The installation of cameras in streetlights or public places helps the people of a particular community largely. It also helps the government in various ways (Kim, 2014). The initiation taken by Australian State Government to install cameras in streetlights would affect various categories of people. These categories are as follows
Due to this approach, the citizens are expected to be more disciplined in public places (Amrutur, Rajaraman & Acharya, 2017). The changes expected in the citizens are as follows
The installation of cameras in public places would affect the behavior of citizens. This change would help the government to maintain discipline at these places. Some ways in which the behavior of citizens would change are as follows
The installation of Wi-Fi for the smart city plan would affect various categories of people. These categories are as follows.
Advancement in technology has seen many changes in human behavior. The introduction of Public Wi-Fi would also result in behavioral changes in people. Usually the internet connection costs a particular amount of money. The introduction of Wi-Fi network would give people free access to inter which would be an attraction to people. Many people cannot afford the access of internet by their own (Angelidou, 2014). The free Wi-Fi would help people in getting free access to internet this would change the behavior of the people largely. The free internet connectivity would help people to stay socially active and know people from worldwide. People would shop clothes, groceries and other household items online. They would not visit offline shops or stores. People will be virtually connected to other people online through social activities (Angelidou, 2014). People would start using net banking and they would not need to visit bank for depositing or withdrawing money or any other purpose. People who are shy and find it difficult to communicate with people would feel comfortable in communicating through online activities. The behavioral changes among people might have a negative impact in their lives. The sudden access of internet makes people unorganized (Angelidou, 2014). Sometimes youngsters who get involved in social life too much that it affects them emotionally and mentally. People who are not habituated in having unlimited access to internet, get involved into too much. This makes them avoid household or professional activities. Sometimes continuous use of internet might lead to insomnia. Insomnia would affect lives of people negatively (Mehmood, Ahmad & Yaqoob, 2017). Children who get access of internet at a very young age face problems in development. Getting used to social platform at a young age creates a negative impact on their mental health. It derails the functioning of brain as well as cell growth. Young men who are too much active on social media or have continuous access of internet decreases their sperm count. This affects their lives largely.
d. As discussed above people are very much attracted towards free internet access. Nowadays mobile phones have a specification, which allows the phone to get connected to Wi-Fi whenever it gets a source (Mone, 2015). As public Wi-Fi would have no security key, mobile phones would automatically get connected to it. This might lead to some mishaps occurred to us such as theft of personal information and many more. In order to keep the personal data safe, few steps should be kept in mind. These steps are as follows
3. Yes, I think the use of Digital Identity would help me keep my data secured when my phone or other devices are connected to public Wi-Fi. A digital identity refers to an online identity that has been adopted by the user (Feher, 2016). An organization, an individual or a device can adopt this sort of identity. The online identity is usually adopted with help of material shared like photos. This material is kept open for interpretation. The creation of a digital identity would help me in many ways. Having a digital identity would not disclose the actual identity of the users to the hackers or cybercriminals who hack the website or network for extracting information from the user (Feher, 2016). If the user is not disclosed the hacker would not know if the person from whom they are stealing information is the correct person whose information they want to steal. One of the most important advantage of digital identity is that the information provided in the sites would not be legitimate. Suppose there are various sites that require the user’s information before letting them to log in to their site (Mellmer, Young & Perkins, 2014). They require information such as picture, address, password, birthday and many more. We provide this information without even realizing that they may be stolen. If we use digital identity and the identity is stolen, it would not affect us in any way. Our personal information would not be stolen by any means. The digital identity is actually a made up identity which is created with the help of various sources. Digital identity can secure personal data because it increases the volume of transactions (Nocera, 2017). It is useful for maintaining privacy in the shopping sites that are very often used by users for various purposes. Digital identity helps in assuring that the legitimate user performs the transaction. This makes the process much more organized and prevents the hackers who take the advantage of public networks and perform fake transactions. Digital identity applies very tough regulatory standards in order to protect data (Beck, 2015). This standard ensures that the data is secure with the help of proper measures of security.
