-
Essay / Privacy Issues in a Smart City
Table of ContentsEthical and Social IssuesLegal IssuesProfessional IssuesA city is described as smart when it benefits from high technological advancements. These technological advancements include intelligent transportation systems, smart energy grids, sensor networks, cloud computing, logistics management system with the desire to use digital technology to create a better life for citizens. Thite (2011) interprets the term "smart city" as a creative city, "aiming to nurture a creative economy through investment in quality of life which, in turn, attracts knowledge workers to live and work in cities "intelligent" and as such is part of the "smart city". category of intelligent people in Meijer and Bolivar (2016). An example of using smart people is given in the municipality of Utrecht, where City Talks were launched on the environmental strategy to be adopted by the city (Eurocities, 2016b). Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”?Get the original essayAccording to Meijer and Bolívar's (2016) overview, there are generally three types of smart cities identified: those that use advanced technologies smart (technology-driven), smart people (people-focused), smart collaboration (governance-focused) or a combination of all three. Generating, processing, analyzing and sharing large amounts of data about city infrastructure, services and citizens is at the heart of creating smart cities. Indeed, smart city technologies aim precisely to make cities data-driven: enabling urban systems and services to react and act on data, preferably real-time data (Kitchin, 2015a). It is therefore no coincidence that the desire to create smart cities fits with the ongoing data revolution (Kitchin, 2014a). This report focuses on privacy issues regarding smart cities, such as ethical, legal, social, and professional issues. Ethical and Social Issues There are clearly a number of ethical issues that arise from the creation of the smart city. Using the following ethical theories: the deontological approach asserts that actions, regardless of the solution, are right or wrong, without compromise; and the utilitarian approach focuses on how the ends justify the means (Shakib and Layton, 2014). Cyberattacks can be carried out by hostile nations, terrorist groups, cybercriminals, hacker collectives and individual hackers. Former FBI Director Robert Mueller states that 108 countries have cyberattack units, targeting critical infrastructure and trade secrets (Goodman, 2015). The majority of attacks are currently repelled using cybersecurity tools, or their effects have been disruptive or damaging, but not critical. for long-term service delivery (Singer and Friedman, 2014). Indeed, it must be recognized that to date, successful cyberattacks against cities are still relatively rare and that when they do occur, their effects generally do not last more than a few hours or involve the theft of data rather than creating life-threatening situations. That said, it is clear that a cybersecurity arms race is underway between attackers and defenders, and that more serious disruptions to critical infrastructure have been avoided thanks to the threat of a, 2016).