SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation [Book Review]
Identity in the Information Society 3 (2):275-294 (2010)
The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must the grid become more reliable, it must also become more efficient, reduce its impact on the environment, incorporate alternative energy sources, allow for more consumer choices, and ensure cyber security. In effect, it must become smart. Significant investments in the billions of dollars are being made to lay the infrastructure of the future Smart Grid. However, the authors argue that we must take great care not to sacrifice consumer privacy amidst an atmosphere of unbridled enthusiasm for electricity reform. Information proliferation, lax controls and insufficient oversight of this information could lead to unprecedented invasions of consumer privacy. Smart meters and smart appliances will constitute a data explosion of intimate details of daily life, and it is not yet clear who will have access to this information beyond a person’s utility provider. The authors of this paper urge the adoption of Dr. Ann Cavoukian’s conceptual model ‘SmartPrivacy’ to prevent potential invasions of privacy while ensuring full functionality of the Smart Grid. SmartPrivacy represents a broad arsenal of protections, encapsulating everything necessary to ensure that all of the personal information held by an organization is appropriately managed. These include: Privacy by Design; law, regulation and independent oversight; accountability and transparency; market forces, education and awareness; audit and control; data security; and fair information practices. Each of these elements is important, but the concept of Privacy by Design represents its sine qua non. When applying SmartPrivacy to the Smart Grid, not only will the grid be able to, for example, become increasingly resistant to attack and natural disasters—it will be able to do so while also becoming increasingly resistant to data leakage and breaches of personal information. The authors conclude that SmartPrivacy must be built into the Smart Grid during its current nascent stage, allowing for both consumer control of electricity consumption and consumer control of their personal information, which must go hand in hand. Doing so will ensure that consumer confidence and trust is gained, and that their participation in the Smart Grid contributes to the vision of creating a more efficient and environmentally friendly electrical grid, as well as one that is protective of privacy. This will result in a positive-sum outcome, where both environmental efficiency and privacy can coexist.
|Keywords||Smart Grid SmartPrivacy Electrical grid Power utilities|
|Categories||categorize this paper)|
References found in this work BETA
No references found.
Citations of this work BETA
Why Privacy is Not Enough Privacy in the Context of “Ubiquitous Computing” and “Big Data”.Tobias Matzner - 2014 - Journal of Information, Communication and Ethics in Society 12 (2):93-106.
Similar books and articles
Privacy by Design: The Definitive Workshop. A Foreword by Ann Cavoukian, Ph.D. [REVIEW]Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):247-251.
Privacy by Design: Delivering the Promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
A Pragmatic Approach to Privacy Risk Optimization: Privacy by Design for Business Practices. [REVIEW]Terry McQuay & Ann Cavoukian - 2010 - Identity in the Information Society 3 (2):379-396.
Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW]Theodora Varvarigou & Vassiliki Andronikou - 2009 - Identity in the Information Society 2 (2):95-98.
The Importance of Privacy Revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
Nanotechnology and Privacy.Jeroen van Den Hoven - 2006 - International Journal of Applied Philosophy 20 (2):215-228.
Facebook and the Commercialisation of Personal Information: Some Questions of Provider-to-User Privacy.Jennifer Hendry & Kay Goodall - unknown
Property, Privacy and Personhood in a World of Ambient Intelligence.Niels van Dijk - 2010 - Ethics and Information Technology 12 (1):57-69.
Layering Privacy on Operating Systems, Social Networks, and Other Platforms by Design.Dawn Jutla - 2010 - Identity in the Information Society 3 (2):319-341.
Remote Home Health Care Technologies: How to Ensure Privacy? Build It In: Privacy by Design. [REVIEW]Ann Cavoukian, Angus Fisher, Scott Killen & David Hoffman - 2010 - Identity in the Information Society 3 (2):363-378.
Assessing Gender Differences in Computer Professionals' Self-Regulatory Efficacy Concerning Information Privacy Practices.Feng-Yang Kuo, Cathy S. Lin & Meng-Hsiang Hsu - 2007 - Journal of Business Ethics 73 (2):145 - 160.
Extending the Value Chain to Incorporate Privacy by Design Principles.Julie David & Marilyn Prosch - 2010 - Identity in the Information Society 3 (2):295-318.
Added to index2010-12-05
Total downloads21 ( #232,027 of 2,152,251 )
Recent downloads (6 months)1 ( #399,478 of 2,152,251 )
How can I increase my downloads?