|
List Of Tables And Figures |
|
|
xi | |
Preface |
|
xiii | |
Acknowledgments |
|
xxiii | |
|
|
xxv | |
|
|
1 | (16) |
|
What is "cyberspace," and how is it different from the "Internet"? |
|
|
2 | (3) |
|
Is "cyber" the only applicable prefix? |
|
|
5 | (2) |
|
How has cyberspace expanded and evolved? |
|
|
7 | (2) |
|
What are some of the major policy issues affecting cyberspace today? |
|
|
9 | (5) |
|
How is cybercrime different from cyber war, espionage, and terrorism? |
|
|
14 | (3) |
|
2 Welcome to the Internet of Things |
|
|
17 | (17) |
|
What is the "Internet of Things," and how did it emerge? |
|
|
19 | (3) |
|
What are projections for the growth of different types of "things" on the Internet, are they accurate, and why do they matter? |
|
|
22 | (3) |
|
Across Individual users, businesses, and governments, what sorts of IoT functions, devices, and applications are being offered? |
|
|
25 | (2) |
|
What is the "Internet of Bodies"? |
|
|
27 | (3) |
|
What are some benefits of having sensors in connected personal devices? Or in industrial control systems? |
|
|
30 | (4) |
|
3 Securing Everything? Deep Dives into Internet of Things Security |
|
|
34 | (18) |
|
What are some of the foundational security challenges, and benefits, ofloT? |
|
|
35 | (4) |
|
How secure is my smart lightbulb, and why should I care? |
|
|
39 | (2) |
|
How does the scale of insecure loT devices create new risks? |
|
|
41 | (4) |
|
What if my phone could control a supervisory control and data acquisition (SCADA) system---could I really turn the lights out for a whole city? |
|
|
45 | (2) |
|
What are some of the biggest tech companies and industry groups doing about loT security? Is the answer sticking our collective head in the Cloud? |
|
|
47 | (2) |
|
What about experts? What role do security researchers have? |
|
|
49 | (3) |
|
4 Protecting Privacy in an Internet of Everything |
|
|
52 | (18) |
|
|
52 | (3) |
|
How has technology changed our views of privacy? |
|
|
55 | (2) |
|
How much is your private data worth? |
|
|
57 | (2) |
|
Is there a human right to privacy? And what does that have to do with my Facebook profile? |
|
|
59 | (5) |
|
How is IoT impacting policy discussions about Big Data and digital privacy? |
|
|
64 | (2) |
|
Exploring IoT ethics: is a digital companion for your grandparent a good thing? |
|
|
66 | (4) |
|
5 Governing the Internet of Things |
|
|
70 | (23) |
|
How can we regulate the IoT, and even if we could, is that a good idea? |
|
|
71 | (4) |
|
Can self-organization work in the IoT? |
|
|
75 | (3) |
|
What is the US approach to regulating the IoT? |
|
|
78 | (7) |
|
How are nations regulating the IoT? In particular, how will the EU's General Data Protection Regulation (GDPR) impact IoT governance? |
|
|
85 | (4) |
|
How can we modernize, and enforce, the international rights to privacy and security within the IoT? |
|
|
89 | (4) |
|
6 Analogizing the Internet of Things |
|
|
93 | (16) |
|
What can public health teach us about securing the IoT? |
|
|
94 | (3) |
|
What if we took an ecosystem-based approach to IoT governance? |
|
|
97 | (2) |
|
How much would it help matters if more firms began treating cybersecurity as a corporate social responsibility? |
|
|
99 | (5) |
|
Sustainable cybersecurity: could leveraging tools from the green revolution lead to a new era of secure IoT devices? |
|
|
104 | (5) |
|
7 How Can We Do Better? Finding Cyber Peace in the Internet of Things |
|
|
109 | (20) |
|
What is "cyber peace," and how does it apply to the IoT? |
|
|
109 | (3) |
|
Taking out the crystal ball---let's envision the state of the IoT in 2050; what do current trend lines reveal? |
|
|
112 | (4) |
|
Deus ex Machina---can technology save us from our hyperconnected fate? |
|
|
116 | (2) |
|
What more should companies, governments, and the international community be doing to safeguard the loT? |
|
|
118 | (5) |
|
What can I do? We need you! Take control, demand better, and be a responsible netizen |
|
|
123 | (3) |
|
|
126 | (3) |
Notes |
|
129 | (88) |
Index |
|
217 | |