Disusun oleh:
Internet menurut Abbate (2017) adalah sistem global dari jaringan komputer
yang terhubung menggunakan protokol internet. Dengan definisi ini, dapat
dikonfirmasi bahwa keterhubungan yang terjadi secara global ialah terjadi karena
adanya internet.
Penggunaan internet pada saat ini sering dikenal juga dengan istilah IoT yang
merupakan singkatan dari Internet of Things. IoT dihadirkan untuk menjawab
tantangan – tantangan kelayakan hidup yang terjadi di dunia ketika populasi
berkembang sangat pesat, dibutuhkan ketahanan pangan serta kecukupan pada aspek
kehidupan lainnya (Atzori et al. 2017).
Illegal content
Data Forgery
Cyber Sabotage
Offense Against
Kejahatan ini ditujukan terhadap hak atas kekayaan intelektual yang dimiliki pihak
lain di Internet. Sebagai contoh, peniruan tampilan pada web page suatu situs milik
orang lain secara ilegal, penyiaran suatu informasi di Internet yang ternyata merupakan
rahasia dagang orang lain, dan sebagainya.
Infrengments of Piracy
Dalam data yang disajikan, di tahun 2016 tercatat ada 4.931 kasus yang ditangani Polri.
Sedangkan tahun ini, aparat menangani Cyber Crime sebanyak 5.061 kasus.
Pembajakan situs web KPU tahun 2009 .Web resmi KPU kpu.go.id Sabtu 15 Maret
2009 pukul 20.15 diganggu orang tak bertanggungjawab. Bagian situs kpu.go.id yang
diganggu hacker adalah halamanberita, dengan menambah berita dengan kalimat ”I
Love You Renny Yahna Octaviana. Renny How Are You There?”.
2. Illegal content
Kasus Pelajar 18 Tahun yang menyebarkan berita Hoax. Seorang pelajar berinisial
MPA berusia 18tahun asal Sukabumi ditangkap polisikarena menyebarkan status
Facebook berisi informasi hoaxa tau bohong adanya. Dalam postingan yang berisi
berita palsu atau hoax dan ujaran kebencian yang berisi akan adanya penyerangan
terhadap ulama ini tersebar akun komunitas media sosial Facebook. Postingan yang
disebar MPA adalah postingan dari seorang warga-net pemilik akun Facebook ‘Dhegar
Staiger’. Dalam kalimat akhir dalampostingan tertulis “Sebarken Lamun DidinyaUmat
Muslim, cinta NKRI (Sebarkan jika kamu umat muslim, cinta NKRI)”.
MPA mengaku menyesali perbuatannya. Dia tidak tahu isi postingan yang dia
bagikan bermasalah. MPA juga mengaku tidak mengetahui istilah Hoax. Dia baru tahu
setelah berurusan dengan apparat kepolisian.
Meski begitu polisi tetap menetapkan MPA sebagai pelaku hate speech dan hoax. Dia
dijerat dengan Pasal 28 ayat (2) junto pasal 45A ayat (2) UURI Nomor 19 tahun 2016
tentang perubahan atas UU RI Nomor 11 tahun 2008 tentang informasi dan transaksi
elektronik.
3. Data Forgery
Kemudian mengambil nomor kartu seseorang melalui data yang ia peroleh selama
melakukan spamming. Setelah berhasil, kartu tersebut dipergunakan tersangka untuk
belanja secara online.
Kebanyakan barang yang diperoleh dari belanja secara online pelaku adalah
produk impor bermerk. Pihaknya menafsir, semua produk jika di uangkan bernilai
hampir Rp 500 juta.
Selain menggunakan email, pelaku juga menjerat korban melalui akun Facebook
yang bernama ‘kolamtuyul’. Berbagai barang bukti bernilai ratusan juta rupiah disita
dari tangan tersangka yang kebanyakan adalah produk fashion, perhiasan serta alat-
alat elektronik import.
Ke-tiganya dijerat dengan undang-undang Informasi dan Transaksi Elektronik
(ITE) nomor 19 tahun 2016 dengan ancaman hukuman 7 tahun penjarasertadenda 700
juta rupiah. Firdaus dan Sepriandi asal Bengkulu, keduanya adalah nasabah Bank
Mandiri yang baru-baru ini kehilangan uang, masing-masing sekitar Rp50 juta di
rekening Bank. Dalam konferensi pers di Bengkulu pada hari Sabtu (08/08/15)
keduanya mengalami kejadian yang hampir sama yaitu kehilangan uang saat
melakukan transaksi internet banking. Mereka melaporkan kejadianinike Bank
Mandiri. Penjelasan dari Bank Mandiri menyebutkan bahwa keduanya merupakan
korban tindakan phising, yaitu pencurian data rahasia di internet (bisa melalui
computer atau pun smartphone) ataupun melalui telepon.
Menanggapi kasus ini, pihak Bank Mandiri tidak memberikan solusi terkait
bagaimana mengembalikan dana nasabah. Secara teknis di sisi perbankan, transaksi
tersebu tterlihat normal, sama dengan kejadian bila seseorang menggunakan kartu atm
orang lain untuk mengambil uang. Di sisi perbankan, semuanya tercatat sebagai
transaksi normal.
Kasus yang dialami Firdaus dan Sepriandi bukanlah hal baru. Menurut Kepala
Otoritas Jasa Keuangan (OJK) Bengkulu, Yan Syafrie sejak 2013 tidak kurangRp 100
miliar uang nasabah di perbankan raih dari akibat tindakan phishing. Pelakunya pun
sangat susah ditelusuri karena dana dengan cepat berpindah termasuk keluar negeri.
Untuk itu kewaspadaan ini mutlak diperlukan.Selain itu, pihak bank ataupun pihak
berwenang lainnya tidak mungkin mengganti dana nasabah bila kesalahan terletak
pada pihak nasabah. Bila kerugian terlanjur terjadi, OJK, bank, dan kepolisian hanya
berwenang melakukan penyelidikan untuk mengungkap kejahatan phising.
4. Cyber Espionage
Penyebaran virus dengan sengaja, ini adalah salah satu jenis kasus cyber crime
yang terjadi pada bulan Juli 2009, Twitter (salah satu jejaring social yang sedang naik
pamor di masyakarat belakangan ini) kembali menjadi media infeksi modifikasi New
Koobface, worm yang mampu membajak akun Twitter dan menular melalui
postingannya, dan menjangkiti semua follower. Semua kasus ini hanya sebagian dari
sekian banyak kasus penyebaran malware di seantero jejaring social. Twitter tak kalah
jadi target, pada Agustus 2009 diserang oleh penjahat cyber yang mengiklankan video
erotis. Ketika pengguna mengkliknya, maka otomatis mendownload
Trojan Downloader.Win32.Banload.sco.
