Draft - Data Security: Foundation for Smart City Development

40
Data Security: Foundation for Smart City Development by Saunya Amos College: [email protected] Professional: [email protected] Course: CTI 120 Network Security

Transcript of Draft - Data Security: Foundation for Smart City Development

Data Security: Foundation for Smart City Development

by Saunya Amos

College: [email protected]

Professional: [email protected]

Course: CTI 120 Network Security

Amos 2

Date: 11 October 2022

Instructor: M.A.Cylar

Amos 3

Table of contents

Sections Page

1. Abstract 3

2. Introduction to Smart Cities

4

3. The Future Use of Secure Data

4

4. The Future Is Now With Secured Data

5

5. Data & The Cloud

6

6. Types Of Attacks, Threats And Vulnerabilities, Risks &

Impacts

Of Data Use Via The Cloud

7

7. Ways to Secure Data 9

Amos 4

8. Data Security Has Allowed For The Development Of Smart

Cities 13

9. Conclusions

18

10. Appendix

19

11. Works Cited

20

12. Researcher’s Bio

25

13.

Amos 5

Abstract

Imagine that you awake in an apartment of a city of 30

million people. When you got out of bed, the apartment is at a

comfortable temperature. The shade curtain is drawn in the right

position according to the sunlight angel. Your refrigerator

lists caloric and nutrition intake allowed for the day base on

your morning workout. Your treadmill, monitoring bracelet and

bathroom mirror retina scan sends health updates to your doctor

automatically for your upcoming physical. While heading to work

in your car, if you decide not to work from home that day, the

GPS unit is updated for the best traffic route due to traffic

congestion, weather and sun glare. By noon, your building knows

that you and most of your neighbors are not in the building, it

reconfigures the window façade’s tint, electricity, grid usage,

lighting and HVAC system of the building to make it more energy

efficient.

Is this possible? How do all the devices obtain the needed

data? Most importantly how secure is that data? That secure

Amos 6

data is the bases for you having the ability to live in that

smart apartment, smart building and smart city. The aim of this

paper is to show how vital data security is to sustainable,

prosperous and humane growth of the earth’s future population.

Amos 7

Introduction To Smart Cities

The previous scenario includes actual secured data based

technology; it’s not just a futuristic vision. It is a current

vision of many urbanized areas. Due to the need to urbanize,

conserve land, increase resource management and economic

necessity, more and more of the earth’s population have to move

into an urbanized area. These urbanized areas that are managed

with smart data and smart technologies are called smart cities.

Smart cities already exist, particularly in Singapore and Korea.

The Future Use of Secure Data

Eun-pyeong (은은) is a district of Seoul where, “Smart city

connections enable residents in the district to receive practical

information via smart devices on their living room walls. In the

interests of residents’ safety, intelligent CCTV cameras

installed on every street corner automatically detect people

trespassing on private premises. If a person with a disability or

an elderly person carrying a location detecting device leaves

Eun-pyeong or pushes an emergency bell on the device, their

Amos 8

location is automatically sent to their guardians via text

message. The city’s high-tech street lamps reduce energy use,

broadcast audio and provide residents with wireless Internet

access. A digital newsletter provides news, the bus schedule and

other practical information to residents and visitors. Finally,

the city’s u-Green service monitors factors such as water and air

quality through a network of sensors, transmitting this

information directly to the Media Board and the devices in

citizens’ living rooms” (ITU News).

Secured data is used by smart devices providing services via

context awareness. “Context awareness refers to the idea that

computers [devices] can both sense, and react based on their

environment. Devices may have information about the circumstances

under which they are able to operate and based on rules, or an

intelligent stimulus, react accordingly” (Wikipedia). Such

technology is used by media poles in Seoul, South Korea that show

weather information, inform public about pollution, dim lights

Amos 9

based on natural light intensity and provides other services such

as functioning as a photo-booth. (Seoul Metropolitan)

The Future Is Now with Secured Data

By 2050 there will be 9 billion people on earth (CNN Wire

Staff). Six billion of these people will be in urban areas. Out

of necessity, this future population will dwell in urban centers.

