CINXE.COM

July 2017 - IEEE Internet Initiative

<!doctype html> <html lang="en-gb"> <head> <!-- v ieee cookie banner v --> <script src="https://cmp.osano.com/AzyzptTmRlqVd2LRf/84950241-aca8-4db0-8eb8-dcc8e7187276/osano.js"></script> <link rel="stylesheet" href="https://cookie-consent.ieee.org/ieee-cookie-banner.css" type="text/css"/> <!-- ^ ieee cookie banner ^ --> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="google-site-verification" content="oc4uHl3htNEATowwKz8N4pGmwtBhU1flWfcmlOYtIlo"> <base href="https://internetinitiative.ieee.org/newsletter/july-2017/" /> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <meta name="description" content="Governance, cybersecurity, and privacy-related publications to help inform and educate the technology and policy-making community." /> <title>July 2017 - IEEE Internet Initiative</title> <link href="/templates/ieeesitetemplate/favicon.ico" rel="shortcut icon" type="image/vnd.microsoft.icon" /> <link href="/plugins/system/jcemediabox/css/jcemediabox.css?1d12bb5a40100bbd1841bfc0e498ce7b" rel="stylesheet" type="text/css" /> <link href="/plugins/system/jcemediabox/themes/squeeze/css/style.css?904d706a133c73eabd5311fc39fa401b" rel="stylesheet" type="text/css" /> <link href="/templates/ieeesitetemplate/css/template.css.php" rel="stylesheet" type="text/css" /> <script src="/plugins/system/jcemediabox/js/jcemediabox.js?0c56fee23edfcb9fbdfe257623c5280e" type="text/javascript"></script> <script src="/templates/ieeesitetemplate/js/jui/jquery.min.js?575c3e0d31f5acd472625994e776c0fd" type="text/javascript"></script> <script src="/media/jui/js/jquery-noconflict.js?575c3e0d31f5acd472625994e776c0fd" type="text/javascript"></script> <script src="/templates/ieeesitetemplate/js/jui/jquery-migrate.min.js?575c3e0d31f5acd472625994e776c0fd" type="text/javascript"></script> <script src="/templates/ieeesitetemplate/js/jui/bootstrap.min.js?575c3e0d31f5acd472625994e776c0fd" type="text/javascript"></script> <script type="text/javascript"> JCEMediaBox.init({popup:{width:500,height:500,legacy:1,lightbox:0,shadowbox:0,resize:1,icons:1,overlay:1,overlayopacity:0.8,overlaycolor:"#000000",fadespeed:500,scalespeed:500,hideobjects:0,scrolling:"fixed",close:2,labels:{'close':'Close','next':'Next','previous':'Previous','cancel':'Cancel','numbers':'{$current} of {$total}'},cookie_expiry:"",google_viewer:0},tooltip:{className:"tooltip",opacity:0.8,speed:150,position:"br",offsets:{x: 16, y: 16}},base:"/",imgpath:"plugins/system/jcemediabox/img",theme:"squeeze",themecustom:"",themepath:"plugins/system/jcemediabox/themes",mediafallback:0,mediaselector:"audio,video"}); </script> <meta property="og:title" content="July 2017 - IEEE Internet Initiative" /> <meta property="og:type" content="website" /> <meta property="og:url" content="https://internetinitiative.ieee.org/newsletter/july-2017/" /> <meta property="og:image" content="https://internetinitiative.ieee.org/images/files/template/IEEE_InternetInitiative_Logo_Blue_250.png" /> <!--***** Google Analytics *****--> <script async src="https://www.googletagmanager.com/gtag/js?id=UA-4930232-12"></script> <script type="text/javascript"> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-4930232-12', {'dimension1': 'anonymous', 'dimension2': '', 'dimension3': '', 'dimension4': 'Newsletter', 'dimension5': ''}); jQuery(document).ready(function($) { 'use strict' $.noConflict(); $(".jcepopup").each( function() { $(this).on('click', function() { gtag('config', 'UA-4930232-12', {'dimension1': 'anonymous', 'dimension2': '', 'dimension3': '', 'dimension4': 'Newsletter', 'dimension5': '', 'page_title': document.title, 'page_path': 'https://internetinitiative.ieee.org/newsletter/july-2017/'}); }); }); $("a").each(function() { if($(this).attr("href")) { if( $(this).attr("href").match(/images\/files/) ) { $(this).on('click', function() { gtag('config', 'UA-4930232-12', {'dimension1': 'anonymous', 'dimension2': '', 'dimension3': '', 'dimension4': 'Newsletter', 'dimension5': '', 'page_title': document.title, 'page_path': $(this).attr("href")}); }); } } }); }); </script> <div class="custom" > <script type="text/javascript">jQuery(document).ready(function(n){n(".meta-nav .meta:nth-child(2) li a").each(function(t){n(this).on("click",function(){ga("send","event","IEEE Meta Nav","Click",n(this).text())})}),n.noConflict()});</script></div> <!