5. Cyber Sabotage
Sabotasi terbesar yang baru-baru ini terjadi adalah tersebarnya WannaCry. Tak
kurang dari 150 negara terkena dampak ransomeware yang mengunci sistem
komputer, termasuk Indonesia.
Siang harinya, sejumlah rumah sakit yang bergabung dalam jaringan National Health
Service (NHS) di Inggris mulai terinfeksi WannaCry. Dokter-dokter kesulitan
memberi layanan medis karena ransomeware mengunci data rekam media pasien.
Pada Jum’at sore, WannaCry terdeteksi sudah mulai memasuki wilayah
Indonesia. Ransomeware ini menghantam Rumah Sakit Harapan Kita dan Dharmais.
Ratusan server dan PC terkena dampaknya, termasuk komputer untuk antrean
sehingga pasien kesulitan mengantre. Hari Jumat itu saja, WannaCry tercatatat sudah
menyebar ke 74 negara dengan jumlah korban sebanyak 45.000.
Dikutip dari kumpan.com, polisi telah menjalin kerja sama dengan unit siber
kepolisian dari berbagai negara untuk mengungkap pembuat dan penyebar program
tersebut. Direktur Siber Bareskrim Polri Brigjen Pol Fadil Imran mengatakan pihaknya
telah mengumpulkan berbagai informasi serta melakukan analisa forensik digital dan
menjalin komunikasi dengan berbagai komunitas siber untuk melacak asal usul
penyebaran ransomeware itu. Penyebar ransomware meminta tebusan data lewat
transaksi bitcoin. Menurut Fadil, pelacakan transaksi itu akan sulit dilakukan karena
menggunakan media mata uang terenkripsi bitcoin yang anonim.
Fadil berujar, “UU ITE sudah mencakup untuk menjerat pelaku karena masuk
dalam kategori ilegal akses.” Lalu Fadil menambahkan, “Kami juga sudah
membentuk emergency respond team bersama personel Kemkomminfo dan lembaga
lain yang tugasnya membantu melakukan recovery.”
6. Offense Against
CD Software ini biasa dijual oleh para penjual yang ada di Mall Ambasador dan
Ratu Plasa seharga Rp. 50.000 – Rp. 60.000 sedangkan harga asli software ini bisa
mencapai Rp. 1.000.000 per softwarenya.
7. Infrengments of Piracy
Cyber Stalking adalah kejahatan menggunakan internet atau alat elektronik lainnya
untuk melecehkan atau meneror seseorang dengan email, chat, forum Salah satu kasus
nya adalah Pembajakan software/software piracy yang termasuk dalam Intellectual
Property Crima.
Pembajakan software adalah piranti lunak atau yang lebih dikenal dengan istilah
software di Indonesia saat ini sudah sangat memperihatikan sekali. Dengan
mudahnya software-software bisa didapatkan saat ini. Mulai dari dijual secara terbuka
di pusat-pusat perbelanjaan (mall), pusat penjualan komputer, internet sampai pada
pedagang kaki lima di pinggir-pingir jalan.
Sebagai bangsa Indonesia merasa malu dengan predikat yang disandang oleh
bangsa ini, terkadang software baru yang belum resmi diluncurkan di negara asalnya,
tetapai di negara kita versi bajakannya (full verision) sudah beredar dan dapat dibeli
dengan harga yang relatif murah, yaitu antara Rp. 20.000 s/d Rp. 25.000,- per CD.
Dalam sebuah survei global yang dilakukan Business Software Alliance (BSA)
pada tahun 2015 yang lalu tentang penggunaan software illegal diseluruh dunia.
Sebanyak 39% software yang dipasang pada komputer di seluruh dunia
merupakan software illegal.
Menariknya adalah jika dilihat dari jumlah nilai kerugian yang diakibatkan dari
penggunaan software illegal, Amerika Serikat (US) menjadi negara penyumbang nilai
kerugian terbesar dari pembajakan software dengan estimasi nilai kerugian mencapai
$9,095 milyar US Dollar.
Angka pembajakan software di Indonesia masih sangat tinggi. Baik dari jumlah
persentase penggunaan atau nilai kerugian yang diakibatkan. Ini bukanlah hal yang
baik.
Mungkin yang dapat kita ketahui bahwa dalam dunia kejahatan konvensional
kita mengenal semacam faksi-faksi atau yang lebih kita kenal sebagai geng. Dari
organisasi ini seluruh tindak kejahatan bisa dilakuakan secara detail dan terstruktur.
Kenapa? Karena mau tidak mau ketika sebuah sistem mempunyai sebuah organisasi,
maka setiap tindakan yang dilakukan kemungkinan besar menjadi terstruktur juga.
Sederhananya jika sebuah tindakan kriminal atau kejahatan dilakukan bukan hanya
oleh satu orang maka setiap orang yang terlibat dapat memerankan perannya secara
maksimal dan fokus. Hal ini yang menjadikan sebuah tindak kriminal kemungkinan
besar berhasil dengan memperoleh keuntungan yang besar. Lain halnya jika pelaku
hanya seorang, dimana semua rencana baik pengintaian, aksi dan cara meloloskan diri
di pikirkan dan di desain sendiri.
Secara umum, ada tiga jenis aktivitas kriminal yaitu kriminal yang dilakukan oleh
seseorang, dua orang dan kolaborasi lebih dari 3 orang. Yang digambarkan sebagai
tindakan kriminal terorganisir adalah jenis ketiga yaitu dilakukan oleh 3 orang atau
lebih yang terorganisir. Seperti gambaran yang sudah disampaikan sebelumnya
dimana setiap tindak kejahatan yang terorganiser dapat menjadi ancaman besar untuk
suatu wilayah karena selain terstruktur, biasanya sasaranya targetted atau sudah di
targetkan.
Jika berkaca melalui banyak film kejahatan didunia maya terutama cybercrime
sering kita lebih mengarah kepada seseorang yang biasanya disebut dengan hacker.
Dalam banyak gambarannya bahwa seorang hacker biasanya berkaca mata tebal,
penyendiri dan melakukan segala sesuatu secara sendiri bukan berkelompok. Akan
tetapi apakah kita sadar bahwa cybercrime bisa dilakukan oleh kelompok orang yang
terorganisasi? Hal ini mungkin masih sedikit yang sependapat. Hal ini ditunjukkan
dengan persepsi dikalangan pubilk yang masih menyebutkan bahwa pelaku
cybercrime adalah perseorangan walaupun sudah banyak pelaporan terkait cybercrime
yang terorganisir.