In order to deal with the large populations of people in a

relatively small urban space, efficiencies have to be developed.

The efficiencies come from the use of secure data used buy smart

tools and applied to smart living.

“By 2015 there will be a mobile connection for nearly every

person on Earth” (Cisco). These connections will be substantial

because of the growth of Smart Cities. Data security is needed

because Smart City Development is a necessity for the exploding

population of earth and this development can be seriously

impaired if data security is not taken into account when

designing urbanized living areas.

Amos 10

Data is not just a collection of useless facts, symbols and

figures. It’s information that can be referenced and analyzed

for use in smart devices. Smart technologies collect data from

various sources to be analyzed and interpreted for a specific and

productive use. Smart tools use the data for governmental

services for people. By making access to services more

convenient, individuals, business, organizations, educational

facilities, governmental offices and more will have seamless

connectivity to services.

The combination of useful data being used by smart tools

allows for the rise of smart cities. But secured data is

imperative. Security is vital to protect sensitive information

about populations, companies or governments. Securing data

involves electronic security, physical security, employee

training, third-party security practices and educating the

population.

Data & The Cloud

Amos 11

When data is referred to in this research paper, it is

referring to information that is useful to individuals,

organizations or even devices. Data may be the most valuable

asset for a smart city. The phrase “using the cloud” refers to

accessing those networks of servers for various kinds of

services, including mobile internet connections and the ‘Internet

of Things’ for smart city development. The cloud is a network of

servers housed in data centers that provide services such as

sharing via social media, accessing email and stream media. All

these services involve constantly sending some type of stored

data across servers and used by an entity such as a smart city

for various services.

Today everything is found in the cloud, and in the future,

Smart Cities will be governed and managed from the cloud. Proper

smart city governance will be materialize due to the core

benefits of using the cloud which are the cloud’s growth

flexibility, speed of data transference, scalable

infrastructures, reliability, cost effectiveness, energy

sustainability and low maintenance (Lekkas). The cloud will

Amos 12

enable smart city governments to provide convenient, on-demand

service access to the public.

Because of the beneficial features of the cloud, Smart

Cities will be able to use technologies to monitor vital city-

wide services and act in real-time or even proactively based on

data. A government could monitor power usage and manage needs

based on time of year.

Types Of Attacks , Threats And Vulnerabilities, Risks & Impacts Of

Data Use Via The Cloud

Protecting data has become increasingly challenging due to

the number of connected devices to the cloud. Cyber-attacks are

becoming more frequent and sophisticated. If data and clouds are

threaten, smart cities that are based on cloud data are at even

greater risk of cyber-attacks and/or cyber- terrorism. The threat

of an attack is internal and external. Attackers or insiders may

search networks for valuable data, find vulnerabilities in the

network, then penetrate the network, disable its security, spread

within the network or to other networks and their devices to

Amos 13

obtain important data (Cengage Learning). Data, networks and

clouds are all targets of “advanced persistent threats (APTs)

[where] hackers are actively seeking to steal credit card data,

personal identifiable information (PII), critical intellectual

property (IP), and other legally protected information to retail

to the highest bidder” (Vormetric).

The destructive threats to data could be intentional, man-

made, accidental, environmental or natural. Corruption of data

during transmission across networks could be accidental or

terrorism based. Power service outage at a cloud provider could

be accidental, environmental, infrastructure base or terrorism

related. Natural attacks such as an earthquake or other natural

disasters could compromise physical devices of a data center.

In general, a man-made attack could come from cyber

criminals who steal data for mostly monetary gains and cyber

terrorist who may steal data for political beliefs to terrorize.

Some of the types of attacks include malware, virus, worms,

trogans, spyware, botnets and more. Denial of Service (DOS)

Amos 14

attacks prevents networks from performing its services that are

based in data communication (Cengage Learning 94-97). A DOS

could paralyze a smart city where billing and payment transaction

could be hindered in case of a successful DOS attack. Another

type of attack is a “Watering Hole … In such an attack, the

cyber-criminal will typically look for a “watering hole” website

that is frequented by its target group. They then infiltrate that

website and set it up with malware” (Basu).

