Smart State Plan Implementation for Surveillance on Citizen Behaviour
The Australian State Government has decided to implement the Smart State Plan for their State by reviewing the Singapore Government’s Smart Nation Plan. The Smart State Plan consists of the following features in their CBD, and with this, it will monitor the behaviour of the citizen and address the crime of the street.
People |
Affected |
The categories of people who have no concern about the environment |
They affected the environment by throwing the garbage anywhere on the street |
The categories of people who do not follow the traffic rules and keep the reckless attitude |
Breaking the traffic signal and randomly crossing the road. Follow the signal of the traffic; permitted speed is marinating at the traffic |
The categories of people committing crime at the public place and bus stops |
Performing some activities that are illegal like robbing, killing, stealing and more. |
The traffic police |
Law and order are followed at the traffic |
Garbage agencies |
Managing the collection of garbage from the public places |
With the presence of the public camera, a subtle but profound change has been brought to the character of the normal citizen. The authorities watched the citizens or make them aware as they are less free-wheeling and more self-conscious. People had become more conscious at the traffic light with the use of camera and smart sensor network. There were certain law and order that were maintained at the traffic with constant monitoring about the thinking of the people (McDonald, 2015). The number of people is getting increase who uses rubbish bean which is kept at every public place. When something that is not happening naturally then there is a need for establishing believe in cleanliness in the mind of the people to increase the monitoring level. Before making any commitment, people have to think twice as it violates law and order was everything can be caught by analyzing the footage of the camera. Moreover, people may get worried about the feeling that they are constantly being monitored their concern may grow about their privacy.
Following the cleanliness process:
As in many places, rubbish beans are being accustomed for garbage to get dispose of by people. Presently, it may not come by natural, there may be some people who dislike such thing, and however, by the end, the same thing will be followed which contribute to having a clean environment.
A proper schedule of the time is to be followed by people and plan the terms in, an organized manner and scheduling the travel for themselves. As this may help in avoiding heavy traffic and breaking the rules of the ta traffic.
It is not easy to avoid the consequences of a crime that is committed by the people as everybody knows it increases the monitoring level. Thus, people would not think of using the places as a spot to do a crime which has targeted the most, and the amount is less for the security.
The Australian State Government has another the Smart State Plan to deploy a Network with Smart Wifi. The Smart State Plan for the Smart Wifi Network has the following features in their CBD where there is a Wifi hotspot for a series of sensor boxes throughout the city.
People |
Affected |
The categories of people who are interested in studying |
Though the online medium getting access to study material |
The categories of people who are interested in travelling |
There is a hassle-free experience of travelling |
The categories of people who are getting entertain online |
To download, view and share content online |
The categories of people who dose their business online |
The business could be grown by attracting people through online advertisement |
The categories of people who are interested in social engagement |
Involvement of the self in getting in the platform of social media |
The categories of people could not manage the activities of the household |
To manage the activities of the household like paying, bills, shopping for those who have needs in the household |
With the increase in technology, new activities associated with the people has affected the behaviour. There is a dramatic change in the behaviour of the people. This is the internet age, where various people get connected to the internet, however, still, some people do not have access to the internet or in the other word if it is said, then the internet connection is limited for a lot of people. Thus, a free internet connection when introducing to the people, then the impact will be more on the people. The public Wi-Fi as providing free internet connection for the people, the impact of it would be more on them. The Wi-Fi that is public provide an attraction to the people having free connectivity (Bancroft & Scott Reid, 2017). Thus, it results in increasing the online activities. Today, the internet is everywhere, as the digital world is embracing from the love of the people. Through this changes being expected from the behaviour of the people, instead of obtaining it offline, people would just prefer online activities. In such activities, people would make the payment and purchase the product. However, they would prefer less to visit the offline store to shop. For them, ordering online is much easier. Things would not require to be organized by paying less as everything could be managed online. As such an approach of the people does not blame the internet alone, it is related to the behavioural approach to which the people are associated with. The new could be updated by the people across the world to make the internet access easier (Hu et al., 2015). Overall, collective online activities are increasing among the people. Those people who have difficulty communicating publicly find it easier to get connected with the virtual social life. In this way, they will be more comfortable in communicating, and sharing has become easier (Peddinti, Ross & Cappos, 2014). With this, it is sure that the group of people have brought a lot of behaviour changes.
