Data Security: Foundation for Smart City Development
by Saunya Amos
College: [email protected]
Professional: [email protected]
Course: CTI 120 Network Security
Amos 3
Table of contents
Sections Page
1. Abstract 3
2. Introduction to Smart Cities
4
3. The Future Use of Secure Data
4
4. The Future Is Now With Secured Data
5
5. Data & The Cloud
6
6. Types Of Attacks, Threats And Vulnerabilities, Risks &
Impacts
Of Data Use Via The Cloud
7
7. Ways to Secure Data 9
Amos 4
8. Data Security Has Allowed For The Development Of Smart
Cities 13
9. Conclusions
18
10. Appendix
19
11. Works Cited
20
12. Researcher’s Bio
25
13.
Amos 5
Abstract
Imagine that you awake in an apartment of a city of 30
million people. When you got out of bed, the apartment is at a
comfortable temperature. The shade curtain is drawn in the right
position according to the sunlight angel. Your refrigerator
lists caloric and nutrition intake allowed for the day base on
your morning workout. Your treadmill, monitoring bracelet and
bathroom mirror retina scan sends health updates to your doctor
automatically for your upcoming physical. While heading to work
in your car, if you decide not to work from home that day, the
GPS unit is updated for the best traffic route due to traffic
congestion, weather and sun glare. By noon, your building knows
that you and most of your neighbors are not in the building, it
reconfigures the window façade’s tint, electricity, grid usage,
lighting and HVAC system of the building to make it more energy
efficient.
Is this possible? How do all the devices obtain the needed
data? Most importantly how secure is that data? That secure
Amos 6
data is the bases for you having the ability to live in that
smart apartment, smart building and smart city. The aim of this
paper is to show how vital data security is to sustainable,
prosperous and humane growth of the earth’s future population.
Amos 7
Introduction To Smart Cities
The previous scenario includes actual secured data based
technology; it’s not just a futuristic vision. It is a current
vision of many urbanized areas. Due to the need to urbanize,
conserve land, increase resource management and economic
necessity, more and more of the earth’s population have to move
into an urbanized area. These urbanized areas that are managed
with smart data and smart technologies are called smart cities.
Smart cities already exist, particularly in Singapore and Korea.
The Future Use of Secure Data
Eun-pyeong (은은) is a district of Seoul where, “Smart city
connections enable residents in the district to receive practical
information via smart devices on their living room walls. In the
interests of residents’ safety, intelligent CCTV cameras
installed on every street corner automatically detect people
trespassing on private premises. If a person with a disability or
an elderly person carrying a location detecting device leaves
Eun-pyeong or pushes an emergency bell on the device, their
Amos 8
location is automatically sent to their guardians via text
message. The city’s high-tech street lamps reduce energy use,
broadcast audio and provide residents with wireless Internet
access. A digital newsletter provides news, the bus schedule and
other practical information to residents and visitors. Finally,
the city’s u-Green service monitors factors such as water and air
quality through a network of sensors, transmitting this
information directly to the Media Board and the devices in
citizens’ living rooms” (ITU News).
Secured data is used by smart devices providing services via
context awareness. “Context awareness refers to the idea that
computers [devices] can both sense, and react based on their
environment. Devices may have information about the circumstances
under which they are able to operate and based on rules, or an
intelligent stimulus, react accordingly” (Wikipedia). Such
technology is used by media poles in Seoul, South Korea that show
weather information, inform public about pollution, dim lights
Amos 9
based on natural light intensity and provides other services such
as functioning as a photo-booth. (Seoul Metropolitan)
The Future Is Now with Secured Data
By 2050 there will be 9 billion people on earth (CNN Wire
Staff). Six billion of these people will be in urban areas. Out
of necessity, this future population will dwell in urban centers.
In order to deal with the large populations of people in a
relatively small urban space, efficiencies have to be developed.
The efficiencies come from the use of secure data used buy smart
tools and applied to smart living.
