• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Forget Big Brother: The Internet of Things—and Everyone Else—is Watching You

By Lori Cameron

By Lori Cameron on
July 5, 2017

connected security iconsconnected security icons

A recent Business Insider article described how a photographer was able to take smartphone photos of bystanders at a subway station, discover their identities using free software, and identify them in news reports.

The bystanders only learned of their identification after the fact.

Until now, privacy in mobile, wearable, and connected devices has been limited to preventing hacks and unauthorized use of those devices.

However, the IoT presents a new problem: the invasion of bystander privacy by those nearby who record and disseminate information about them, whether purposely or unintentionally.

"Privacy in mobile, wearable, and connected devices usually focuses on either attacks and solutions that protect a user’s private space from unauthorized access, or the protection of private data on social networking sites and other services. With bystanders’ privacy, however, there is a social aspect that extends the user’s private space: when photos, videos, and sound are collected in shared or public spaces, a conflict of space ownership arises between the user and bystanders," writes lead researcher Alfredo J. Perez, an assistant professor with the TSYS School of Computer Science at Columbus State University, who was joined by two other researchers.

In an age when photos can be taken and instantly uploaded to social media, the issue of bystander privacy has taken on utmost importance.

Read more about how researchers plan to address the issues surrounding bystander privacy (login may be required for full text) in the May/June 2017 issue of IT Professional.

Read article


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
The Evolution of S&P Magazine
The Evolution of S&P Magazine
How to Stand Out in Today's Competitive Software Engineering Job Market
How to Stand Out in Today's Competitive Software Engineering Job Market
In Memoriam: Remembering Mike Flynn
In Memoriam: Remembering Mike Flynn
Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale
Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale
2026: 80th Anniversary
2026: 80th Anniversary
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

The Evolution of S&P Magazine

How to Stand Out in Today's Competitive Software Engineering Job Market

In Memoriam: Remembering Mike Flynn

Engineering Reliable Service Meshes: Practical Insights From Running Istio at Scale

2026: 80th Anniversary

The Cybersecurity & AI Junior School Workshop: Bridging the Digital Skills Gap for Future Innovators

Supply Chain Concepts in Health Information Management: Strategic Integration and Information Flow Optimization

The Road Ahead: Preparing for 2030’s Digital Oil & Gas