Data resides on physical and virtual servers in data centers

full of people who may be a threat to the security of data.

These people who pose a threat are called insiders. One of the

most notable insider of late is Eric Snowden who “disclosed up to

200,000 classified documents containing details of United States,

Israeli, and British mass surveillance programs to the press”

(Wikipedia (2)).

The risk of data being compromised because of threats is

high due to more access to the data via social media. The growth

of devices accessing data via the clouds is also an increasing

Amos 15

threat to data security. Impacts include identity theft,

business interruption, loss of money and reduction in public

trust. Lawsuits may increase if data is misused or deleted.

Data privacy, confidentiality, availability, reliability and

integrity will all be impacted negatively if data is compromised.

Ways To Secure Data

The flexibility and adaptability of the cloud…”deliver[s]

integrated and scalable security solutions, allowing users to

defend against increasing frequency, scale and sophistication of

web attacks” (Basu). Possibilities for securing the cloud and

it’s valuable load, data, includes electronic and logical

security choices, physical security alternatives, data

organization, network topology structural security standards,

procedural/policy security decisions, training and recovery

plans. A multi-tiered multi-method data protection is an

intelligent way to secure data on networks. Multiple layers of

data security can protect data. Having a strong relationship

Amos 16

with organizations and governmental entities such as Computer

Emergency Readiness Team should also be considering in securing

data (CERT).

Using obscurity is a way to secure data by “obscuring to the

outside world what is on the inside makes attacks that much more

difficult” (Cengage Learning 26). This could be done in

obscuring the names of devices on a network to confuse or mislead

hackers or sniffer software.

Electronic and logical security options such as data

encryption and strong authentication and anti-malware protection

software are popular ways of securing data. Secure virtual

tunnels that allows for the secure transport of data from one

network or device to another can be implemented. Decided the

level or depth of encryption you need to counter and match your

applicable threats (Schulz). Simply keeping security software

updated could ward of threats successfully. Monitoring data

traffic for issues or vulnerabilities and implementing electronic

intrusion detection system are intelligent ways to head off a

Amos 17

cyber-attack. Use the correct level(s) of firewall protection

based on the sensitive nature of the data. Deleting information

should be done with proper software and appropriate destruction

of the data medium. Even technology used to steal information

such as, Easter Eggs, can be used as a security feature to track

data that is portable or may have been stolen (Athena).

Physical security options should not be forgotten when

planning how to secure data. Just as in electronic security,

preventing unauthorized people from accessing data and the

devices or medium the data is stored on is critical. Locked

doors, access keys, barriers, physical intrusion devices and even

biometric devices (thumb and eye scanners) are effective physical

deterrents to those not authorized to have access or to transport

data. Key-codes and door-lock combinations should be changed

regularly. Also, tracking who has the keys to locked data

filled devices or even tracking physical movement of data devices

is a good security procedure (Schulz). Evaluating the necessity

of whether information really needs to be stored on a device or

even printed and stored physically in files off secures servers

Amos 18

is another security course of action. The obscuring security

techniques can also be used as a physical security option.

Google uses obscuring by not advertising their building

locations, and keeping building street signage to a minimum.

Data organization and network topology structural security

options may just appear to be about how the data is stored, but

is very important to the security of data. The centralization of

security and location of data in the cloud helps secure that data

(Lekkas). This centralization helps make it easier to deploy

security software and procedures. Also, structuring the data,

unifying records, and organizing how the data is analyzed help

secure data.

A procedural and policy security option for preventing

accidental or intentional infection or corruption of information

is a security plan. Security plans are necessary to standardize

data security protection across organizations and departments of

an entity such as a smart city. It is a good security policy to

understand and be knowledgeable about threats and

vulnerabilities. There should be a policy to change password

Amos 19

often. And standards should be developed for workplace use of

BYOD’s (Bring Your Own Devices i.e. personal cellphones, laptops

and USB sticks).