“By 2015 there will be a mobile connection for nearly every
person on Earth” (Cisco). These connections will be substantial
because of the growth of Smart Cities. Data security is needed
because Smart City Development is a necessity for the exploding
population of earth and this development can be seriously
impaired if data security is not taken into account when
designing urbanized living areas.
Amos 10
Data is not just a collection of useless facts, symbols and
figures. It’s information that can be referenced and analyzed
for use in smart devices. Smart technologies collect data from
various sources to be analyzed and interpreted for a specific and
productive use. Smart tools use the data for governmental
services for people. By making access to services more
convenient, individuals, business, organizations, educational
facilities, governmental offices and more will have seamless
connectivity to services.
The combination of useful data being used by smart tools
allows for the rise of smart cities. But secured data is
imperative. Security is vital to protect sensitive information
about populations, companies or governments. Securing data
involves electronic security, physical security, employee
training, third-party security practices and educating the
population.
Data & The Cloud
Amos 11
When data is referred to in this research paper, it is
referring to information that is useful to individuals,
organizations or even devices. Data may be the most valuable
asset for a smart city. The phrase “using the cloud” refers to
accessing those networks of servers for various kinds of
services, including mobile internet connections and the ‘Internet
of Things’ for smart city development. The cloud is a network of
servers housed in data centers that provide services such as
sharing via social media, accessing email and stream media. All
these services involve constantly sending some type of stored
data across servers and used by an entity such as a smart city
for various services.
Today everything is found in the cloud, and in the future,
Smart Cities will be governed and managed from the cloud. Proper
smart city governance will be materialize due to the core
benefits of using the cloud which are the cloud’s growth
flexibility, speed of data transference, scalable
infrastructures, reliability, cost effectiveness, energy
sustainability and low maintenance (Lekkas). The cloud will
Amos 12
enable smart city governments to provide convenient, on-demand
service access to the public.
Because of the beneficial features of the cloud, Smart
Cities will be able to use technologies to monitor vital city-
wide services and act in real-time or even proactively based on
data. A government could monitor power usage and manage needs
based on time of year.
Types Of Attacks , Threats And Vulnerabilities, Risks & Impacts Of
Data Use Via The Cloud
Protecting data has become increasingly challenging due to
the number of connected devices to the cloud. Cyber-attacks are
becoming more frequent and sophisticated. If data and clouds are
threaten, smart cities that are based on cloud data are at even
greater risk of cyber-attacks and/or cyber- terrorism. The threat
of an attack is internal and external. Attackers or insiders may
search networks for valuable data, find vulnerabilities in the
network, then penetrate the network, disable its security, spread
within the network or to other networks and their devices to
Amos 13
obtain important data (Cengage Learning). Data, networks and
clouds are all targets of “advanced persistent threats (APTs)
[where] hackers are actively seeking to steal credit card data,
personal identifiable information (PII), critical intellectual
property (IP), and other legally protected information to retail
to the highest bidder” (Vormetric).
The destructive threats to data could be intentional, man-
made, accidental, environmental or natural. Corruption of data
during transmission across networks could be accidental or
terrorism based. Power service outage at a cloud provider could
be accidental, environmental, infrastructure base or terrorism
related. Natural attacks such as an earthquake or other natural
disasters could compromise physical devices of a data center.
In general, a man-made attack could come from cyber
criminals who steal data for mostly monetary gains and cyber
terrorist who may steal data for political beliefs to terrorize.
Some of the types of attacks include malware, virus, worms,
trogans, spyware, botnets and more. Denial of Service (DOS)
Amos 14
attacks prevents networks from performing its services that are
based in data communication (Cengage Learning 94-97). A DOS
could paralyze a smart city where billing and payment transaction
could be hindered in case of a successful DOS attack. Another
type of attack is a “Watering Hole … In such an attack, the
cyber-criminal will typically look for a “watering hole” website
that is frequented by its target group. They then infiltrate that
website and set it up with malware” (Basu).
Data resides on physical and virtual servers in data centers
full of people who may be a threat to the security of data.