Potential Risks to Information Security and Privacy in Smart State Plan Implementation
Getting a free education:
Some people have got a lot of interest in studying. It is difficult for them to visit the public library and get some book and then return them on time in which extra charges can be avoided (Levin, Kark & Crandall, 2015). As the free WiFi is available which help to get the online books downloaded easily and read them anytime from anywhere. There is no need of returning the book online. Therefore, for people would prefer more to read online and might visit less or hardly to the library as per their convenience.
It is already seen that today technology has shaped the world. It influences the communication that is taking place. There is no such necessity that employees who are doing jobs need to be present in the office and do their assignment. Electronic communications such as email, chat have become more effective (He, Chan & Guizani, 2015). There is a need for seamless access that has to manage the life of the job more easily. Students and Professionals make the use of the free internet to some extents as to check through the emails, reply to their responsibilities that do not miss important message which matters most.
The present world completely depends on the digital economy. Everywhere it is found that the digital economy is rapidly growing. Most of the people go for cashless payment from the option that is present online in the form of digital wallets as it is a hassle-free, and also it is much easier to use and keep money safe and use them anytime from anywhere from mobile, tablet or any other devices (Panetto et al., 2016). It is not much necessary to carry any card or cash, here the only thing that is needed is the smartphone which has an internet connection in an active mode. Thus, the free Wi-Fi access has increased the number of users who are opting all the payment that is made through digital payment.
Today, people find everything online for entertaining themselves. It is a really good thing that precedence is taking place with a new form of entertainment. Everything is available online from songs, plays, movies, tech and a lot more. Thus, the value of digital entertainment increases with the use of free Wi-Fi (Najaftorkaman et al., 2015). The users would now prefer to download songs, movies from the internet and likely to rent or buy offline. There is content that is essential for renting or purchasing, have free versions, and are all available online. All age group people are influenced were younger groups of participants expected to know more.
There are greater benefits to free public to travel. The city is getting explore through a huge number of travellers rather than getting guidance from someone else for those who are complete strangers. There is no difficulty in finding the information about a place where there are attractive places to book hotel and cabs within the best price that is given. It is easier to make the travel experience through public and free Wi-Fi, and it has become much independent to make the city comfortably explore.
Impact of Technology on People’s Behaviour in Smart State Plan Implementation
In the shortest possible time, the number of people that increases will get easy access to the internet so that that they can easily get connected with their friends from anywhere around the world. The more the social engagement will make the people focus less on the world that is there around them (Hu, Zhao & Jiang, 2013). Most people will be busy in updating their status, sharing their picture with friends, updating the status, chatting and keeping followers which is hard for the people to refrain from.
There are certain steps recommended to make the sensitive information protective at the time of using a mobile device at the place where there is public Wi-Fi:
- In the hotspot of a public Wi-Fi, once any device is getting connected to the hotspot, it is needed to check whether multiple hotspots have the same name or not. It is often hard to identify or recognize how much legitimate the hotspots are, and thus it becomes important that the hotspot is avoided to have it in the safer side were the sensitive information could be easily protected into mobile devices.
- At a time where VPN configuration is not there, it is important to make sure that internet connection whenever made to the device through public WiFi, there is an encrypted session. Thus, here it becomes necessary to use those sites that have the HTTPS instead of HTTP in the URL.
- Using the VPN, internet traffic is made secure. There is an active connection of VPN, was the internet is surfed, and this will ensure that whether entire internet traffic is getting transferred through a tunnel having encrypted and secure data. With this, the security also increases.
- It should avoid the use of file transfer protocol (FTP) for the transaction.
Digital identity is the network identity which is adopted in cyberspace by mobile phone or device user. Security and privacy are the key areas to focus for the digital identity management when seen the online social networks that allow the people to maintain an online identity which overlaps between the real world and the online context (Friedman & Wagoner, 2015). A person uniquely describes Digital identity that describe a person. It often created identities that reflect a specific aspect or ideal version. The data for digital identity uniquely describe a person and the all the information are stored online. This will identify the organizations, individual presence or the electronic devices which are mostly operated online. There are unique identifiers or the certain patterns of the user that usually get generated through the system having the possible interactions with the network (Holt & Mal?i?, 2015). There are some of the services that are avail online for those users who share their personal information such as social networking, shopping. This is added to the user devices or the individual digital identities. It has some sensitive information, and digital data are contextual. The information stored online through which the individual presence, electronic devices or the organization is identified to operate online (Harrell & Lim, 2017). The patterns of the user or the unique identifiers presence are generated along with the system interaction having all possible network. Personal information is shared by users so that some service could be avail online through social networking, shopping, that have used the devices or the individual with digital identities (Shrier, Wu & Pentland, 2016). Sensitive information is often contextual for the digital data as the service provider collected the data to authenticate the user online. The plan has been greatly assisted in rolling out in such a way that privacy could be maintained where there are identities of the user that have not reveal and allow them to access and take the benefits that the government provide through some mobile and similar devices (Wong et al., 2014). In that case, it is not necessary for them to be present physically at the work location like the online banking, taxing, digital mailboxes, myGov services, state government services and lot more. That individual who carries their digital identity could gain ease in which complications and worries can be avoided while carrying the ID cards (Yu et al., 2017).
Some challenges occur with the use of digital identities. The user has authorized the reason that is associated with the digital identities of the users that can put the privacy at risk. The trends of digitization are found all over the world, and the major issue over there is the protection of the data of the user that is maintain online (Shrier, Wu & Pentland, 2016). Thus, this indicates that users’ data that are kept online are not safe. The step taken for using the Digital Identity would make the data secure and maintain the privacy. Such issues can be addressed through Digital Identity which would be effective for the online security of data:
The demand of the online purchase increases which increases the volume of transaction. As digital identity is important, it customizes the transaction (Grassi, Garcia & Fenton, 2017). It is possible to make the authentication of the transaction possible with the digital identity for only those who can perform the transaction. Therefore, it makes the process customized and organize it.
The complexity is more with an additional volume of financial activities where there is new technology that is very attractive and convenient (Ilia et al., 2015). The experience of the consumer improves, and the process has become complex. The user has identified the complexity properly and had addressed it so that the service is enabled correctly. Thus, the choice is effective for digital identity.
Data protection has been enforced for Digital Identity. It has become mandatory to have a standard service provider which ensure the protection of data to measure strong security, and this has made the user clear that data has to be collected and share the same data across the network (Roßnagel et al., 2014). Therefore, the user ensures that the necessary information could be provided once the digital identity is identified as per the demand of the service provider for a particular service.
There are several layers of Digital identity which serve for a different purpose that ensures data privacy:
The online activities have governed the issues of having data consistency and made the security better for the data to coordinate perfectly (Feher, 2016). The data could not be properly coordinated and are inconsistent which make stealing or hacking of data easier.
In this particular section, the attributes of the user get stored, collected properly and protected and have standard security (Augot et al., 2017). For data security, the steps that are important as a data attribute. Data is identified regarding their importance and sensitivity, and more protection are needed for strong data security.
There is a huge number of information available through the digital identity about an individual to which the hackers usually target (Choi, Glassman & Cristol, 2017). By stealing the identity, they start to perform a financial transaction of the owner. However, the identity could be completely protected which would initiate some action from the side of the user due to which the identity could not possibly steal by the hackers. The steps that can ensure security and privacy are:
The users mostly have some personal information on their emails and messages. This turns out to be the most sensitive information, and the hackers find it easy to know about the user’s personal information (Al-Zahrani, 2015). There is another thing that has to be noted for certain links are received over the messages and emails to the user. These links are once clicked that is easier for the hacker to get personal information which gets extracted by devices that are hacked through the provided link that cloud be accessed.