As part of the security plan, you should know the

information you have or will have. Then you will also review

which data will be targeted more often, such as banking, credit

card, health records and identification numbers. Be selective in

the data you have or will gather. Decided how long to keep the

data (if it’s not in your system, it can’t be stolen). Have a

procedure for proper deposal of electronic data and medium that

stores the data. Evaluate whether information needs to be stored

off secured servers on devices like employee laptops. Note

practices such as regular emailing and carrying data on non-

password protected USB sticks are not secure ways to transmit

sensitive data.

Include in the security plan how or where is the information

coming from and how data is collected, whether that be from

websites, cash registers, mobile devices, email or any other

sources. As part of the plan, take stock of where exactly is

Amos 20

that data stored. It can be stored in networks, printouts that

must be stored and shredded securely, third-party data centers or

even employees’ laptops and electronic equipment. Lastly, decide

who has access to the various types of data at various levels.

Those who have access could include vendors, contractors,

employees and the public. Store and secure data according to

importance

Plan for when data security will be breached and the

recovery after the breach. Have a forensic server for

collecting data from a potentially compromised system to preserve

probable evidence on the system to determine the nature of the

incident so as to know how to protect the system in the future.

Develop a backup strategy, including the process of performing

backups, to insure that backups and archives are secure (Schulz).

Data protection laws created by governments and implanted by

organizations are essential to securing data. “Most data privacy

laws have a restriction on the transfer of data to a country

which does not have similar or equivalent levels of data

protection laws. This would impact the locations to which data

Amos 21

may be transferred for storage or processing by the cloud service

provider/cloud to service user” (Ko).

Training is a security option. Train Employees, the public

and third party service providers to recognize vulnerabilities

and security threats. Train employees on of current issues,

tricks, scams, phone phishing cons and threats used to obtain

sensitive data. Have employees perform background checks. For

employees who work from home, they too must follow the same

company security plans as on-site employees.

Know your vendors and who they partner with or employ.

Edward Snowden’s leaking NSA information is a prime example of

the need to have trust in your vendors hiring decisions

(Wikipedia (2)). Often services are contracted out to third-

party providers such as payroll, web hosting and customer call

center operations. Smart city governments will have to rely on

vendors to notify them of security problems.

The general public should be made aware of risk and impacts

of cyber terrorism, identity theft, malware and privacy issues,

Amos 22

even though the risks may be low. The public should be trained

on safe ways to communicate data and use smart devices in the

cloud-based smart city environment (Hi Seoul).

Data Security Has Allowed For The Development Of Smart Cities

In order for a smart city to develop and utilize collected

information, that information must be securely stored and

communicated. The entire concept and mission of a smart city

relies on secured data. Some of the mission and operations of a

smart city include providing the public with economic,

educational, health, energy, communication, safety and

transportation services.

Obtaining secured data via cloud services allows for the

speed and efficiency in which a smart city needs to collect,

analyze and use information to be productive and viable. Data

security allows for smart cities to continue to grow efficiently.

Smart cities use cloud-based data to improve e-governance

with the delivery of governmental services to public, businesses

Amos 23

and organizations. Cities can provide location based services

where the public can communicate issues such as pothole problems

or trash removal needs.

The most notable beneficial feature of the usage of cloud-

based secured data is the economic savings and growth potential.

Operating a mega urban development such as a smart city via a

cloud reduces the operating costs of city services. Many direct

economic transactions such as banking, money transfers, payments,

electronic paycheck delivery and shopping can be made more

efficient, thus prompting interest in the public to consume and

spend more. An example of cloud-based shopping is the case of

virtual store shopping in Korea where commuters can use their

smart phones to scan QR codes of products they wish to buy at a

virtual wall store in the subway and have it delivered to their

homes (Tesco).

Securing data is good for business. Business and consumers

confidence is boosted because of efficient secured ways to

conduct transactions, and this stimulates consumption, therefore

economic growth allows for new businesses based on data. Data

Amos 24

security allows for this new type of cloud-based, data driven

businesses to work in a smart city environment. And a smart city

is designed to provide for the needs of this new emerging

business types. Low overheard of cloud-based business will make

it possible for the creation of new innovative businesses. This

sets up the potential for new, better, more and higher sources of

revenue/profits for indirect businesses. In turn, this will also

mean more sources of employment and income for the public, and of

course, more diverse sources of revenue for governmental based on

taxes (Song).

