you think that the use of a digital identity would assist you to maintain your privacy
while using your mobile phone or devices during your visit? Discuss the reasons for
your answer
According to me the digital identity one an individual is a set of attributes allowing a
third party to asses and confirm the authenticity of the individuality in question and the
claims being made by it. It is the intersection of identity and technology and the most
defining factor in digital identities is that they’re permanent (Adelman & Chadwick, 2014). I
believe that the role of digital identity is progressively an attention of the policy negotiations
Document Page
6PRIVACY AND SECURITY REFLECTION
across different countries with a number of governments suggesting or implementing national
digital identity programmes, governments intends to provide a single digital identity to every
citizen of a particular nation for more precise and efficient delivery of government facilities.
According to me the use of digital identity would assist me to maintain my privacy while
using my personal devices in many ways (Mellmer et al., 2014). I believe that every industry
needs an identity declaration for its commercial enterprises such as e-Commerce, online
banking and trading. It helps to keep our uniqueness and maintaining the infrastructure of the
country in a secure way as we can see that identity burglary and other online criminal activity
is a rising anxiety for citizens, governments and enterprises as financial, emotional and
practical costs are at stake and growing every year. Digital identities are easy to exploit and
highly profitable, the other importance of digital identity includes its helping abilities in
businesses to understand their clients better without interacting with them face-to-face and
establish lasting relationships with them (Grassi, Garcia & Fenton, 2017). It is useful in
attracting and retaining customers and delivering new levels of value and growth. I believe
the use of digital identity is helpful in tracking data breaches and the exposure of personal
information. The fundamental value to one’s digital identity is Trust. In the real world I found
that an individual is able to effortlessly authorize their uniqueness by presenting documents
such as an ID or driver’s license that are issued by authorities based on verifiable information
provided by that individual and these authorities are reliable the documents they issue can be
used by the individual to verify their identity with many diverse organizations that might be
offering services.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7PRIVACY AND SECURITY REFLECTION
Task 4: What steps do you think that you could take to ensure the security and privacy
of your digital identity while operating your mobile device(s) in this environment?
Discuss each step that you would take along with its advantages and disadvantages
According to me, there are several effective ways in which our personal data can be
kept securely on our mobile devices (Mu, Cui & Rao, 2013). Cyber criminals are able to
access our personal information online through there unethical methods to stop that we need
to secure our systems by using a strong password with special characters but there is a
drawback of that procedure as forgetting that password will be creating more complexity for
us (Baym, 2015). Choosing a unique security question in any social media platforms provides
security to the accounts but forgetting those lead us to the password recovery mode which a
time-consuming task is (Ion, Reeder & Consolvo, 2015). I would recommend of modern
platforms like Gmail provides a double verification process which is considered a very safe
and unique method of data protection but it has a disadvantage of accessing two devices at a
time. I believe that our mobile phones should be secured with both internal and external
security software which helps to restrict the unauthorized users in our system but it is often
found that the software decreases the efficiency of the mobile as it slows down the overall
performance (Mikhaylov et al., 2013). We should avoid clicking unfamiliar links in spite of
knowing its importance in order to protect the data on a long-term basis. I think that the
practice of using private browsers should be encouraged in spite of knowing that the data
could never be retrieved. We should avoid giving our banking details in an e-commerce
transaction from our mobile as they are a disadvantage of money deductions in the future.
Automatic software updating should be activated on our mobile phones which are very much
recommended for various types of security reasons. Installation of the Operating system
updates is necessary as it updates the in-built security systems of our mobiles but it may have
Document Page
8PRIVACY AND SECURITY REFLECTION
a negative impact such as the improper functioning of any software due to compatibility
issues. I believe that we all should read the policies of the software before installing them in
our mobile phones it may be a time-consuming affair but it is important to know how it uses
the information and whether it delivers information to third parties or not. I would like to
recommend having different passwords for banking, social media, email even if it is difficult
to remember them as a hacker only needs to figure out just one password to gain access to all
the forums. I think we should all set up login notifications in our mobile phones for platforms
like Facebook and Gmail which will allow us to receive a text message whenever an
unrecognized IP address logs in to the account.
Document Page
9PRIVACY AND SECURITY REFLECTION
Reference
Adelman, W., & Chadwick, M. (2014). U.S. Patent No. 8,904,040. Washington, DC: U.S.
Patent and Trademark Office.
Baym, N. K. (2015). Personal connections in the digital age. John Wiley & Sons. Personal
connections in the digital age. John Wiley & Sons.
Budde, M., Köpke, M., Berning, M., Riedel, T., & Beigl, M. (2013, September). Using a
2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication.
In Proceedings of the 2013 ACM international joint conference on Pervasive and
ubiquitous computing (pp. 221-224). ACM.
Cheng, N., Wang, X. O., Cheng, W., Mohapatra, P., & Seneviratne, A. (2013, April).
Characterizing privacy leakage of public wifi networks for users on travel.
In INFOCOM, 2013 Proceedings IEEE (pp. 2769-2777). IEEE.
De Gante, A., Aslan, M., & Matrawy, A. (2014, June). Smart wireless sensor network
management based on software-defined networking. In Communications (QBSC),
2014 27th Biennial Symposium on (pp. 71-75). IEEE.
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special
Publication, 800, 63-3.
Ilyas, M., & Mahgoub, I. (2016). Smart Dust: Sensor network applications, architecture and
design. CRC press.
Ion, I., Reeder, R., & Consolvo, S. (2015, July). "... No one Can Hack My Mind": Comparing
Expert and Non-Expert Security Practices. In SOUPS (Vol. 15, pp. 1-20).

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10PRIVACY AND SECURITY REFLECTION
Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework for
creating a smart city through internet of things. IEEE Internet of Things journal, 1(2),
112-121.
Lau, Y. C. L. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore.
Magno, M., Polonelli, T., Benini, L., & Popovici, E. (2015). A low cost, highly scalable
wireless sensor network solution to achieve smart LED light control for green
buildings. IEEE Sensors Journal, 15(5), 2963-2973.
Mellmer, J. A., Young, R. T., Perkins, A. D., Robertson, J. M., Sabin, J. N., Mcdonald, M.
C., ... & Carter, S. R. (2014). U.S. Patent No. 8,631,038. Washington, DC: U.S.
Patent and Trademark Office.
Mikhaylov, D., Zhukov, I., Starikovskiy, A., Kharkov, S., Tolstaya, A., & Zuykov, A. (2013,
November). Review of malicious mobile applications, phone bugs and other cyber
threats to mobile devices. In Broadband Network & Multimedia Technology (IC-
BNMT), 2013 5th IEEE International Conference on (pp. 302-305). IEEE.
Mu, J., Cui, A., & Rao, J. (2013, July). Android mobile security–threats and protection.
In Proceedings of international conference on computer, networks and communication
engineering (ICCNCE 2013) (pp. 23-24).
Potts, J. (2014). Economics of public WiFi. Australian Journal of Telecommunications and
the Digital Economy, 2(1).
Ransing, R. S., & Rajput, M. (2015, January). Smart home for elderly care, based on wireless
sensor network. In Nascent Technologies in the Engineering Field (ICNTE), 2015
International Conference on (pp. 1-5). IEEE.
1 out of 11
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]