Dari beberapa berita yang diperoleh pada beberapa media masa digital dapat
disimpulkan bahwa cybercrime di Indonesia tidak hanya bisa terjadi, akan tetapi sudah
terjadi. Sehingga selain memperkuat polisi siber, seharusnya Indonesia melakukan
peninjauan ulang terhadap aturan perundangan terkait cybercrime. Hal ini tentu sangat
penting dimana yang terjadi sekarang adalah banyak dipenjarakannya eksekutor akan
tetapi pemilik ide dan koordinator bebas. Kebebasan ini saling berkaitan dengan
adanya struktur organisasi yang cair dan dinamis dalam cybercrime. Sehingga mau
tidak mau proses penegakan hukum perlu ditingkatkan dengan dukungan peraturan
yang syah.
Menurut sebuah laporan baru-baru ini, informasi kartu kredit adalah kategori yang
paling banyak diiklankan di server ekonomi bawah tanah, memberi peringkat tertinggi
dalam hal informasi yang dipasok dan diminta pada tahun 2009. Alasan popularitas
mereka yang tinggi adalah: (a) frekuensi kredit transaksi kartu karena konsumen
hampir sepenuhnya beralih dari jenis pembayaran tradisional seperti uang tunai dan
cek ke kartu debit dan kartu kredit; dan (b) preferensi yang meningkat untuk transaksi
online – pertumbuhan e-commerce dan perbankan online meningkatkan kesempatan
menggunakan Trojans atau hacking; atau melalui phishing, vishing dan pharming.
Metode offline mencakup mencegat tagihan dan dokumen bank dari pos dan tempat
sampah. Menurut Layanan Penipuan Inggris (CIFAS), tiga dokumen palsu atau dicuri
yang digunakan oleh penipu yang mencoba kecurangan identitas di tahun 2006 adalah:
tagihan listrik, paspor dan laporan bank. Pada tahun 2011 Kantor Kabinet Inggris
kecurangan secara keseluruhan sedang meningkat, misalnya, pada tahun 2005 jumlah
kasus penipuan yang diidentifikasi adalah 152.176. Pada akhir tahun 2010 angka ini
seluruh dunia. Perekonomian tingkat lanjut tetap berada di daftar teratas karena para
pencetus dan penerima serangan cybercriminal. 17 Namun, dari data yang tersedia
yang meluas, yang diperburuk oleh penurunan ekonomi global saat ini, berpotensi
finansial. Hal ini terutama karena perusahaan mengandalkan jaringan digital untuk
kunci pada rantai nilai, kemampuan dinamis dan model bisnis untuk membantu
berfungsi. Bagian berikut membahas setiap literatur, terutama menyoroti relevansi dan
yang dibutuhkan untuk membawa produk atau layanan dari konsepsi, melalui fase
produksi yang berbeda kepada pengguna akhir atau konsumen. Konsep rantai nilai
juga berkaitan dengan masukan dari beberapa pelaku di berbagai industri, walaupun
hubungan yang digambarkan oleh rantai nilai cenderung lebih vertikal dalam satu jenis
horizontal di banyak sektor, komoditas dan jasa. Meskipun demikian, konsep rantai
menempatkan pelaku tertentu dalam rantai nilai dan menunjukkan bagaimana mereka
mengubah posisi dari waktu ke waktu. Kedua, ini memetakan arus kegiatan yang sama
yang dipersyaratkan untuk produksi barang dan jasa. Ketiga, ini mengidentifikasi
keterkaitan antara berbagai aktivitas dalam rantai. Keempat, ini membantu kita untuk
mengidentifikasi hubungan yang kuat dan lemah. Dengan kata lain, ini
untuk menghasilkan produk dan layanan baru dan inovatif, dan karenanya
tong sampah dan intersepsi email dan diuji cara mendapatkan data pribadi dan
keuangan. Metode yang lebih cepat, efektif dan semakin umum melibatkan bekerja
Penggunaan kemampuan cyber untuk memanen data. Penipuan kartu kredit menjadi
jauh lebih mahir dalam mengeksploitasi teknologi baru untuk aktivitas kriminal
Banyak penipu kartu kredit lebih memilih untuk mendapatkan kartu sendiri tapi tanpa
mencuri mereka. Salah satu cara untuk melakukan ini dikenal sebagai
“pengambilalihan akun.”
Tren terhadap pengembangan dan pemasaran alat yang mudah digunakan untuk
crimeware.
Bagian ketiga dari pekerjaan yang penting dalam memahami bagaimana ekosistem
cybercrime bekerja adalah model bisnis. Istilah ‘model bisnis’ digunakan dalam
literatur untuk menggambarkan komponen kunci dari sebuah bisnis, dan telah
memperoleh minat khusus dalam penelitian yang berkaitan dengan bisnis elektronik
Model bisnis adalah alat konseptual yang mengartikulasikan visi bisnis dan
Dua kemungkinan model bisnis offline adalah model bisnis loyalitas dan proses bisnis
outsourcing.
1. Model bisnis loyalitas digunakan saat sumber daya perusahaan digunakan untuk
tanggung jawab fungsi bisnis tertentu (atau proses) ke penyedia layanan pihak
ketiga. Hal ini secara tradisional dikaitkan dengan perusahaan manufaktur besar
Model bisnis hibrida (gabungan jalur fisik (off-line) dan saluran web (online)
Banyak penulis telah membedakan model hibrida dari model bisnis internet saja,
menggunakan istilah seperti ‘batu bata dan klik’, juga dikenal sebagai “klik dan
mortir”, “ombak dan tur,” “ritel yang disempurnakan cyber,” dan “hibrida e-commerce
1. Model bisnis bata dan klik dan variasinya umumnya menggambarkan kemitraan
antara bisnis internet dan perusahaan distribusi tradisional, misalnya model bisnis
yang sukses yang diadopsi oleh Amazon, dimana pesanan yang ditempatkan secara
untuk memenuhi tantangan atau sasaran tertentu. Di dunia yang sah, anggota
4. Crimeware-as-a-Service (CaAS):
mengidentifikasi struktur bisnis cybercriminal yang khas. Namun semua model bisnis
memiliki kelemahan dan juga kekuatan. Dengan demikian dapat diperdebatkan bahwa,
dengan memperoleh pemahaman yang lebih baik tentang kelemahan model bisnis
cybercrime (bagaimana mereka diatur dan dioperasikan), perspektif dan tindakan yang
lebih baik untuk menangani kejahatan dunia maya dapat dikembangkan. Demikian
pula, pemahaman yang lebih baik tentang model bisnis cybercriminal cenderung
memfasilitasi tingkat pemahaman yang lebih besar mengenai aktivitas kriminal, yang
pada gilirannya dapat memberikan kecerdasan yang lebih mendasar yang dapat
Abbate, Janet. 2017. "What and where is the Internet? (Re)defining Internet histories."