--[if lt IE 9]> <script src="/templates/ieeesitetemplate/js/html5shiv.min.js"></script> <script src="/templates/ieeesitetemplate/js/respond.min.js"></script> <![endif]--> <style id="acj">body{display:none !important;}</style> <script type="text/javascript"> if (self === top) { var acj = document.getElementById("acj"); acj.parentNode.removeChild(acj); } else { top.location = self.location; } </script> </head> <body class="site july-2017 "> <!-- meta nav --> <a id="top"></a> <div class="nav meta-nav hidden-print"> <div class="container"> <div class="row"> <div class="col-sm-4 col-sm-push-8 meta"> <div> <div id="sign_in"> <div class="signinlink"> <a href="https://www.ieee.org/membership/join/index.html">Join IEEE</a> <span style="padding:0 5px">|</span> <a href="/?morequest=sso"><span class="signinicon"></span>Sign In</a> </div> </div> </div> <div class="clearfix"></div> </div> <div class="col-sm-8 col-sm-pull-4 meta"> <ul class="list-inline"> <li> <a href="http://www.ieee.org" title="IEEE.org">IEEE.org</a> </li> <li class="hidden-sm hidden-xs"> <a href="http://ieeexplore.ieee.org" title="IEEE Xplore Digital Library">IEEE <em>Xplore</em> Digital Library</a> </li> <li class="hidden-sm hidden-xs"> <a href="http://standards.ieee.org" title="IEEE Standards">IEEE Standards</a> </li> <li class="hidden-sm hidden-xs"> <a href="http://spectrum.ieee.org" title="IEEE Spectrum">IEEE Spectrum</a> </li> <li> <a href="http://www.ieee.org/sitemap" title="More IEEE Sites" class="hidden-xs hidden-sm">More Sites</a> <div class="dropdown visible-xs visible-sm"> <a data-toggle="dropdown" href="#" data-target="#" id="moresites" role="button" class="moresites" aria-haspopup="true" aria-expanded="false">More Sites<span class="glyphicon glyphicon-chevron-down"></span></a> <ul class="dropdown-menu" role="menu" aria-labelledby="moresites"> <li> <a href="http://ieeexplore.ieee.org" title="IEEE Xplore Digital Library">IEEE <em>Xplore</em> Digital Library</a> </li> <li> <a href="http://standards.ieee.org" title="IEEE Standards">IEEE Standards</a> </li> <li> <a href="http://spectrum.ieee.org" title="IEEE Spectrum">IEEE Spectrum</a> </li> <li> <a href="http://www.ieee.org/sitemap" title="More IEEE Sites">More Sites</a> </li> </ul> </div> </li> </ul> </div> </div> </div> </div> <div class="page-header"> <div class="container"> <div class="row"> <div class="col-md-3 col-md-push-9"> <a href="http://www.ieee.org" title="IEEE.org" class="pull-right hidden-sm hidden-xs"> <img src="/templates/ieeesitetemplate/images/ieee-mb-bk.png" alt="IEEE"> </a> </div> <div class="col-md-9 col-md-pull-3 site-title"> <a href="/" title="IEEE Internet Initiative" class="pull-left"> <span class="visible-print-block"> IEEE Internet Initiative </span> <img src="/images/files/template/IEEE_InternetInitiative_Logo_Blue_250.png" alt="IEEE Internet Initiative" class="img-responsive hidden-print"> </a> </div> </div> </div> </div> <div class="search-social hidden-print"> <div class="container"> <div class="row search-and-social"> <div class="col-md-5 search"> <div> <form id="mod-finder-searchform" action="/component/finder/search" method="get" class="form-search"> <div class="input-group"> <label for="searchbox" class="sr-only">Search IEEE Internet Initiative</label> <input type="text" class="form-control" maxlength="100" name="q" id="searchbox" value="" placeholder="Search IEEE Internet Initiative" /> <span class="input-group-btn"> <button class="btn btn-primary" type="submit">Search</button> </span> </div> </form> </div> </div> <div class="col-md-7 social"> <div class="pull-right"> <div class="customct" > <a href="https://ieee-collabratec.ieee.org/app/community/65/activities" title="IEEE Internet Technology Policy Collabratec Community"><img src="/images/files/template/collabratec.png" alt="collabratec" /></a></div> <a href="https://twitter.com/IEEENetPolicy" target='_blank' onClick="javascript:gtag('event', 'View', {'event_category': 'Social Media', 'event_label': 'Twitter'});"><img src="https://internetinitiative.ieee.org/modules/mod_ieeesocialmedia/icons/twitter.png" width="34" height="34" alt="Twitter" title="Twitter" class="socialicon" /></a> </div> </div> </div> </div> </div> <!