SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation [Book Review]
Graduate studies at Western
Identity in the Information Society 3 (2):275-294 (2010)
|Abstract||The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being made to lay the infrastructure of the future Smart Grid. However, the authors argue that we must take great care not to sacrifice consumer privacy amidst an atmosphere of unbridled enthusiasm for electricity reform. Information proliferation, lax controls and insufficient oversight of this information could lead to unprecedented invasions of consumer privacy. Smart meters and smart appliances will constitute a data explosion of intimate details of daily life, and it is not yet clear who will have access to this information beyond a person’s utility provider. The authors of this paper urge the adoption of Dr. Ann Cavoukian’s conceptual model ‘SmartPrivacy’ to prevent potential invasions of privacy while ensuring full functionality of the Smart Grid. SmartPrivacy represents a broad arsenal of protections, encapsulating everything necessary to ensure that all of the personal information held by an organization is appropriately managed. These include: Privacy by Design; law, regulation and independent oversight; accountability and transparency; market forces, education and awareness; audit and control; data security; and fair information practices. Each of these elements is important, but the concept of Privacy by Design represents its sine qua non. When applying SmartPrivacy to the Smart Grid, not only will the grid be able to, for example, become increasingly resistant to attack and natural disasters—it will be able to do so while also becoming increasingly resistant to data leakage and breaches of personal information. The authors conclude that SmartPrivacy must be built into the Smart Grid during its current nascent stage, allowing for both consumer control of electricity consumption and consumer control of their personal information, which must go hand in hand. Doing so will ensure that consumer confidence and trust is gained, and that their participation in the Smart Grid contributes to the vision of creating a more efficient and environmentally friendly electrical grid, as well as one that is protective of privacy. This will result in a positive-sum outcome, where both environmental efficiency and privacy can coexist.|
|Keywords||Smart Grid SmartPrivacy Electrical grid Power utilities|
|Categories||categorize this paper)|
|Through your library||Configure|
Similar books and articles
Ann Cavoukian, Scott Taylor & Martin E. Abrams (2010). Privacy by Design: Essential for Organizational Accountability and Strong Business Practices. [REVIEW] Identity in the Information Society 3 (2):405-413.
Ann Cavoukian (2010). Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW] Identity in the Information Society 3 (2):247-251.
Peter Hustinx (2010). Privacy by Design: Delivering the Promises. [REVIEW] Identity in the Information Society 3 (2):253-255.
Terry McQuay & Ann Cavoukian (2010). A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW] Identity in the Information Society 3 (2):379-396.
Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.
Norman Mooradian (2009). The Importance of Privacy Revisited. Ethics and Information Technology 11 (3):163-174.
Jeroen van Den Hoven (2006). Nanotechnology and Privacy. International Journal of Applied Philosophy 20 (2):215-228.
Peter Schaar (2010). Privacy by Design. Identity in the Information Society 3 (2):267-274.
Jennifer Hendry & Kay Goodall, Facebook and the Commercialisation of Personal Information: Some Questions of Provider-to-User Privacy.
Niels van Dijk (2010). Property, Privacy and Personhood in a World of Ambient Intelligence. Ethics and Information Technology 12 (1):57-69.
Dawn Jutla (2010). Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design. Identity in the Information Society 3 (2):319-341.
Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman (2010). Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW] Identity in the Information Society 3 (2):363-378.
Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu (2007). Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices. Journal of Business Ethics 73 (2):145 - 160.
Julie David & Marilyn Prosch (2010). Extending the Value Chain to Incorporate Privacy by Design Principles. Identity in the Information Society 3 (2):295-318.
Added to index2010-12-05
Total downloads6 ( #154,923 of 739,369 )
Recent downloads (6 months)1 ( #61,680 of 739,369 )
How can I increase my downloads?