Intelligent delivery of educational services can be

implemented via the cloud. The digital divide can be reduced

with improved infrastructure and data management (Seoul

Metropolitan). Classes can be live or delivered 24-hours a day

to public or private locations with no additional cost. This

means, that those with physical or time constraints can

continually receive quality education.

The improvement of health services to the public like remote

based health check-ups and medical consultations is another

Amos 25

mission of a smart city. Cloud-based health monitoring systems

“can automatically identify personal profiles, upload blood

pressure records to cloud servers, analyse blood pressure

changes, and send text messages or emails if the system detects

any abnormal findings” (Ng).

Concerning energy services, secured data allows for smart

cities to implement green initiatives and become low carbon

cities that positively impact energy usage and the environment, a

major mission in intelligent urban city design. Tools like smart

meters use data to reduce a city’s total energy usage with energy

shut-off technology and increase solar usage. To make informed

economical and energy usage decisions; indivuals, businesses and

governmental offices will have real-time reports of their

electricity, water and gas consumption (Hi Seoul) (ITU News).

Communication services via public Wi-Fi will only be useful

if data is secured. Public access to Wi-Fi is the key way

governments of smart cities send to and receive from the public,

important data used for governmental services. Data will be

Amos 26

practically important to libraries, public venues and special

media stations on public streets and thoroughfares.

An example of this big data communication using smart tools

to inform the public are “Media Poles” located on Gangnamdaero

road in Gangnam, Seoul, South Korea. A “Media Pole is a 12-meter

tall integrated street facility offering ubiquitous high-tech

services and digital content…[A] Media Pole features public

transportation information, such as a subway map and bus routes,

as well as a built-in camera, giving users the opportunity to

send an impromptu photo via a photo-mail service…Around a Media

Pole, wireless internet connection is available” (Seoul

Metropolitan).

Secured data usage will allow a smart city to advance safety

and security services. This advancement is because smart tools

and technologies will allow the governments to monitory, in real-

time, public environments (and some private environments when

requested) and respond almost instantaneously to any public

health and safety issues. Safety and security services and

tools, like the Media Poles, can inform the public by sending

Amos 27

warning messages to citizens via websites and mobile devices. A

“Media Pole is a state-of-the-art facility offering digital

content as well as functioning as a streetlamp,” to light the

pedestrians way at night (Seoul Metropolitan). A Media Pole also

employs “state-of-the-art location-based and CCTV technologies to

notify authorities and family members of emergencies involving

children, people with disabilities, the elderly, and people

suffering from Alzheimer’s disease. A smart device has been

developed for this purpose. When the holder of the device leaves

a designated safe zone or pushes an emergency button, an alert is

sent to guardians, police, fire departments and CCTV control

centers” (ITU News). Sensors for emergency bells or other

emergency-signaling sounds can be used as part of a disaster

response system (Hi Seoul).

Governmental transportation services use secured data that

is interpreted by “specialized algorithms that analyze real-time

traffic scenes and turn that data into meaningful and actionable

information,” to combat intentional or accidental threats

(Iteris). As mentioned before, threats can result from acts of

Amos 28

nature (i.e., hurricanes, earthquakes), terrorist attacks or

other incidents causing damage to the physical and data

infrastructure (e.g., stray barge hitting a bridge support)

(Iteris (2)). Again, a Media Pole can perform various functions

such as pedestrian and traffic signaling. Simultaneously, Media

Poles can show information to drivers on the road and pedestrians

(Seoul Metropolitan).

Secured data can protect transportation structures when used

to monitor “transportation infrastructure (e.g., bridges, tunnels

and management centers) for threats using sensors and

surveillance equipment and barrier and safeguard systems to

control access” (Iteris (2)).

