• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Forget Big Brother: The Internet of Things—and Everyone Else—is Watching You

By Lori Cameron

By Lori Cameron on
July 5, 2017

connected security iconsconnected security icons

A recent Business Insider article described how a photographer was able to take smartphone photos of bystanders at a subway station, discover their identities using free software, and identify them in news reports.

The bystanders only learned of their identification after the fact.

Until now, privacy in mobile, wearable, and connected devices has been limited to preventing hacks and unauthorized use of those devices.

However, the IoT presents a new problem: the invasion of bystander privacy by those nearby who record and disseminate information about them, whether purposely or unintentionally.

"Privacy in mobile, wearable, and connected devices usually focuses on either attacks and solutions that protect a user’s private space from unauthorized access, or the protection of private data on social networking sites and other services. With bystanders’ privacy, however, there is a social aspect that extends the user’s private space: when photos, videos, and sound are collected in shared or public spaces, a conflict of space ownership arises between the user and bystanders," writes lead researcher Alfredo J. Perez, an assistant professor with the TSYS School of Computer Science at Columbus State University, who was joined by two other researchers.

In an age when photos can be taken and instantly uploaded to social media, the issue of bystander privacy has taken on utmost importance.

Read more about how researchers plan to address the issues surrounding bystander privacy (login may be required for full text) in the May/June 2017 issue of IT Professional.

Read article


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
LinkedIn Profile Template
LinkedIn Profile Template
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

LinkedIn Profile Template

Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech

Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement