Reference Hub2
Privacy and Security in Data-Driven Urban Mobility

Privacy and Security in Data-Driven Urban Mobility

Rajendra Akerkar
Copyright: © 2019 |Pages: 23
ISBN13: 9781522549635|ISBN10: 1522549633|ISBN13 Softcover: 9781522588139|EISBN13: 9781522549642
DOI: 10.4018/978-1-5225-4963-5.ch004
Cite Chapter Cite Chapter

MLA

Akerkar, Rajendra. "Privacy and Security in Data-Driven Urban Mobility." Utilizing Big Data Paradigms for Business Intelligence, edited by Jérôme Darmont and Sabine Loudcher, IGI Global, 2019, pp. 106-128. https://doi.org/10.4018/978-1-5225-4963-5.ch004

APA

Akerkar, R. (2019). Privacy and Security in Data-Driven Urban Mobility. In J. Darmont & S. Loudcher (Eds.), Utilizing Big Data Paradigms for Business Intelligence (pp. 106-128). IGI Global. https://doi.org/10.4018/978-1-5225-4963-5.ch004

Chicago

Akerkar, Rajendra. "Privacy and Security in Data-Driven Urban Mobility." In Utilizing Big Data Paradigms for Business Intelligence, edited by Jérôme Darmont and Sabine Loudcher, 106-128. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-4963-5.ch004

Export Reference

Mendeley
Favorite

Abstract

A wide range of smart mobility technologies are being deployed within urban environment. These technologies generate huge quantities of data, much of them in real-time and at a highly granular scale. Such data about mobility, transport, and citizens can be put to many beneficial uses and, if shared, for uses beyond the system and purposes for which they were generated. Jointly, these data create the evidence base to run mobility services more efficiently, effectively, and sustainably. However, generating, processing, analyzing, sharing, and storing vast amounts of actionable data also raises several concerns and challenges. For example, data privacy, data protection, and data security issues arise from the creation of smart mobility. This chapter highlights the various privacy and security concerns and harms related to the deployment and use of smart mobility technologies and initiatives, and makes suggestions for addressing apprehensions about and harms arising from data privacy, protection, and security issues.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.