Data based traffic management along with cameras, video-

based vehicle detection and onboard vehicle black-boxes, can

reduce traffic congestion, fuel consumption, while reducing air

pollution and decreasing accidents. Integrated public

transportation data collection devices in public transportation,

such as taxis, ambulances, trains etc. will help with informing

users of waiting times (Hi Seoul). Even weather issues and road

Amos 29

conditions can be monitored; the data analyzed and used for

inform the public.

Conclusions

The mission of a smart city involves creating a sustainable

society that satisfies both environmental and economic

considerations (4 Hitachi). “Improved infrastructure for

Information and Communication Technologies and Smart devices has

made it possible for people to work smart” (Hi Seoul). There is a

demand for smart cities along with their low-carbon and efficient

services. Thus, this makes for an even greater need for data

secured cloud based services.

This paper strove to show that data security is the bases of

the usability of cloud services for proper e-governance of a

smart city. Data can be attacked from multiple fronts in various

ways. The key to securing data is being proactive in protecting

that data. General layering and diversifying security to slow

illegal access to data are great are essential security methods.

The availability, confidentiality and integrity of data must be

Amos 30

protected as so not to impact public in a negative way.

Preventative measures, quick response and backup plans are all

ways to secure data. With secure data, Smart Cities can exist to

help improved the lives and business of the future urbanized

public.

Amos 31

Appendix

The Digital Gallery A transportation information service

Students enjoy a game at the Media Pole.

A tourist uses the photo-mail service.

The above are images of Media Poles in South Korea. “Media Pole features public transportation information, such as a subway map and bus routes, as well as a built-in camera, giving users the opportunityto send an impromptu photo via a photo-mail service” (Seoul Metropolitan).

Amos 32

Amos 33

Works Cited (MLA Format)

Athena: Goddess of War (아아아). Dir. Kwon Yong-Kwan. Perf. Woo-sung

Jung, Soo Ae and Seung-won Cha. 2010-2011. Taewon

Entertainment, 2010. DVD.

Basu, Medha. “Government Cloud, Information Security: Extending

The Security Perimeter With Cloud.” FutureGov.asia, 6

November 2013. Web. 30 November 2013

http://www.futuregov.asia/articles/2013/nov/06/extending-

security-perimeter-cloud/

Cengage Learning. CTI 120 Network & Security Foundations Wake Technical

Community College 4th Edition. Mason, Ohio: Cengage Learning,

2012, 2009, 2005, 2003 Print

CERT. “CERT Spotlight: Mitigating Threats from Within.”

Cert.org, n.d. Web. 30 November 2013

http://www.cert.org

Amos 34

Cisco. “What happens when we all connect to the Internet?”

Cisco.com: Tomorrow Starts Here, n.d. Web. 30 November 2013

http://www.cisco.com/web/tomorrow-starts-here/mobiledata/

index.html

CNN Wire Staff. “U.N.: Earth’s population to hit 9 billion by

2050, 10 billion by 2100.” CNN.com, 04 May 2011. Web. 30

November 2013

http://www.cnn.com/2011/US/05/03/united.nations.population.f

orecast/

Hi Seoul. “Smart Seoul 2015.” English.Seoul.go.kr. VisitSeoul.net,

n.d. Web & Pdf. 30 November 2013

http://isstat.seoul.go.kr/library/common/download.php?

fileDir=/community/&fileName=SMART_SEOUL_2015_4.pdf

Hitachi, Ltd.. “Hitachi’s Vision of the Smart City –Seeking a

Well-balanced Relationship between People and the Earth.”

Amos 35

Hitachi.com, September 2013. Web & PDF. 30 November 2013

http://www.hitachi.com/products/smartcity/download/pdf/white

paper.pdf

Iteris. “Detection Solutions.” Iteris.com, n.d. Web. 30

November 2013 http://www.iteris.com/solutions

Iteris (2). “DetectionSolutions.” Iteris.com, n.d. Web. 30

November 2013

http://www.iteris.com/itsarch/html/mp/mpem05.htm

ITU News. “Smart Seoul.” ITU News, n.d.. Web. 30 November 2013.

