How the Internet of Things Changes Everything The next stage of the digital revolution

Main Article Content

Kate Carruthers

Keywords

IoT

Abstract

In many ways the Internet of Things will change everything, as devices and software mesh and become part of the connected fabric of the Internet. This article explores the context and potential offered by the growth of the Internet of Things (IoT). It provides an overview of this next phase of the digital revolution that is underpinned by the growth of the social web, web 2.0, and the convergence of technologies such as mobile and ubiquitous broadband. This article also attempts to provide some insight into the potential value of the Internet of Things market in the future. The opportunities offered by the Internet of Things also raise serious questions about privacy and security in a connected world. As Umair Haque noted recently: “At some point, we should all question the value of an internet that objectifies you, tracks you, and polices you...without your consent.” (Haque 2014)

Downloads

Download data is not yet available.
Abstract 216 | PDF Downloads 12

References

Amara, Roy. ‘Amara’s Law’, http://en.wikipedia.org/wiki/Roy_Amara; accessed 14 October 2014
Ashton, Kevin. 2009. ‘That 'Internet of Things' Thing: In the real world, things matter more than ideas.’ RFID Journal, 22 June 2009. Available at: http://www.rfidjournal.com/articles/view?4986; accessed 14 October 2014
Bajekal, Naina. 2014. ‘Londoners Unwittingly Exchange First Born Children For Free Wi-Fi’, Time, September 29, 2014. Available at: http://time.com/3445092/free-wifi-first-born-children/; accessed 4 October 2014
Chambers, John, Cisco Chief Executive Officer. 2013. ‘All Things D Conference interview’, May 2013. Available at: http://allthingsd.com/20130529/ciscos-john-chambers-and-boxs-aaron-levie-the-full-d11-interview-video/; accessed 31/8/2014
CISCO. 2013. White paper ‘Embracing the Internet of Everything for your Share of $14 trillion’. Available at: http://www.cisco.com/web/about/ac79/docs/innov/IoE_Economy.pdf; accessed 14 October 2014
Collins, Keith. 2014. ‘Data Breaches in the US’, Bloomberg 4 September 2014. Available at: http://www.bloomberg.com/infographics/2014-08-21/top-data-breaches.html; accessed 4 Sep 2014
Crowley, Amy-jo. 2014. ‘Why Zebra's buyout of Motorola's enterprise business will fuel IoT growth’, CBR Online, 17 April 2014. Available at: http://www.cbronline.com/news/tech/networks/networking/why-zebras-buyout-of-motorolas-enterprise-business-will-fuel-iot-growth-4216325; accessed 14 October 2014
Dawson, Ross. 2007. ‘Launching the Web 2.0 Framework’, May 30, 2007. Available at: http://rossdawsonblog.com/weblog/archives/2007/05/launching_the_w.html; accessed 31 August 2014
Dignan, Larry. 2014. ‘GE, forges Internet of things alliances with Verizon, Cisco, Intel’, ZDNet, 9 October 2014. Available at: http://www.zdnet.com/article/ge-forges-internet-of-things-alliances-with-verizon-cisco-intel/; accessed 14 October 2014
Diss, Kathryn. 2014. ‘Robotic trucks taking over Pilbara mining operations in shift to automation’, ABC, 26 April 2014. Available at: http://www.abc.net.au/news/2014-04-25/computer-controlled-trucks-taking-over-in-pilbara-mining-wa/5412642; accessed 14 October 2014
Bloomberg. 2014. Editorial. ‘Why the JP Morgan hack is scary’ Bloomberg, 6 October 2014. Available at: http://www.bloombergview.com/articles/2014-10-06/why-the-jpmorgan-hack-is-scary; accessed 14 October 2014
Essany, Michael. 2012. ‘The Decade of 350 billion app downloads’, Mobile Marketing Watch, November 19, 2012. Available at: http://www.mobilemarketingwatch.com/the-decade-of-350-billion-app-downloads-26932/
Evans Data Corporation. 2014. Survey, July 2014. Available at: http://www.evansdata.com/press/viewRelease.php?pressID=212; accessed 4 October 2014