Internet Histories: Digital Technology, Culture and Society 8-14.
Atzori, Luigi, Antonio Iera, and Giacomo Morabito. 2017. "Understanding the Internet of
Things: definition, potentials, and societal role of a fast evolving paradigm." Ad Hoc
Networks (Elsevier) 56: 122-140.
Broadhurst, Roderic, and Yao-chung Chang. 2012. "Cybercrime in Asia: Trends and
Challenges." Asian Handbook of Criminology 20-21.
Mir, Usman Riaz, Syeda Mahnaz Hassan, and Mubashir Majeed Qadri. 2014.
"Understanding Globalization and its Future: An Analysis." Pakistan Journal of Social
Sciences (PJSS) Vol. 34, No. 2 607-624.
Sarre, Rick, Laurie Yiu-Chung Lau, and Lennon Y.C. Chang. 2018. "Responding to
Cybercrime: Current Trends." Police Practice and Research: An International Journal
515-518.
Internet Histories
Digital Technology, Culture and Society
Janet Abbate
To cite this article: Janet Abbate (2017): What and where is the Internet? (Re)defining Internet
histories, Internet Histories
Article views: 2
Download by: [University of Newcastle, Australia] Date: 06 April 2017, At: 03:15
INTERNET HISTORIES, 2017
https://doi.org/10.1080/24701475.2017.1305836
ORIGINAL ARTICLE
1. Introduction
Over the past two decades, the field of Internet history has produced a sophisticated body
of research with a global scope. Empirical studies in different national and regional con-
texts have opened up a broad understanding of what networks can be and the decisions
and contingencies that have shaped them. For example, Schafer’s (2015) research on
French and European networks demonstrates how design choices were tailored to local
and regional user communities and regulatory environments; studies by Gerovitch (2008)
and Peters (2016) analyse how networks in the former Soviet Union mirrored the organisa-
tional and political dynamics of the Soviet state; and books by Gottlieb and McLelland
(2003) and Franklin (2005) demonstrate how Internet technologies have been appropri-
ated and naturalised by residents and diasporas of Japan and the Pacific Islands. Such
diverse accounts challenge the US-centric narratives of heroic invention, expansion and
transfer found in much popular writing and go beyond genealogies of technical innova-
tions to trace histories of Internet use and governance.
Yet the object at the centre of this collective research effort remains strangely elusive.
Haigh, Russell, and Dutton (2015) raise the question, “What is the history of the Internet
the history of?” and find answers ranging from a narrow, technical definition of the Inter-
net as a set of routers and protocols enabling network interconnection to a broader
notion of the Internet that encompasses “the contents of the networks being intercon-
nected and their users, social practices, and skills” (pp. 143–144). Can we write Internet his-
tories if we do not know what the Internet is? I suggest that it is time to reconsider not
only what defines the Internet but the politics of such definitions. The ways in which
historians define the Internet shape the geographic and temporal scope of our narratives,
the activities we include or ignore, the dominance of certain countries and social groups
and the marginality of others. This essay will consider the strengths and limitations of
three broad ways of framing Internet histories.
contingent workers who contract through online labour markets (Scholz, 2012). Making
infrastructure invisible is a social and historical process that involves phenomena as
diverse as protocol standards, trade secrets, user interfaces and user training. Internet his-
tories can and should unpack how such invisibility is achieved and its social and political
consequences.
One limitation of defining the Internet as a large technological system or infrastructure is
that this tends to frame the Internet as a channel for transmitting data, rather than as a field
of social practice. A systems approach also privileges the role of system builders over users
in historical accounts. Perhaps most problematically, tracing the Internet’s history to a par-
ticular set of hardware and software innovations reinforces a perception of the United
States as the Internet’s centre. The computer communications system that first bore the
label “Internet” grew out of the Advanced Research Projects Agency Network (ARPANET),
which was funded by and located within the United States; but the persistence of the
name “Internet” for today’s global data network should not imply that the ARPANET has
been the sole source of its technology, practices or meaning. An instructive example of a
non-US-centric infrastructure study is Medina’s Cybernetic Revolutionaries: Technology and
Politics in Allende’s Chile (2011), which follows a nationally networked computing project
called Cybersyn. Challenging the notion that all innovations in computer communications
originate in the global North, Media describes how Cybersyn was locally conceived in 1971,
independently of the US ARPANET (which was not yet operational). The fact that Cybersyn
did not survive Chile’s political upheaval long enough to join today’s Internet does not
negate its significance for Internet history: what did persist were social visions for network-
ing, technical capacities and individual actors who went on to other projects.
interfaces is not unique to China; mobile phones are the primary means of Internet access
in much of the developing world (Katz, 2008). Focusing on local access capabilities and
practices can force us to reconsider how we define the hardware and software that consti-
tute the Internet. As Dutton (2013) points out, “Internet” is increasingly an umbrella term
for “computing, telecommunication, cable and satellite, mobile, and other ICTs,” which
form a larger “ecology of media and ICTs within which the Internet is embedded” (p. 13).
To see the Internet as local is to see it as multiple. Defining the Internet by local
user experience undermines any notion of a singular Internet by showing how users
can experience radically different “Internets” based on the technologies and content
that their political environment, social position and personal capacities make avail-
able. The user’s physical ability (sight, hearing, ability to manipulate a keyboard) and
fluency in the language(s) used for content and interface software also constrain
Internet access and shape user experience. Gender can be another defining factor,
since the spaces available for online access, such as Internet cafes, may be off-limits
to women in some cultures. These factors mean that the “same” infrastructure can
produce extremely variable experiences between users and even for the same user
in different situations.
Political issues such as privacy are also defined in important ways by local social set-
tings. A user’s privacy depends in part on whether the machine is shared or individually
owned and whether the local provider (such as an employer) asserts a right to inspect net-
work traffic. Government censorship and surveillance are another local factor that shapes
the type of information available to users as well as the types of interaction and personal
expression they feel safe engaging in. Users in a public library, a family living room or a
Chinese Internet cafe may face human as well as electronic surveillance.
Another important local variable is the real-world social environment in which the
Internet is used, which could include groups of friends, family, classmates or strangers in
an Internet cafe. Socially situated Internet use can provide additional capacities to users,
such as informal training. Local cultures also colour the meanings users attach to their
Internet use. For example, Miller and Slater’s study of Internet use in Trinidad shows how
national discourse about the Internet draws on local histories and politics; for example,
the meaning of “freedom” online is understood in relation to both the nation’s history of
slavery and its current ideology of neoliberalism (2000, p. 18). While defining the Internet
in terms of situated resources and practices highlights the role of social capital and cul-
ture, the limitations of this approach are that it does not address the larger, supra-local
forces shaping infrastructure and content or the similarities, connections and shared expe-
riences across the global user base.
the purpose and meaning of history are raised not merely by historians but also by advo-
cates of particular policy positions who would harness history to certify that their views
represent the true nature of the Internet. As Haigh et al. (2015), p. 146) warn:
Tracing a particular practice back to its prehistory in the ARPANET or arguing that a certain
philosophy was clearly formulated in the creation of the Internet and has guided it ever since
is a way of giving oneself the moral high ground.