https://itunews.itu.int/en/4148-Smart-Seoul.note.aspx

Ko, Carol. “Data protection laws II – APAC data privacy laws

update.” AsiaCloudForum.com, 11 September 2012. Web. 30

November 2013 http://www.asiacloudforum.com/content/data-

protection-laws-ii-apac-data-privacy-laws-update

Amos 36

Lekkas, Dimitrios and Zissis, Dimitrios. “Future Generation

Computer Systems.” The International Journal of Grid

Computing and eScience. 28 (2012): 583-592 Print & Web. 30

November 2013

http://www.journals.elsevier.com/future-generation-computer-

systems and

http://www.cse.msstate.edu/~dampier/cse8993/zissis%20and

%20lekkas.pdf

Ng, Kelly. “Government Cloud, Healthcare It, Local Government:

Cloud-Based Health Monitoring System For Taipei Government.”

FutureGov.asia, 17 September 2013. Web. 30 November 2013

http://www.futuregov.asia/articles/2013/sep/17/cloud-based-

health-monitoring-system-taipei-govern/

Schulz, Greg. “Top 10 ways to secure your stored data: Multiple

layers of defense can isolate and protect data.”

ComputerWorld.com, 3 August 2006. Web.

Amos 37

30 November 2013

http://www.computerworld.com/s/article/9002188/Top_10_ways_t

o_secure_your_stored_data

Seoul Metropolitan Government Tourism Division. “Media Poles.”

VisitSeoul.net, 07 December 2011. Web. 30 November 2013

http://www.visitseoul.net/en/article/article.do?

_method=view&m=0004003002004&p=03&art_id=381&lang=en

Song, Yan (Professor) and Peng, K. (Graduate Student) of UNC-

Chapel Hill, City and Regional Planning. “Infrastructure

and Urban Development: Evidence from Chinese Cities.” Global

Asia. New Asia? Urbanization and Other Tectonic Shifts Workshop, 02

November 2013. Presentation

Tesco. “Tesco opens world’s first virtual store.” Archello.com,

n.d. Web. 30 November 2013.

http://www.archello.com/en/project/tesco-opens-worlds-first-

virtual-store#, http://www.archello.com/en/project/tesco-

Amos 38

opens-worlds-first-virtual-store/image-2

Vormetric “Vormetric Enhances Security Information and Event

Management with Data Security Intelligence.” Vormetric.com,

n.d. Web. 30 November 2013. http://www.vormetric.com/data-

security-solutions/applications/security-intelligence

Wikipedia. “Context awareness.” Wikipedia, 13 November 2013.

Web. 30 November 2013.

http://en.wikipedia.org/wiki/Context_awareness

Wikipedia (2). “Edward Snowden.” Wikipedia, 30 November 2013.

Web. 30 November 2013.

http://en.wikipedia.org/wiki/Edward_Snowden

Amos 39

Researcher’s Bio

Saunya Amos is a self-described technology,data and sustainability geek and enthusiast. She holds a B.S. in MechanicalEngineering from NC A&T State University, M.S. in Information Technology from American InterContinental University (Atlanta, Georgia, USA), Certificate of E-Commerce Marketing from Gwinnett Technical College, Certificate of Horticulture & Greenhouse from Johnston Community College

and is currently working towards an Associate of Applied Science in Data Storage & Virtualization, A.A.S Business Analytics and Android Application Certificate at Wake Technical Community.

Saunya’s past professional experiences includes project engineer,computer information instructor, web coordinator, English instructor in Japan, horticulture & greenhouse technician and currently social media coordinator of owner operated jewelry, art, health, technology and culture blogs. She enjoys, using social media to promote interest in cultures & technology (especially Japanese, Korean & Singaporean), languages (especially Japanese and Korean), sustainability, urban farming, big data analysis & storage, smart cites and smart technology.

Saunya’s goal is to assist technological and sustainability focused countries, regions, governments and businesses with information assurance and implementing smart technology based infrastructure, e-governance, app & data management and urban agriculture.

“live local, think global, act mobile™”

Amos 40

Twitter: @SaunyaAmosLinkedIn: Saunya