Gartner. 2014. Gartner Hype Cycle. Available at: http://www.gartner.com/technology/research/methodologies/hype-cycle.jsp; accessed 14 October 2014
Greene, Tim. 2014. ‘Bot Herders Launch DDoS attacks using IoT Devices’, Network World, 24 September 2014. Available at: http://www.networkworld.com/article/2687169/security0/bot-herders-can-launch-ddos-attacks-from-dryers-refrigerators-other-internet-of-things-devices.html; accessed 14 October 2014
Haque, Umair. 2014. Twitter 2 September 2014. https://twitter.com/umairh/status/506546721007370240; accessed 2/9/2014
Lee, Jin-Shyan; Su, Yu-Wei; Shen, Chung-Chou. 2007. "A Comparative Study of Wireless Protocols: Bluetooth, U WB, ZigBee, and Wi-Fi," Industrial Electronics Society, 2007. IECON 2007. 33rd Annual Conference of the IEEE, vol., no., pp.46, 51, 5-8 Nov. 2007 doi: 10.1109/IECON.2007.4460126. Available at http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4460126&isnumber=4459874; accessed 4 October 2014
Kumparak, Greg. 2014a. ‘Google and Nest Acquire Dropcam’, TechCrunch 20 June 2014. Available at: http://techcrunch.com/2014/06/20/google-and-nest-acquire-dropcam-for-555-million/; accessed 14 October 2014
Kumparak, Greg. 2014b. ‘SmartThings acquired by Samsung’, TechCrunch 14 August 2014. Available at: http://techcrunch.com/2014/08/14/smartthings-acquired-by-samsung-for-around-200-million/; accessed 14 October 2014
Lee, Adriana. 2014. ‘Another connected home hack emphasizes the need for stronger passwords’, Read Write Web, 30 April 2014. Available at: http://readwrite.com/2014/04/30/connected-home-hackers-stop-yelling-at-babies-foscam#feed=/tag/internet-of-things&awesm=~oEe6yipkTkz40o; accessed 14 October 2014
MacQueen. David. 2012. ‘App Download Forecast 2008 – 2017’, November 08 2012. Available at: http://www.strategyanalytics.com/default.aspx?mod=reportabstractviewer&a0=7934; accessed 31/8/2014
Mundy, Owen. 2014. Online project, I Know Where Your Cat Lives. Available at: http://iknowwhereyourcatlives.com/about/; accessed 31 August 2014
Panzarino, Matthew. 2014. ‘Google just bought connected device company Nest’, TechCrunch 13 January 2014. Available at: http://techcrunch.com/2014/01/13/google-just-bought-connected-device-company-nest-for-3-2b-in-cash/; accessed 14 October 2014
Pauli, Darren. 2014. ‘JLaw, Kate Upton exposed in celeb nude pics hack: 100 women victimised as Apple iCloud accounts reportedly popped’, The Register, 31 Aug 2014. Available at: http://www.theregister.co.uk/2014/08/31/jlaw_upton_caught_in_celeb_nude_pics_hack/; accessed 31/8/2014
Perez, Sarah. 2010. ‘This is What a Tweet Looks Like’, April 19, 2010, ReadWrite. Available at: http://readwrite.com/2010/04/19/this_is_what_a_tweet_looks_like; accessed 31/8/2014
Privacy by Design. 2014. Available at: http://www.futureofprivacy.org/privacy-by-design/; accessed 14 October 2014
Proofpoint. 2014. Media Release, ‘Proofpoint Uncovers Internet of Things (IoT) Cyber attack’, January 16, 2014. Available at: http://investors.proofpoint.com/releasedetail.cfm?ReleaseID=819799; accessed 14 October 2014
Rittel, Horst W. J; Webber, Melvin M. 1973. ‘Dilemmas in a General Theory of Planning’, Policy Sciences 4: 155–169, 1973. Available at: http://link.springer.com/article/10.1007%2FBF01405730; accessed 14 October 2014
Ross, Philip E. 2014. ‘Self-Driving Cars Face Serious Roadblocks, Experts Say’, IEEE Spectrum, 10 September 2014. Available at: http://spectrum.ieee.org/cars-that-think/transportation/self-driving/future-of-self-driving-cars-detroit-panel; accessed 14 October 2014
Schneier, Bruce. 2014. The Internet of Things Is Wildly Insecure - And Often Unpatchable, Wired, Jan 2014; accessed 10 October 2014
Vodafone. 2014. Media release, ‘Vodafone completes acquisition of Cobra Automotive Technologies’, Vodafone 8 August 2014. Available at: https://m2m.vodafone.com/cs/m2m/insight_news/2014-06-18-vodafone-completes-acquisition-of-cobra-automotive-technologies; accessed 14 October 2014