Histories that focus on the dominant players, those with the resources to create expen-
sive new technologies, run the risk of privileging their visions in a contemporary Internet
system that has, and should take into account, a much broader scope and constituency.
Definitions that locate the defining features of the Internet in situated social practices can
help challenge the claim of hardware- and software-builders to speak for the Internet. In
the arena of public policy, histories that frame the Internet as the evolution of the public
sphere can support arguments for protecting freedom of speech or subsidised public
access in a way that histories framing the Internet as an entertainment service or a vehicle
for private expression would not.
Given the multiple meanings attached to the Internet, it may be misleading even
to speak of “the” Internet. Yet the dominance, at least in popular English-language
usage, of “the Internet” indicates that there is also a cultural reality to its status as a
single global system. Part of the historian’s role is to explain how public and expert
understandings of “the Internet” have been formed and to what extent these under-
standings are tied to historical periods, places and cultures. Using “Internet” as an
adjective – “Internet histories” instead of “histories of the Internet” – is one way to
signal a shift in historical focus from a singular technical entity to its myriad cultural
manifestations.
Note
1. Wikipedia, accessed 3 June 2017.
Disclosure statement
No potential conflict of interest was reported by the author.
Notes on contributor
Janet Abbate is associate professor of Science and Technology in Society at Virginia Tech and serves
as co-director of the STS graduate program in Northern Virginia. She received her BA degree from
Harvard-Radcliffe College and her PhD degree from the University of Pennsylvania. Abbate’s
research has focused on the history, culture and policy of computers and the Internet. Her 1999
book, Inventing the Internet, was the first scholarly history of the Internet and has become a standard
reference. Her 2012 book, Recoding Gender: Women’s Changing Participation in Computing, explores
how gender has shaped computing and suggests how the experiences of female pioneers can
inform current efforts to broaden participation in science and technology. She also co-edited (with
Brian Kahin) Standards Policy for Information Infrastructure (MIT Press, 1995). Her current research
investigates the historical emergence of computer science as an intellectual discipline, an academic
institution and a professional identity.
INTERNET HISTORIES 7
ORCID
Janet Abbate http://orcid.org/0000-0001-8230-6334
References
Abbate, J. (1999). Inventing the internet. Cambridge, MA: MIT Press.
Aspray, W., & Ceruzzi, P. (Eds.) (2008). The Internet and American business. Cambridge, MA: MIT Press.
Benkler, Y. (2006). The wealth of networks how social production transforms markets and freedom. New
Haven, CT: Yale University Press.
Blanchette, J.-F. (2012). Computing as if infrastructure mattered. Communications of the ACM, 55(10),
32–34. doi:10.1145/2347736.2347748
Castells, M. (2004). Informationalism, networks, and the network society: A theoretical blueprint. In
M. Castells (Ed.), The network society: A cross-cultural perspective (pp. 3–45). Cheltenham, UK:
Edward Elgar.
Corneliussen, H. G., & Rettberg, J. W. (Eds.) (2008). Digital culture, play, and identity: A world of war-
craft® reader. Cambridge, MA: MIT Press.
Darnton, R. (2000). An early information society: News and the media in eighteenth-century Paris.
The American Historical Review, 105(1), 1–35. doi:10.1086/ahr/105.1.1
DeNardis, L. (2009). Protocol politics: The globalization of Internet governance. Cambridge, MA: MIT Press.
Dutton, W. H. (2013). Internet studies: The foundations of a transformative field. In W. H. Dutton (Ed.),
The Oxford handbook of internet studies (pp. 1–23). New York, NY: Oxford University Press.
Franklin, M. (2005). Postcolonial politics, the internet, and everyday life: Pacific traversals online.
Abingdon: Routledge:.
Gerovitch, S. (2008). InterNyet: Why the Soviet Union did not build a nationwide computer network.
History and Technology, 24, 335–350. doi:10.1080/07341510802044736
Gillespie, T. (2014). The relevance of algorithms. In T. Gillespie, P. Boczkowski, & K. Foot (Eds.), Media
technologies (pp. 167–194). Cambridge, MA: MIT Press.
Gottlieb, N., & McLelland, M. (Eds.) (2003). Japanese cybercultures. Abingdon: Routledge.
Haigh, T., Russell, A. L., & Dutton, W. H. (2015). Histories of the Internet. Information & Culture, 50, 143–
159. doi:10.1353/lac.2015.0006
Halavais, A. (2008). Search engine society. Cambridge, MA: Polity Press.
Hughes, T. P. (1987). The evolution of large technological systems. In W. E. Bijker, T. P. Hughes, &
T. Pinch (Eds.), The social construction of technological systems (pp. 51–82). Cambridge, MA: MIT
Press.
Katz, J. E. (Ed.) (2008). Handbook of mobile communication studies. Cambridge, MA: MIT Press.
Medina, E. (2011). Cybernetic revolutionaries: Technology and politics in Allende’s Chile. Cambridge, MA:
MIT Press.
Miller, D., & Slater, D. (2000). The internet: An ethnographic approach. New York, NY: Bloomsbury Academic.
Pariser, E. (2011). The filter bubble: What the Internet is hiding from you. London: Penguin Press.
Peters, B. (2016). How not to network a nation: The uneasy history of the Soviet Internet. Cambridge,
MA: MIT Press.
Qiu, J. L. (2009). Working-class network society: Communication technology and the information have-
less in Urban China. Cambridge, MA: MIT Press.
Rheingold, H. (1993). The virtual community: Homesteading on the electronic frontier. Cambridge, MA:
MIT Press.
Schafer, V. (2015). Part of a whole: RENATER, a twenty-year-old network within the internet. Informa-
tion & Culture, 50, 217–235. doi:10.1353/lac.2015.0010
Scholz, T. (Ed.) (2012). Digital labor: The internet as playground and factory. New York, NY: Routledge.
Star, S. L., & Ruhleder, K. (1996). Steps toward an ecology of infrastructure: Design and access for
large information spaces. Information Systems Research, 7, 111–134. doi:10.1287/isre.7.1.111
Streeter, T. (2010). The net effect: Romanticism, capitalism, and the internet. New York, NY: NYU Press.
Turkle, S. (1995). Life on the screen: Identity in the age of the internet. New York, NY: Simon & Schuster.
Warschauer, M. (2003). Social capital and access. Universal Access in the Information Society, 2(4), 315–
330. doi:10.1007/s10209-002-0040-
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/274640873
CITATIONS READS
13 90,943
3 authors:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Mubashar Majeed Qadri on 08 April 2015.
Abstract
Globalization is a complex and dynamic phenomenon. What make this
phenomenon more complex are the contradictory justifications on the
origin of globalization, conflicting ways of defining the phenomenon
and differing viewpoints on globalization dimensions. This paper tries
to provide definitions of globalization which support its historical
development perspective. History has provided some details about
ground breaking events in different eras of globalization. Various
dimensions of globalization are also available in this study. Brief
description of each dimension is given for understanding globalization
from different aspects. Last and most important part of this paper is
comprised of current events, statistics, reports and trend analysis
which help in predicting globalization’s future. Future is forecasted
based on available facts and figures. Conclusively, the result of all
discussion on future of globalization is that it will survive and
gradually grow with respect to all aspects. Stage is set for enhanced
globalization. Although it has pros and cons, it is on our part to
support, facilitate and encourage positive impacts of globalization,
while searching ways to minimize or discourage its drawbacks.
I. Introduction
Globalization is a multifaceted phenomenon which encompasses economic, social,
political, technological and cultural dimensions. Whether globalization is newly
constituted phenomenon? Answer of this question depends upon how far researcher is
ready to extend the chain of causation which resulted in those social and technological
arrangements that many scholars have associated with globalization. The basis of today’s
technological advancements like supersonic jet planes and computer are based on earlier
inventions like steam engine, cotton ginning, typewriter, telephone and electrical
appliances.. These inventions are further based on some previous inventions like the
invention of wheel, domestication of wild animals & plants and finally migration of
African ancestors at the dawn of human invention.
608 Pakistan Journal of Social Sciences Vol. 34, No. 2
Some scholars have deliberately limited the scope of globalization to the last four
decades in order to understand the contemporary features of globalization. Others are
trying to find the linkages of globalization in the ground breaking developments of 19 th
century. Even some others are looking back into the beginning of industrialism and
capitalism for understanding globalization. Finally, few scholars reject the concept of
confining globalization in few decades, rather according to them globalization is a
process which has been unfolding for millennia (Steger, 2003).
The purpose of this paper is to give a brief history of globalization along with its
dimensions and phases. Finally, the paper tries to predict the future of globalization in the
lights of recent political, social, economic and cultural trends.
But a question arises that does it make sense that a momentous concept like
globalization emerged in only few decades? Globalization, as a complex connectivity,
may situate before few decades but globalization process comprised of social, political,
economic and cultural flows instigates us to go further back in times (Tomlinson, 1999).
According to Pieterse (2012), many features of globalization can be found in the past and
embedded in the evolutionary times. In this sense, globalization becomes part of big
history which situates planetary evolutionary processes within cosmic evolution (Spier,
2010). The study of “historical globalization” indicates that the world had never been a
place for unconnected/discrete communities rather there were strong evidences of cross
cultural exchanges and interactions from the earliest times of human existence in the
planet (Bentley, 2004). Looking at globalization as current trend probably is a semantic
issue. Many historians have found out the basis of deep and wide infrastructure of
globalization in the past era without using the term globalization (Pieterse, 2012).
Historians have taken different threshold levels for defining the emergence of
globalization. The emergence of world economy is one of the thresholds for
Usman Riaz Mir, Syeda Mahnaz Hassan, Mubashir Majeed Qadri 609
globalization. Frank (1998) in his research in Asia and Gunn (2003) in his research on
Southeast Asia considers 1200s as a most relevant time for economic emergence. But
Hobson (2004) has found out evidences of world economy as far back as 3500 BC.
According to Hobson (2004), although economic globalization starts emerging from 3500
BC but a huge expansion of global connections and trade occurred during post 600-
period which is termed as oriental globalization encouraged by the revival of camel
transport.
If trade linkages between different distant regions are taken as the criterion of
globalization emergence, then it may leads further back to Bronze Age. Besides cotton
and silk from China, early trade includes turquoise, agate, beads and lapis. The Silk Road
from Xian to Mediterranean dates back to 800 BC and evidence of Jade road from central
Asia to China can be found in 3000 BCE (Mair, 2006). It also matches with the early
commerce technologies like charging interest on loans, whose evidence can be found in
Sumer dated back to 3000 BC (Goetzmann & Rouwenhorst 2005).
Steger (2003) has summed up the debate on history of globalization and provided a
short chronology, based on five distinct historical periods. These periods are segregated
by significant changes in the social, cultural, political, technological and economical
factors. Following are distinct historical periods suggested by Steger (2003) with some
important characteristics.
Invention of wheel encouraged huge infrastructural innovations like permanent roads (for
example silk road) and animal-drawn cart that helped in transportation of goods as well
as human resources to distant places. Major technological innovations of that time
includes tapping of natural gas, hydraulic engine, paper printing, sophisticated metal
working techniques and silk fabric. Irrigation system comprised of canals; not only
encouraged productivity but also provided best transportation system. Furthermore values
of coinage encouraged the market and trade expansion.
Cerny (1995), Jones (1995) and Bairoch & Kozul-Wright (1996) have defined
globalization as a process of economic and financial integration. According to Cerny
(1995):
Globalization is defined here as a set of economic and political structures and
processes deriving from the changing character of the goods and assets that
comprise the base of the international political economy - in particular, the
increasing structural differentiation of those goods and assets.
Thomas, & Wilkin (1997) and McGrew (1998) have focused on social aspect of
globalization. According to Thomas (1997), “globalization refers broadly to the process
whereby power is located in global social formations and expressed through global
networks rather than through territorially-based states”. McGrew (1998) defined
globalization as:
A process which generates flows and connections, not simply across nation-states
and national territorial boundaries, but between global regions, continents and
612 Pakistan Journal of Social Sciences Vol. 34, No. 2
At the end, Al-Rodhan, & Stoudmann (2006) and Hebron & Stack (2013) have
provided more generalized and conclusive definitions, comprising the dimensions of
economic, political, cultural and social. According to Al-Rodhan, & Stoudmann (2006),
“globalization is a process that encompasses the causes, course, and consequences of
transnational and transcultural integration of human and non-human activities”.
Similarly, Hebron & Stack (2013) defined globalization as “the further development of
the process initiated over many centuries, reflected in the trade expansion, exploration,
conquest, migration, colonization, technological advancement, and so on that have taken
place throughout world history”.