-- navigation --> <nav class="navbar navbar-default" role="navigation"> <div class="container"> <div class="row"> <div class="navbar-header"> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target="#menu-primary"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> </div> <div class="navbar-collapse collapse" id="menu-primary"> <ul class="nav navbar-nav menu"> <li class="item-101 parent"><a href="/" ><span>Home</span></a></li><li class="item-141 parent"><a href="/about" ><span>About</span></a></li><li class="item-291 parent"><a href="/newsroom" ><span>Newsroom</span></a></li><li class="item-143 parent"><a href="/events" ><span>Events</span></a></li><li class="item-145 parent"><a href="/resources" ><span>Resources</span></a></li><li class="item-157 child"><a href="/join" ><span>Join</span></a></li><li class="item-261 active deeper parent"><a href="/newsletter" ><span>Newsletter</span></a><ul class="nav-child"><li class="item-262 parent"><a href="/newsletter/may-2016" ><span>May 2016</span></a></li><li class="item-306 parent"><a href="/newsletter/september-2016" ><span>September 2016</span></a></li><li class="item-343 parent"><a href="/newsletter/november-2016" ><span>November 2016</span></a></li><li class="item-395 parent"><a href="/newsletter/january-2017" ><span>January 2017</span></a></li><li class="item-453 parent"><a href="/newsletter/may-2017" ><span>May 2017 </span></a></li><li class="item-464 active deeper parent"><a href="/newsletter/july-2017" ><span>July 2017 </span></a><ul class="nav-child"><li class="item-465 child"><a href="/newsletter/july-2017/health-informatics-standardization-and-the-e-health-sector-part-2" ><span>Health Informatics Standardization and the e-Health Sector: Part 2</span></a></li><li class="item-466 child"><a href="/newsletter/july-2017/the-many-pieces-of-the-multistakeholder-puzzle" ><span>The Many Pieces of the Multistakeholder Puzzle</span></a></li><li class="item-467 child"><a href="/newsletter/july-2017/persistent-protection-of-data" ><span>Persistent Protection of Data </span></a></li><li class="item-462 child"><a href="/newsletter/july-2017/the-role-of-forensics-in-the-internet-of-things-motivations-and-requirements" ><span>The Role of Forensics in the Internet of Things: Motivations and Requirements</span></a></li></ul></li><li class="item-481 parent"><a href="/newsletter/september-2017" ><span>September 2017 </span></a></li><li class="item-504 parent"><a href="/newsletter/november-2017" ><span>November 2017 </span></a></li><li class="item-517 parent"><a href="/newsletter/march-2018" ><span>March 2018</span></a></li><li class="item-533 parent"><a href="/newsletter/june-2018" ><span>June 2018 </span></a></li><li class="item-557 parent"><a href="/newsletter/september-2018" ><span>September 2018 </span></a></li><li class="item-567 parent"><a href="/newsletter/december-2018" ><span>December 2018 </span></a></li><li class="item-420 parent"><a href="/newsletter/march-2017" ><span>March 2017 </span></a></li></ul></li></ul> </div> </div> </div> </nav> <div class="page-content"> <div class="container"> <div id="content" class="row"> <article id="content-column-2" class="col-md-9"> <div itemprop="articleBody"> <h1 style="background-image: url('/images/files/newsletter/newsletter-header-small.jpg'); color: #fff; padding: 20px; text-shadow: 2px 2px 4px rgba(0, 0, 0, 0.7);">IEEE Internet Policy Newsletter - July 2017</h1> <h4>ISSUE 6 | JULY 2017</h4> <div