Most of the expert recommended this to be the safest form of one of a kind for a smart card that provides some digital security (Zhao et al., 2017). The process of two-step verification is effective to access the digital data for digital identity. Before accessing any data, a two-step verification process is done to ensure optimal security.
References
Al-Zahrani, A. (2015). Toward digital citizenship: Examining factors affecting participation and involvement in the Internet society among higher education students. International Education Studies, 8(12), 203.
Augot, D., Chabanne, H., Clémot, O., & George, W. (2017). Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain. arXiv preprint arXiv:1710.02951.
Bancroft, A., & Scott Reid, P. (2017). Challenging the techno-politics of anonymity: the case of cryptomarket users. Information, Communication & Society, 20(4), 497-512.
Choi, M., Glassman, M., & Cristol, D. (2017). What it means to be a citizen in the internet age: Development of a reliable and valid digital citizenship scale. Computers & education, 107, 100-112.
Feher, K. (2016). Digital identity: The transparency of the self. In Applied Psychology: Proceedings of the 2015 Asian Congress of Applied Psychology (ACAP 2015) (pp. 132-143).
Friedman, A. R., & Wagoner, L. D. (2015). The Need for Digital Identity in Cyberspace Operations. Warfare, 14, 42-52.
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special Publication, 800, 63-3.
Harrell, D. F., & Lim, C. U. (2017). Reimagining the avatar dream: modeling social identity in digital media. Communications of the ACM, 60(7), 50-61.
He, D., Chan, S., & Guizani, M. (2015). User privacy and data trustworthiness in mobile crowd sensing. IEEE Wireless Communications, 22(1), 28-34.
Holt, J., & Mal?i?, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union. Journal of Information Policy, 5, 155-178.
Hu, B., Zhao, H. V., & Jiang, H. (2013). Wireless multicast using relays: Incentive mechanism and analysis. IEEE Transactions on Vehicular Technology, 62(5), 2204-2219.
Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C. H., Kruchten, P., & Chan, H. C. (2015). A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys & Tutorials, 17(3), 1557-1581.
Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., & Ioannidis, S. (2015, October). Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 781-792). ACM.
Levin, N., Kark, S., & Crandall, D. (2015). Where have all the people gone? Enhancing global conservation using night lights and social media. Ecological Applications, 25(8), 2153-2167.
McDonald, K. (2015). From Indymedia to Anonymous: rethinking action and identity in digital cultures. Information, Communication & Society, 18(8), 968-982.
Najaftorkaman, M., Ghapanchi, A. H., Talaei?Khoei, A., & Ray, P. (2015). A taxonomy of antecedents to user adoption of health information systems: A synthesis of thirty years of research. Journal of the Association for Information Science and Technology, 66(3), 576-598.
Panetto, H., Zdravkovic, M., Jardim-Goncalves, R., Romero, D., Cecil, J., & Mezgár, I. (2016). New perspectives for the future interoperable enterprise systems. Computers in Industry, 79, 47-63.
Peddinti, S. T., Ross, K. W., & Cappos, J. (2014, October). On the internet, nobody knows you’re a dog: A Twitter case study of anonymity in social networks. In Proceedings of the second ACM conference on Online social networks (pp. 83-94). ACM.
Roßnagel, H., Zibuschka, J., Hinz, O., & Muntermann, J. (2014). Users’ willingness to pay for web identity management systems. European Journal of Information Systems, 23(1), 36-50.
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data security). Massachusetts Institute of Technology-Connection Science, 1(3).
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data security). Massachusetts Institute of Technology-Connection Science, 1(3).
Wong, O. C., Loh, S. K., Yang, H., & Wang, Y. L. (2014). U.S. Patent No. 8,732,455. Washington, DC: U.S. Patent and Trademark Office.
Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2017). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
Zhao, P., Bian, K., Zhao, T., Song, X., Li, X., Ye, F., & Yan, W. (2017). Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions. IEEE Transactions on Mobile Computing, 16(2), 552-565.