These people who pose a threat are called insiders. One of the
most notable insider of late is Eric Snowden who “disclosed up to
200,000 classified documents containing details of United States,
Israeli, and British mass surveillance programs to the press”
(Wikipedia (2)).
The risk of data being compromised because of threats is
high due to more access to the data via social media. The growth
of devices accessing data via the clouds is also an increasing
Amos 15
threat to data security. Impacts include identity theft,
business interruption, loss of money and reduction in public
trust. Lawsuits may increase if data is misused or deleted.
Data privacy, confidentiality, availability, reliability and
integrity will all be impacted negatively if data is compromised.
Ways To Secure Data
The flexibility and adaptability of the cloud…”deliver[s]
integrated and scalable security solutions, allowing users to
defend against increasing frequency, scale and sophistication of
web attacks” (Basu). Possibilities for securing the cloud and
it’s valuable load, data, includes electronic and logical
security choices, physical security alternatives, data
organization, network topology structural security standards,
procedural/policy security decisions, training and recovery
plans. A multi-tiered multi-method data protection is an
intelligent way to secure data on networks. Multiple layers of
data security can protect data. Having a strong relationship
Amos 16
with organizations and governmental entities such as Computer
Emergency Readiness Team should also be considering in securing
data (CERT).
Using obscurity is a way to secure data by “obscuring to the
outside world what is on the inside makes attacks that much more
difficult” (Cengage Learning 26). This could be done in
obscuring the names of devices on a network to confuse or mislead
hackers or sniffer software.
Electronic and logical security options such as data
encryption and strong authentication and anti-malware protection
software are popular ways of securing data. Secure virtual
tunnels that allows for the secure transport of data from one
network or device to another can be implemented. Decided the
level or depth of encryption you need to counter and match your
applicable threats (Schulz). Simply keeping security software
updated could ward of threats successfully. Monitoring data
traffic for issues or vulnerabilities and implementing electronic
intrusion detection system are intelligent ways to head off a
Amos 17
cyber-attack. Use the correct level(s) of firewall protection
based on the sensitive nature of the data. Deleting information
should be done with proper software and appropriate destruction
of the data medium. Even technology used to steal information
such as, Easter Eggs, can be used as a security feature to track
data that is portable or may have been stolen (Athena).
Physical security options should not be forgotten when
planning how to secure data. Just as in electronic security,
preventing unauthorized people from accessing data and the
devices or medium the data is stored on is critical. Locked
doors, access keys, barriers, physical intrusion devices and even
biometric devices (thumb and eye scanners) are effective physical
deterrents to those not authorized to have access or to transport
data. Key-codes and door-lock combinations should be changed
regularly. Also, tracking who has the keys to locked data
filled devices or even tracking physical movement of data devices
is a good security procedure (Schulz). Evaluating the necessity
of whether information really needs to be stored on a device or
even printed and stored physically in files off secures servers
Amos 18
is another security course of action. The obscuring security
techniques can also be used as a physical security option.
Google uses obscuring by not advertising their building
locations, and keeping building street signage to a minimum.
Data organization and network topology structural security
options may just appear to be about how the data is stored, but
is very important to the security of data. The centralization of
security and location of data in the cloud helps secure that data
(Lekkas). This centralization helps make it easier to deploy
security software and procedures. Also, structuring the data,
unifying records, and organizing how the data is analyzed help
secure data.
A procedural and policy security option for preventing
accidental or intentional infection or corruption of information
is a security plan. Security plans are necessary to standardize
data security protection across organizations and departments of
an entity such as a smart city. It is a good security policy to
understand and be knowledgeable about threats and
vulnerabilities. There should be a policy to change password
Amos 19
often. And standards should be developed for workplace use of
BYOD’s (Bring Your Own Devices i.e. personal cellphones, laptops
and USB sticks).
As part of the security plan, you should know the
information you have or will have. Then you will also review
which data will be targeted more often, such as banking, credit
card, health records and identification numbers. Be selective in
the data you have or will gather. Decided how long to keep the
data (if it’s not in your system, it can’t be stolen). Have a
procedure for proper deposal of electronic data and medium that
stores the data. Evaluate whether information needs to be stored
off secured servers on devices like employee laptops. Note
practices such as regular emailing and carrying data on non-
password protected USB sticks are not secure ways to transmit
sensitive data.
Include in the security plan how or where is the information
coming from and how data is collected, whether that be from
websites, cash registers, mobile devices, email or any other
sources. As part of the plan, take stock of where exactly is
Amos 20
that data stored. It can be stored in networks, printouts that
must be stored and shredded securely, third-party data centers or
even employees’ laptops and electronic equipment. Lastly, decide
who has access to the various types of data at various levels.
Those who have access could include vendors, contractors,
employees and the public. Store and secure data according to
importance
Plan for when data security will be breached and the
recovery after the breach. Have a forensic server for
collecting data from a potentially compromised system to preserve
probable evidence on the system to determine the nature of the
incident so as to know how to protect the system in the future.
Develop a backup strategy, including the process of performing
backups, to insure that backups and archives are secure (Schulz).
Data protection laws created by governments and implanted by
organizations are essential to securing data. “Most data privacy
laws have a restriction on the transfer of data to a country
which does not have similar or equivalent levels of data
protection laws. This would impact the locations to which data
Amos 21
may be transferred for storage or processing by the cloud service
provider/cloud to service user” (Ko).
Training is a security option. Train Employees, the public
and third party service providers to recognize vulnerabilities
and security threats. Train employees on of current issues,
tricks, scams, phone phishing cons and threats used to obtain
sensitive data. Have employees perform background checks. For
employees who work from home, they too must follow the same
company security plans as on-site employees.
Know your vendors and who they partner with or employ.
Edward Snowden’s leaking NSA information is a prime example of
the need to have trust in your vendors hiring decisions
(Wikipedia (2)). Often services are contracted out to third-
party providers such as payroll, web hosting and customer call
center operations. Smart city governments will have to rely on
vendors to notify them of security problems.
The general public should be made aware of risk and impacts
of cyber terrorism, identity theft, malware and privacy issues,
Amos 22
even though the risks may be low. The public should be trained
on safe ways to communicate data and use smart devices in the
cloud-based smart city environment (Hi Seoul).
Data Security Has Allowed For The Development Of Smart Cities
In order for a smart city to develop and utilize collected
information, that information must be securely stored and
communicated. The entire concept and mission of a smart city
relies on secured data. Some of the mission and operations of a
smart city include providing the public with economic,
educational, health, energy, communication, safety and
transportation services.
Obtaining secured data via cloud services allows for the
speed and efficiency in which a smart city needs to collect,
analyze and use information to be productive and viable. Data
security allows for smart cities to continue to grow efficiently.
Smart cities use cloud-based data to improve e-governance
with the delivery of governmental services to public, businesses
Amos 23
and organizations. Cities can provide location based services
where the public can communicate issues such as pothole problems
or trash removal needs.
The most notable beneficial feature of the usage of cloud-
based secured data is the economic savings and growth potential.
Operating a mega urban development such as a smart city via a
cloud reduces the operating costs of city services. Many direct
economic transactions such as banking, money transfers, payments,
electronic paycheck delivery and shopping can be made more
efficient, thus prompting interest in the public to consume and
spend more. An example of cloud-based shopping is the case of
virtual store shopping in Korea where commuters can use their
smart phones to scan QR codes of products they wish to buy at a
virtual wall store in the subway and have it delivered to their
homes (Tesco).
Securing data is good for business. Business and consumers
confidence is boosted because of efficient secured ways to
conduct transactions, and this stimulates consumption, therefore
economic growth allows for new businesses based on data. Data
Amos 24
security allows for this new type of cloud-based, data driven
businesses to work in a smart city environment. And a smart city
is designed to provide for the needs of this new emerging
business types. Low overheard of cloud-based business will make
it possible for the creation of new innovative businesses. This
sets up the potential for new, better, more and higher sources of
revenue/profits for indirect businesses. In turn, this will also
mean more sources of employment and income for the public, and of
course, more diverse sources of revenue for governmental based on
taxes (Song).
Intelligent delivery of educational services can be
implemented via the cloud. The digital divide can be reduced
with improved infrastructure and data management (Seoul
Metropolitan). Classes can be live or delivered 24-hours a day
to public or private locations with no additional cost. This
means, that those with physical or time constraints can
continually receive quality education.
The improvement of health services to the public like remote
based health check-ups and medical consultations is another
Amos 25
mission of a smart city. Cloud-based health monitoring systems
“can automatically identify personal profiles, upload blood
pressure records to cloud servers, analyse blood pressure
changes, and send text messages or emails if the system detects
any abnormal findings” (Ng).
Concerning energy services, secured data allows for smart
cities to implement green initiatives and become low carbon
cities that positively impact energy usage and the environment, a
major mission in intelligent urban city design. Tools like smart
meters use data to reduce a city’s total energy usage with energy
shut-off technology and increase solar usage. To make informed
economical and energy usage decisions; indivuals, businesses and
governmental offices will have real-time reports of their
electricity, water and gas consumption (Hi Seoul) (ITU News).
Communication services via public Wi-Fi will only be useful
if data is secured. Public access to Wi-Fi is the key way
governments of smart cities send to and receive from the public,
important data used for governmental services. Data will be
Amos 26
practically important to libraries, public venues and special
media stations on public streets and thoroughfares.
An example of this big data communication using smart tools
to inform the public are “Media Poles” located on Gangnamdaero
road in Gangnam, Seoul, South Korea. A “Media Pole is a 12-meter
tall integrated street facility offering ubiquitous high-tech
services and digital content…[A] Media Pole features public
transportation information, such as a subway map and bus routes,
as well as a built-in camera, giving users the opportunity to
send an impromptu photo via a photo-mail service…Around a Media
Pole, wireless internet connection is available” (Seoul
Metropolitan).
Secured data usage will allow a smart city to advance safety
and security services. This advancement is because smart tools
and technologies will allow the governments to monitory, in real-
time, public environments (and some private environments when
requested) and respond almost instantaneously to any public
health and safety issues. Safety and security services and
tools, like the Media Poles, can inform the public by sending
Amos 27
warning messages to citizens via websites and mobile devices. A
“Media Pole is a state-of-the-art facility offering digital
content as well as functioning as a streetlamp,” to light the
pedestrians way at night (Seoul Metropolitan). A Media Pole also
employs “state-of-the-art location-based and CCTV technologies to
notify authorities and family members of emergencies involving
children, people with disabilities, the elderly, and people
suffering from Alzheimer’s disease. A smart device has been
developed for this purpose. When the holder of the device leaves
a designated safe zone or pushes an emergency button, an alert is
sent to guardians, police, fire departments and CCTV control
centers” (ITU News). Sensors for emergency bells or other
emergency-signaling sounds can be used as part of a disaster
response system (Hi Seoul).
Governmental transportation services use secured data that
is interpreted by “specialized algorithms that analyze real-time
traffic scenes and turn that data into meaningful and actionable
information,” to combat intentional or accidental threats
(Iteris). As mentioned before, threats can result from acts of
Amos 28
nature (i.e., hurricanes, earthquakes), terrorist attacks or
other incidents causing damage to the physical and data
infrastructure (e.g., stray barge hitting a bridge support)
(Iteris (2)). Again, a Media Pole can perform various functions
such as pedestrian and traffic signaling. Simultaneously, Media
Poles can show information to drivers on the road and pedestrians
(Seoul Metropolitan).
Secured data can protect transportation structures when used
to monitor “transportation infrastructure (e.g., bridges, tunnels
and management centers) for threats using sensors and
surveillance equipment and barrier and safeguard systems to
control access” (Iteris (2)).
Data based traffic management along with cameras, video-
based vehicle detection and onboard vehicle black-boxes, can
reduce traffic congestion, fuel consumption, while reducing air
pollution and decreasing accidents. Integrated public
transportation data collection devices in public transportation,
such as taxis, ambulances, trains etc. will help with informing
users of waiting times (Hi Seoul). Even weather issues and road
Amos 29
conditions can be monitored; the data analyzed and used for
inform the public.
Conclusions
The mission of a smart city involves creating a sustainable
society that satisfies both environmental and economic
considerations (4 Hitachi). “Improved infrastructure for
Information and Communication Technologies and Smart devices has
made it possible for people to work smart” (Hi Seoul). There is a
demand for smart cities along with their low-carbon and efficient
services. Thus, this makes for an even greater need for data
secured cloud based services.
This paper strove to show that data security is the bases of
the usability of cloud services for proper e-governance of a
smart city. Data can be attacked from multiple fronts in various
ways. The key to securing data is being proactive in protecting
that data. General layering and diversifying security to slow
illegal access to data are great are essential security methods.
The availability, confidentiality and integrity of data must be
Amos 30
protected as so not to impact public in a negative way.
Preventative measures, quick response and backup plans are all
ways to secure data. With secure data, Smart Cities can exist to
help improved the lives and business of the future urbanized
public.
Amos 31
Appendix
The Digital Gallery A transportation information service
Students enjoy a game at the Media Pole.
A tourist uses the photo-mail service.
The above are images of Media Poles in South Korea. “Media Pole features public transportation information, such as a subway map and bus routes, as well as a built-in camera, giving users the opportunityto send an impromptu photo via a photo-mail service” (Seoul Metropolitan).
Amos 33
Works Cited (MLA Format)
Athena: Goddess of War (아아아). Dir. Kwon Yong-Kwan. Perf. Woo-sung
Jung, Soo Ae and Seung-won Cha. 2010-2011. Taewon
Entertainment, 2010. DVD.
Basu, Medha. “Government Cloud, Information Security: Extending
The Security Perimeter With Cloud.” FutureGov.asia, 6
November 2013. Web. 30 November 2013
http://www.futuregov.asia/articles/2013/nov/06/extending-
security-perimeter-cloud/
Cengage Learning. CTI 120 Network & Security Foundations Wake Technical
Community College 4th Edition. Mason, Ohio: Cengage Learning,
2012, 2009, 2005, 2003 Print
CERT. “CERT Spotlight: Mitigating Threats from Within.”
Cert.org, n.d. Web. 30 November 2013
http://www.cert.org
Amos 34
Cisco. “What happens when we all connect to the Internet?”
Cisco.com: Tomorrow Starts Here, n.d. Web. 30 November 2013
http://www.cisco.com/web/tomorrow-starts-here/mobiledata/
index.html
CNN Wire Staff. “U.N.: Earth’s population to hit 9 billion by
2050, 10 billion by 2100.” CNN.com, 04 May 2011. Web. 30
November 2013
http://www.cnn.com/2011/US/05/03/united.nations.population.f
orecast/
Hi Seoul. “Smart Seoul 2015.” English.Seoul.go.kr. VisitSeoul.net,
n.d. Web & Pdf. 30 November 2013
http://isstat.seoul.go.kr/library/common/download.php?
fileDir=/community/&fileName=SMART_SEOUL_2015_4.pdf
Hitachi, Ltd.. “Hitachi’s Vision of the Smart City –Seeking a
Well-balanced Relationship between People and the Earth.”
Amos 35
Hitachi.com, September 2013. Web & PDF. 30 November 2013
http://www.hitachi.com/products/smartcity/download/pdf/white
paper.pdf
Iteris. “Detection Solutions.” Iteris.com, n.d. Web. 30
November 2013 http://www.iteris.com/solutions
Iteris (2). “DetectionSolutions.” Iteris.com, n.d. Web. 30
November 2013
http://www.iteris.com/itsarch/html/mp/mpem05.htm
ITU News. “Smart Seoul.” ITU News, n.d.. Web. 30 November 2013.
https://itunews.itu.int/en/4148-Smart-Seoul.note.aspx
Ko, Carol. “Data protection laws II – APAC data privacy laws
update.” AsiaCloudForum.com, 11 September 2012. Web. 30
November 2013 http://www.asiacloudforum.com/content/data-
protection-laws-ii-apac-data-privacy-laws-update
Amos 36
Lekkas, Dimitrios and Zissis, Dimitrios. “Future Generation
Computer Systems.” The International Journal of Grid
Computing and eScience. 28 (2012): 583-592 Print & Web. 30
November 2013
http://www.journals.elsevier.com/future-generation-computer-
systems and
http://www.cse.msstate.edu/~dampier/cse8993/zissis%20and
%20lekkas.pdf
Ng, Kelly. “Government Cloud, Healthcare It, Local Government:
Cloud-Based Health Monitoring System For Taipei Government.”
FutureGov.asia, 17 September 2013. Web. 30 November 2013
http://www.futuregov.asia/articles/2013/sep/17/cloud-based-
health-monitoring-system-taipei-govern/
Schulz, Greg. “Top 10 ways to secure your stored data: Multiple
layers of defense can isolate and protect data.”
ComputerWorld.com, 3 August 2006. Web.
Amos 37
30 November 2013
http://www.computerworld.com/s/article/9002188/Top_10_ways_t
o_secure_your_stored_data
Seoul Metropolitan Government Tourism Division. “Media Poles.”
VisitSeoul.net, 07 December 2011. Web. 30 November 2013
http://www.visitseoul.net/en/article/article.do?
_method=view&m=0004003002004&p=03&art_id=381&lang=en
Song, Yan (Professor) and Peng, K. (Graduate Student) of UNC-
Chapel Hill, City and Regional Planning. “Infrastructure
and Urban Development: Evidence from Chinese Cities.” Global
Asia. New Asia? Urbanization and Other Tectonic Shifts Workshop, 02
November 2013. Presentation
Tesco. “Tesco opens world’s first virtual store.” Archello.com,
n.d. Web. 30 November 2013.
http://www.archello.com/en/project/tesco-opens-worlds-first-
virtual-store#, http://www.archello.com/en/project/tesco-
Amos 38
opens-worlds-first-virtual-store/image-2
Vormetric “Vormetric Enhances Security Information and Event
Management with Data Security Intelligence.” Vormetric.com,
n.d. Web. 30 November 2013. http://www.vormetric.com/data-
security-solutions/applications/security-intelligence
Wikipedia. “Context awareness.” Wikipedia, 13 November 2013.
Web. 30 November 2013.
http://en.wikipedia.org/wiki/Context_awareness
Wikipedia (2). “Edward Snowden.” Wikipedia, 30 November 2013.
Web. 30 November 2013.
http://en.wikipedia.org/wiki/Edward_Snowden
Amos 39
Researcher’s Bio
Saunya Amos is a self-described technology,data and sustainability geek and enthusiast. She holds a B.S. in MechanicalEngineering from NC A&T State University, M.S. in Information Technology from American InterContinental University (Atlanta, Georgia, USA), Certificate of E-Commerce Marketing from Gwinnett Technical College, Certificate of Horticulture & Greenhouse from Johnston Community College
and is currently working towards an Associate of Applied Science in Data Storage & Virtualization, A.A.S Business Analytics and Android Application Certificate at Wake Technical Community.
Saunya’s past professional experiences includes project engineer,computer information instructor, web coordinator, English instructor in Japan, horticulture & greenhouse technician and currently social media coordinator of owner operated jewelry, art, health, technology and culture blogs. She enjoys, using social media to promote interest in cultures & technology (especially Japanese, Korean & Singaporean), languages (especially Japanese and Korean), sustainability, urban farming, big data analysis & storage, smart cites and smart technology.
Saunya’s goal is to assist technological and sustainability focused countries, regions, governments and businesses with information assurance and implementing smart technology based infrastructure, e-governance, app & data management and urban agriculture.
“live local, think global, act mobile™”