The use of digital identity is undoubtedly good for securing data but in some cases, it may fail to provide security to our data. As mentioned above various sites ask for information from the user in order to save them to their site (Linn, Boyle & McVey, 2017). This is done so that next time the user visits that particular site, he would not need to provide the same information repeatedly. The information provided can be stolen by the hackers and used for ill purposes. The information provided by the user completely depends upon him. If the user shares personal information on online sites like atm card number or pin number, there are high chances that it might be stolen. Creation of strong password should be followed for every site that includes financial transactions (Grassi, Garcia & Fenton, 2017). People do not usually follow this very often. The two-step verification is very important for every user. Digital identity cannot provide better security than the two-step verification.
4. Just creating a digital identity is not enough to secure data; it has to be maintained as well (Simmonds, 2015). Some important steps that should be taken in order to ensure that the digital identity secures our data are as follows.
References:
Adelman, W., & Chadwick, M. (2014). U.S. Patent No. 8,904,040. Washington, DC: U.S. Patent and Trademark Office.
Amano, T., Kajita, S., Yamaguchi, H., Higashino, T., & Takai, M. (2017, June). A crowdsourcing and simulation based approach for fast and accurate Wi-Fi radio map construction in urban environment. In IFIP Networking Conference (IFIP Networking) and Workshops, 2017 (pp. 1-9). IEEE.
Amrutur, B., Rajaraman, V., Acharya, S., Ramesh, R., Joglekar, A., Sharma, A., … & Sankaran, S. (2017, April). An open smart city IoT test bed: street light poles as smart city spines. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (pp. 323-324). ACM.
Angelidou, M. (2014). Smart city policies: A spatial approach. Cities, 41, S3-S11.
Ballas, C., Marsden, M., Zhang, D., O’Connor, N. E., & Little, S. (2018). Performance of video processing at the edge for crowd-monitoring applications.
Beck, E. N. (2015). The invisible digital identity: Assemblages in digital networks. Computers and Composition, 35, 125-140.
Feher, K. (2016). Digital identity: The transparency of the self. In Applied Psychology: Proceedings of the 2015 Asian Congress of Applied Psychology (ACAP 2015) (pp. 132-143).
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special Publication, 800, 63-3.
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special Publication, 800, 63-3.
Jin, D., Hannon, C., Li, Z., Cortes, P., Ramaraju, S., Burgess, P., … & Shahidehpour, M. (2016). Smart street lighting system: A platform for innovative smart city applications and a new frontier for cyber-security. The Electricity Journal, 29(10), 28-35.
Joh, E. E. (2018). Policing the Smart City.
Kim, D. Y. (2014). U.S. Patent No. 8,820,961. Washington, DC: U.S. Patent and Trademark Office.
Kontokosta, C. E., & Johnson, N. (2017). Urban phenology: Toward a real-time census of the city using Wi-Fi data. Computers, Environment and Urban Systems, 64, 144-153.
Laurent, M., & Bouzefrane, S. (2015). Digital identity management. Elsevier.
Linn, A., Boyle, J., McVey, M., McKerlie, R., Noble-Jones, R., Dowell, F., … & Murray, J. A. (2017). Digital Identity: Understanding How Students View their Digital Identity Working in Partnership with Students to Develop a Positive Digital Identity.
Loeb, M. R., & McCabe, E. J. (2016). U.S. Patent Application No. 14/962,535.
Mehmood, Y., Ahmad, F., Yaqoob, I., Adnane, A., Imran, M., & Guizani, S. (2017). Internet-of-things-based smart cities: Recent advances and challenges. IEEE Communications Magazine, 55(9), 16-24.
Mellmer, J. A., Young, R. T., Perkins, A. D., Robertson, J. M., Sabin, J. N., Mcdonald, M. C., … & Carter, S. R. (2014). U.S. Patent No. 8,631,038. Washington, DC: U.S. Patent and Trademark Office.
Mone, G. (2015). The new smart cities. Communications of the ACM, 58(7), 20-21.
Musa, S. (2018). Smart Cities-A Road Map for Development. IEEE Potentials, 37(2), 19-23.
Nocera, A. (2017, October). eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security. In Cloud Infrastructures, Services, and IoT Systems for Smart Cities: Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20–21, 2017, Proceedings (Vol. 189, p. 58). Springer.
Simmonds, P. (2015). The digital identity issue. Network Security, 2015(8), 8-13.
Wise, J. B., & O’Byrne, W. I. (2015). Social scholars: Educators’ digital identity construction in open, online learning environments. Literacy Research: Theory, Method, and Practice, 64(1), 398-414.
Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22-32.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download