style="background-color: #f2f2f2; padding: 20px;"> <h2 style="border: none;">Health Informatics Standardization and the e-Health Sector: Part 2</h2> <p><em>By Tahir Hameed, Ph.D. </em><br /> SolBridge International School of Business, Daejeon, South Korea</p> <p><a href="/newsletter/may-2017/health-informatics-standardization-and-the-e-health-sector-part-1" rel="noreferrer">The first of this series released in our previous publication (May 2017)</a> suggested that a delay in health informatics standardization could have led to the delayed development and adoption of e-health systems hence inefficiencies of the healthcare sector. This part attempts to make further sense by looking deeper into Healthcare Informatics Standards (HIS) in the U.S. over past decades. &nbsp;</p> <p>An evolutionary view of technology standardization, <a href="/newsletter/may-2017/health-informatics-standardization-and-the-e-health-sector-part-1" rel="noreferrer">mapping Tassey’s (2000) categories of technology standards across product/technology cycle</a>, suggested the timing of development, promotion and adoption of different categories of technology standards would be associated pre-dominantly with the evolving technology and market needs. In the early phase of the technology industry, Information Standards (IS) (ontologies, test, measurement and evaluation standards) lay the foundation of R&amp;D and product development. Following that, Inter-Operability Standards (IOS) establish a level-playing field for fair competition between the product-systems under development. Once a dominant design – the architecture of the winning product-system – is accepted by the market and industry shifts its focus to economies of scale (production) through much needed Variety-Reducing Standards (VRS) (promoting both ontological and semantic inter-operability). Finally, Quality and Reliability Standards (QRS) provide the basis for operational efficiencies, customer service levels and market expansion through improvements in relevance and performance of product-systems and services. It might not be an indispensable order of standards development but it makes sense according to the timely requirements of an industry.&nbsp;</p> <div class="readmore"><a href="/newsletter/july-2017/health-informatics-standardization-and-the-e-health-sector-part-2" class="btn btn-default">Read More</a></div> <hr /> <h2 style="border: none;">The Many Pieces of the Multistakeholder Puzzle</h2> <p><em>By Daniel Fink, Ph.D., ICANN, Sao Paulo, Brazil and Mark W. Datysgeld, Researcher at the São Paulo State University (UNESP) </em></p> <p>Following the end of the&nbsp;Cold War, a series of discussions were carried out, particularly within the United Nations, that pointed towards a more cooperative future<sup>[1]</sup>. Global politics would no longer be determined solely by states and a few powerful companies. The notion of&nbsp;<em><em>global governance</em></em>&nbsp;emerged and blossomed between 1992 and 1995, as more and more attention was given to the subject.</p> <p>However, some experimental intergovernmental initiatives involving non-state actors have been in existence for decades. One example of such an initiative is the International Telecommunications Satellite Organization (INTELSAT), which was founded in 1964, as an amalgamation of state and private companies. Its &nbsp;primary purpose was to coordinate satellite operations, which paved way for the communication revolution of the twentieth century<sup>[2]</sup>.</p> <div class="readmore"><a href="/newsletter/july-2017/the-many-pieces-of-the-multistakeholder-puzzle" class="btn btn-default">Read More</a></div> <hr /> <h2 style="border: none;">Persistent Protection of Data</h2> <p><em>By Jay Wack, President </em><br />Tecsec, Inc. USA</p> <p>The use of encryption has evolved into broader use cases during the past years.&nbsp;With the advent of the internet, in addition to concerns for intercept (otherwise referred as Data in Transmission), a new security paradigm has surfaced that is referred to as Data in Storage (or at rest).