Different scholars have tried to define globalization from various perspectives but
as far as this study is concerned, it is important to know that globalization is not a new
phenomenon. It is part and parcel of the process of expansion across continents based on
migration, trade, warfare, military alliances, conquest, exploration, colonization and
technological advancement. Contacts among states, societies and people from Stone Age
till now have knitted the world in the shape of interdependent patterns which attenuated
and intensified overtime. The outcome of the process of globalization is characterized by
unpredictable, far-reaching and ongoing changes (Hebron & Stack, 2013).
So, from one aspect, globalization represents unstoppable and relentless economic
force which integrated national markets, financial services, labor and firms on an
unprecedented scale. This aspect can be characterized by unrestricted and massive flow
of financial information, capital, goods and services in virtually every part of the world
(Friedman, 1999). Other aspect focuses on the capacity and sovereignty of states in the
era of globalization (Clark, 1999). Yet another aspect conceptualized globalization as
entanglement of diverse culture (Ellwood, 2003) and social structures (Hebron & Stack,
2013). Carefully analyzing these dimensions revealed that each one of this supports
emergence as well as intensification of other dimension.
Usman Riaz Mir, Syeda Mahnaz Hassan, Mubashir Majeed Qadri 613
Economic Globalization
Contemporary economic globalization is a result of gradual emergence of
international economic order which started from economic conference held at the end of
World War II in Bretton Woods, England. Major economic powers of global North
reversed their interwar (1918-1939) policy of protectionism. America and England
played leading role in the success of that conference (Steger, 2003). Other than reaching
towards consensus on increasing international trade, these countries also agreed on
establishing binding rules of international activities. Bretton Wood’s conference laid
foundation for the establishment of other important international organizations like IMF,
World Bank and World Trade Organization (Steger, 2003). International Monetary Fund
was established to handle international monetary systems. Similarly, World Bank was
created to facilitate loan facility for the reconstruction of post-war Europe, its scope was
expanded to provide loan for developing countries of the world. General agreement on
tariffs and trade was established to cater the problems of international trade in 1947
which was converted into World Trade Organization in 1995.
Political Globalization
614 Pakistan Journal of Social Sciences Vol. 34, No. 2
Rosenau (1997) has summed up the debate in following words, “States are
changing, but they are not disappearing. State sovereignty has been eroded, but it is still
vigorously asserted. Governments are weaker, but they can still throw their weight
around”. Simply, “the reach of state has increased in some areas but contracted in others”
(Krasner, 2001).
Socio-cultural Globalization
Talking about economic and political globalization may represent a part of the
story as globalization is not comprised of economic/political process only but affected by
social and cultural spheres, where people confront major shifts (Hebron & Stack, 2013).
Giddens (1990) tried to define social aspect of globalization as, “worldwide social
relations which link distant localities in such a way that local happenings are shaped by
events occurring many miles away and vice versa”. Similarly cultural globalization refers
to, “the intensification and expansion of cultural flows across the globe” (Steger, 2003).
Social and cultural globalization are somehow mixing concept. Both dimensions affect
the emergence and intensification of each other. If people are socially integrated, there is
an increased chance of cultural proximity due to value exchange. This idea is
strengthened by looking at the famous index developed by Dreher (2003) of measuring
globalization. Dreher bifurcated globalization into three main dimensions: economic,
Usman Riaz Mir, Syeda Mahnaz Hassan, Mubashir Majeed Qadri 615
political and social. Social globalization includes three aspects which are personal
contact, information flows and cultural proximity (Dreher, 2006).
Before going into the globalization analysis, it’s better to look at phases of
globalization which emerged in last few decades. An overview of previous phases of
globalization may help in understanding and predicting future of globalization. Muller
(2010) has briefly elaborated each of these phases.
Phase-I of Globalization
The process of economic integration accelerated in 1989/90 with the fall of Berlin
Wall. Until then, only west had actively participated and process developed with a slower
pace. After this historical event, a wave of globalization came. Soviet Union has opened
up trade, China has speeded up its reforms, India and Latin America has changed the
policy of import substitution, common market and currency of European countries was
created, NAFTA was established, GATT was completed and resultantly world was
moving towards trade liberalization and free flow of capital.
Phase-II of Globalization
First phase euphoria ended in 1994/95 with Mexico crisis. Mexico had to take
multi-billion dollar loan from IMF to escape from insolvency caused by short term
capital. This crisis effect spilled over to US, Europe, Portugal and Spain. Situation was
calmed down soon and a new wave of globalization started. In Asia, Indonesia and
Thailand enjoyed rapid growth. The process was disturbed again in 1997/98 due to
capital flight from emerging markets like Asia, South Korea, Russia and Latin America.
But situation was again ebbing rapidly. A new story of digitalization and networks started
and gave boom to globalization.
Phase-III of Globalization
All hopes of developments from boom of 1990s seemed to be symbolic. Terrorist
attack in New York and Washington DC in September 2011 resulted in market crash and
USA started an endless war on terror with the help of few EU member states and Russia.
After all these happenings, still world did not come across any big crisis. World
economy again approached towards boom and reached highest world growth of 5%
where China and India were able to achieve 10% & 8% growth respectively during this
period. Although world has enjoyed increased growth but benefits of globalization may
not be equal and for all. A question of equitable distribution of wealth was a big question
mark for the economists.
There was a historic distortion in the process of globalization in 2007 due to credit
crisis which caused the virtual break down of banking industry. Credit crisis gave birth to
many other problems ranging from food shortage, hunger to dramatic increase in prices.
618 Pakistan Journal of Social Sciences Vol. 34, No. 2
Phase-IV of globalization
Muller (2010) in his article “Phase 4 of globalization” has predicted fourth phase
of globalization, in which he predicted some situations like slower growth ahead, political
destabilization and diffusion of power. He also suggested some remedies including work,
thrift, creating solidarity, openness, cooperation, originality.
Similarly Indonesian trade minister (who chaired the conference) also shared his
sentiments as:
We achieved what many said could not be done. What we have done here in Bali is
truly extraordinary. We have negotiated a package that will bring food security to
billions of the world’s poorest. We have delivered an Agreement on Trade
Facilitation that will inject up to a trillion dollars into the world economy and we
have agreed a ground-breaking suite of initiatives to help Least Developed
Countries to benefit more from the multilateral trading system.
Bali package was considered as first major agreement in the history of WTO. It
included ‘Trade facilitation’ whose benefits to the world economy are calculated to be
four hundred billion to one trillion. Similarly, there are packages on food security, tariff
quota administration and export subsidies. Furthermore, there are special development
packages for least developed countries.
Ghemawat & Altman (2013) have presented more detailed report and used the data
till 2012. Probably, it is the only report catering latest data. Following is the overall
globalization index
Figure 2
It is clear from Figure 2 that globalization has hit hard after the financial crisis but
started to recover from 2009. Although till now, it may not be able to catch up the peak
level of 2007 but still it recovered well with steady pace.
