This section contains material that is meant to support lecturers and provide ideas for interactive discussions and case-based analysis of the topic under consideration.
The mass deployment and adoption of IoT toys raise real (and not hypothetical) security and privacy concerns. These concerns arise from the design of these devices, which often include microphones and/or cameras, and the way they operate, such as their ability to connect to Bluetooth and/or Wi-Fi, GPS capabilities, collection of vast quantities of data about users and owners, storage of collected data in the cloud, and sharing of collected information with manufacturer and third parties.
Please review the following:
Answer these questions:
National data protection laws can be accessed on this website that has a searchable database of worldwide legislation.
Students should be randomly assigned to a group before the class to enable them to complete the assignment before the class meets. Each group should be randomly assigned a country.
Students should conduct research on the data protection laws of their assigned country. They should identify the following:
Privacy, data aggregation, security and surveillance are prominent themes in literature and film. In 2013, Dave Eggers, wrote The Circle, a dystopian society where people are encouraged to "go transparent" as a way to live an "authentic existence." This full transparency involved, among other things, the 24/7 surveillance of a person broadcast to viewers in real-time. The novel was adapted into a movie in 2017.
Please read the book or watch the movie. Answer the following questions:
The Electronic Privacy Information Center (EPIC) Online Guide to Practical Privacy includes a variety of anonymity-enhancing tools. Instruct students to review these tools.
Have them access and utilize one of the tools. Students should be prepared to discuss their observations and findings concerning their chosen tool's protection of user anonymity and privacy.