&nbsp;In addition to protecting the information, per se, encryption has been coupled to access control designs that have encryption enforcing who has access to specific information, locations, functions, and often even who can access the transport layer.</p> <p>There are other layered variations for encrypting data, but network and content offer the best examples.&nbsp;The two methodologies for implementing encryption have major differences.&nbsp;A Network solution with encryption results in a&nbsp;<strong><strong>secure channel</strong></strong>&nbsp;that information can pass through and can be viewed as an encrypted pipe for information; whereas, a content solution has encryption bound to the information content, so that each piece of content is encrypted separately.&nbsp;Content encryption can also be thought of as a persistent protection through encryption resulting with a binding of the encryption to the content or to a message throughout the life cycle of the message.</p> <div class="readmore"><a href="/newsletter/july-2017/persistent-protection-of-data" class="btn btn-default">Read More</a></div> <hr /> <h2 style="border: none;">The Role of Forensics in the Internet of Things: Motivations and Requirements</h2> <p><em>By Suleman Khan, Ph.D. </em><br /> Lecturer at School of Information Technology, Monash University Malaysia</p> <p>The Internet of Things (IoT) is an emerging technology which leads human life to interact with billions of devices of the world<sup>[1]</sup>. This provides unsurpassed convenience in the human life. However, the open nature of interaction between IoT devices makes way for intruders to exploit the data transferring among different devices<sup>[2]</sup>. To secure each and every device in the IoT paradigm with integrity of its data is an utmost challenge to IoT community<sup>[3]</sup>. Currently, the IoT community is starting to &nbsp;think about IoT security in terms of developing embedded security solutions, middleware, cloud security, and much more. However, all these efforts count towards detection and prevention of security attacks. The recent efforts lack to investigate the source of&nbsp; the attack that cause problems for IoT paradigms. Therefore, the IoT paradigm requires forensic solutions to find the root cause and to minimize different attacks<sup>[4]</sup>. &nbsp;</p> <p>There is no single solution available to protect the entire IoT infrastructure from different security attacks. There is always an opportunity for an attacker to bypass security barriers because of rapid enhancement in the technologies, open source market, numerous applications, and various others.&nbsp;</p> <div class="readmore"><a href="/newsletter/july-2017/the-role-of-forensics-in-the-internet-of-things-motivations-and-requirements" class="btn btn-default">Read More</a></div> <hr /> <h2 style="border: none;">&nbsp;</h2> <p>&nbsp;</p> </div> <div class="clearfix"></div></article> <div id="content-column-3" class="col-md-3"> <hr class="visible-sm-block visible-xs-block" /> <div class="custom" > <div class="custom"><br /> <p style="text-align: center;"><strong>Article Contributions Welcomed</strong></p> <p style="text-align: center;"><span style="caret-color: #333333; font-family: 'Helvetica Neue'; text-size-adjust: auto;">If you wish to have an internet policy related article considered for publication, please contact the <a href="mailto:itp-newsletter@ieee.org">Managing Editor</a> of Technology Policy and Ethics IEEE Future Directions <a href="http://sites.ieee.org/futuredirections/tech-policy-ethics/">Newsletter</a>.</span></p> <p style="text-align: center;"><a href="/images/files/newsletter/IEEE_InternetPolicy_Newsletter-Guidelines_26Mar2018.pdf" target="_blank" rel="noopener noreferrer">View Editorial Guidelines</a></p> <hr /> <p style="text-align: center;"><strong>Past Issues</strong></p> <p style="text-align: center;"><a href="/newsletter/december-2018/">December 2018</a></p> <p style="text-align: center;"><a href="/newsletter/september-2018/">September 2018</a></p> <p style="text-align: center;"><a href="/newsletter/june-2018/">June 2018</a></p> <p style="text-align: center;"><a href="/newsletter/march-2018/">March 2018</a></p> <p style="text-align: center;"><a href="/newsletter/november-2017/">November 2017</a></p> <p style="text-align: center;"><a href="/newsletter/september-2017/">September 2017</a></p> <p style="text-align: center;"><a href="/newsletter/july-2017/">July 2017</a></p> <p style="text-align: center;"><a href="/newsletter/may-2017/">May 2017</a></p> <p style="text-align: center;"><a href="/newsletter/march-2017/">March 2017</a></p> <p style="text-align: center;"><a href="/newsletter/january-2017/">January 2017</a></p> <p style="text-align: center;"><a href="/newsletter/november-2016/">November 2016</a></p> <p style="text-align: center;"><a href="/newsletter/september-2016/">September 2016</a></p> <hr /> <p style="text-align: center;"><strong>IEEE Internet Policy Newsletter Editorial Board</strong></p> <p style="text-align: center;">Dr. Ali Kashif Bashir, Interim Editor-in- Chief <br /><span style="font-family: 'Helvetica Neue', Helvetica, Verdana, Arial, sans-serif;"><span style="font-size: 13px; background-color: #ffff00;"></span></span>Dr. Syed Hassan Ahmed <br />Dr. Mudassar Ahmad <br />Dr. Onur Alparslan <br />Dr. Muhammad Bilal<br />Dr. Syed Ahmad Chan Bukhari <br />Dr. Ankur Chattopadhyay <br />Dr. Junaid Chaudhry <br />Dr. Waleed Ejaz<br />Dr. Yasir Faheem<br /> Dr. Prasun Ghosal <br />Dr. Tahir Hameed <br />Dr. Y. Sinan Hanay <br />Dr. Shagufta Henna<br />Dr. Fatima Hussain <br />Dr. Rasheed Hussain <br />Dr. Saman Iftikhar <br />Dr. Stephan Jones<br />Dr. Mohammad Saud Khan <br /> Olga Kiconco <br /> Dr. Jay Ramesh Merja <br />Dr. Mubashir Husain Rehmani <br />Dr. Hafiz Maher Ali Zeeshan</p> <hr /> <p><strong>About:</strong> This newsletter features technical, policy, social, governmental, but not political commentary related to the internet. Its contents reflect the viewpoints of the authors and do not necessarily reflect the positions and views of IEEE. It is published by the IEEE Internet Initiative to enhance knowledge and promote discussion of the issues addressed.</p> </div></div> </div> </div> </div> </div> <!-- footer --> <footer class="hidden-print"> <div class="container"> <div class="row"> <div class="col-md-12"> <hr class="footer-separator"> </div> </div> <div class="row"> <div class="col-md-10"> <ul class="list-inline"> <li> <a href="/" title="Home">Home</a> </li> <li> <a href="/home/sitemap" title="Sitemap">Sitemap</a> </li> <li> <a href="/home/contact" title="Contact IEEE Internet Initiative">Contact IEEE Internet Initiative</a> </li> <li> <a href="http://www.ieee.org/accessibility_statement.html" title="Accessibility">Accessibility</a> </li> <li> <a href="http://www.ieee.org/about/corporate/governance/p9-26.html" title="Nondiscrimination Policy">Nondiscrimination Policy</a> </li> <li> <a href="https://secure.ethicspoint.com/domain/media/en/gui/20410/index.html" title="IEEE Ethics Reporting">IEEE Ethics Reporting</a> </li> <li> <a href="http://www.ieee.org/security_privacy.html" title="IEEE Privacy Policy">IEEE Privacy Policy</a> </li> <li> <a href="https://www.ieee.org/about/help/site-terms-conditions.html" title="Terms &amp; Disclosures">Terms &amp; Disclosures</a> </li> </ul> </div> <div class="col-md-2"> <a href="http://www.ieee.org" title="IEEE.org" class="pull-right"> <img src="/templates/ieeesitetemplate/images/ieee-mb-bk.png" alt="IEEE"> </a> </div> </div> <div class="row"> <div class="col-md-12"> <p> <span class="sitename">IEEE Internet Initiative</span> <span class="sitetagline"></span> </p> </p> &copy; Copyright 2024 IEEE - All rights reserved. A public charity, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. </p> </div> </div> </div> </footer> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10