Figure 3
620 Pakistan Journal of Social Sciences Vol. 34, No. 2
Figure 3 has provided a very clear picture about the factors contributing towards
overall globalization and their fluctuation from 2005-2012. It is evident that economic
globalization (Trade and Capital) was on stake after the financial crisis and decreased
drastically. Important thing to notice is the gradual increasing trend of information and
people dimension where information integration seems to be continuously increasing
with a rapid pace.
Figure 4
KOF index clearly shows small ups and downs in the process of globalization but
overall, the process wasn’t reversed badly in last 30 years. Political globalization seemed
Usman Riaz Mir, Syeda Mahnaz Hassan, Mubashir Majeed Qadri 621
to be stagnant in the period of 1980-1990 and then increased with accelerated pace.
Economic and social globalization comparatively grew with steady and gradual pace with
only one severe shock to economic globalization in 2008 crisis.
Above discussion about the future of globalization can be summarized with the
statement of Hufbauer & Suominen (2010), “The big news is that globalization has
survived”. Statement given 3 years before still has relevance and significance for today’s
globalization future. Globalization not only survived easily but also moved forward with
increased pace in terms of economic globalization. As there is consensus between all
WTO members on an agreement called ‘Bali Package’ which hopefully will help in
increasing the economic integration.
The overall environment is very fruitful for all kinds of integrations. One thing to
understand is that globalization does not only comprise of economic factor, it has four
dimensions. Each dimension is important and has its own significance. Social
globalization required keen attention of researchers for exploration as it also facilitates
economic and cultural globalization.
VII. Conclusion
Globalization, a multifaceted phenomenon has a history from the first interaction
between the people; it continues till now and will continue in the future. As a process of
integration, globalization affects every aspect of human life ranging from economic,
cultural, and political to social. Globalization is not an out there phenomenon, its in here.
Being part of society, humans daily experience globalization, its effects on the lives and
on the society, its power of changing social as well as cultural structures and its blessings.
Globalization has passed through many phases throughout its history. There are ups and
downs in the globalization process. Globalization is a process which keeps on increasing;
may decrease for a while but it never ends and it cannot be stopped. Human beings
cannot live in isolation. They interact with each other; help one another and share
knowledge and experiences with each other.
References
Albrow, M., & King, E. (Eds.). (1990). Globalization, knowledge and society: Readings
from international sociology. Sage.
Al-Rodhan, N. R., & Stoudmann, G. (2006). Definitions of globalization: A
comprehensive overview and a proposed definition. Program on the
Geopolitical Implications of Globalization and Transnational Security, 6.
Bairoch, P., & Kozul-Wright, R. (1996). Globalization myths: some historical
reflections on integration, industrialization and growth in the world economy.
United Nations Conference on Trade and Development.
Barber, B. R. (1998). Democracy at risk: American culture in a global culture. World
Policy Journal, 29-41.
Bentley, J. H. (2004). Globalizing history and historicizing globalization.
Globalizations, 1(1), 69-81.
Cerny, P. G. (1995). Globalization and the changing logic of collective action.
International Organization, 49(4), 595-625.
Clark, I. (1999). Globalization and international relations theory (p. 114). Oxford:
Oxford University Press.
De Soysa, I., & Vadlamannati, K. C. (2011). Does being bound together suffocate, or
liberate? The Effects of economic, Social, and Political Globalization on
Human Rights, 1981–2005. Kyklos, 64(1), 20-53.
Dreher, A. (2003). Does globalization affect growth. Evidence from a new index of
globalization, forthcoming in Applied Economics.
Dreher, A. (2006). The influence of globalization on taxes and social policy: An
empirical analysis for OECD countries. European Journal of Political
Economy, 22(1), 179-201.
Ehret, C. (1998). An African classical age: Eastern and Southern Africa in world
history, 1000 BC to 400 AD. London, James Currey
Ellwood, W. (2003). The no-nonsense guide to globalization. London: New
International Publication LTD.
Frank, A.G. (1998). Re-Orient: global economy in the Asian age. Berkeley, University
of California Press
Friedman, T. L. (1999). The Lexus and the Olive Tree. Thomas, Farrar, Straus and
Giroux.
Ghemawat & Altman (2013, November 20). Depth Index of Globalization 2013.
Retrieved March 16, 2014, from http://www.ghemawat.com/dig/
Gray, J. (1998). False dawn: The delusions of global capitalism. The New Press.
Hufbauer, G. C., & Suominen, K. (2010). Globalization at Risk. Yale University Press.
Jennings, J. (2011). Globalizations and the ancient world. Cambridge University Press.
Martin, H. P., Schumann, H., & Camiller, P. (1997). The global trap: Globalization and
624 Pakistan Journal of Social Sciences Vol. 34, No. 2
Robb, J. (2007). Brave new war: The next stage of terrorism and the end of
globalization. John Wiley & Sons.
Rosenau, J. N. (1997). Along the domestic-foreign frontier: Exploring governance in a
turbulent world (Vol. 53). Cambridge University Press.
Spier, F. (2010). Big history and the future of humanity. Oxford University Press
Thomas, C., & Wilkin, P. (1997). Globalization and the South. Palgrave Macmillan.
Weiss, L. (Ed.). (2003). States in the global economy: Bringing domestic institutions
back in (Vol. 86). Cambridge University Press.
To cite this article: Rick Sarre, Laurie Yiu-Chung Lau & Lennon Y.C. Chang (2018)
Responding to cybercrime: current trends, Police Practice and Research, 19:6, 515-518, DOI:
10.1080/15614263.2018.1507888
EDITORIAL
The world has well and truly entered the digital age where technology is ever-present and all
pervasive. The development of technological innovations facilitate our everyday lives. But they
also make significant contributions to criminality. Cybercrime has become a serious problem
globally. The research needed to match the reality is struggling to keep up. There is a great need
for more academics to get involved in cybercrime prevention and cyber security research. It is also
especially important to look into this topic interdisciplinarily. The work needs not only a
criminological lens, but a multitude of lenses: legal, sociological, and political, in order for us to
understand the impact of cybercrime across the globe. Existing literature on cybercrime is
dominantly from the global north. Since half of all internet users are located in Asia, there is a
growing need to encourage academics to do cyber security and cybercrime research in the Asia-
Pacific region (Broadhurst & Chang, 2013).
There is still no precise and clear definition of cybercrime in academic parlance. It is sometimes
called ‘electronic crime,’ ‘computer crime,’ ‘computer-related crime,’ ‘hi-tech crime,’ ‘technology-
enabled crime,’ ‘e-crime,’ or ‘cyberspace crime’ (Chang, 2012). Grabosky (2007) classified three
general forms from his exploration of legislation and the common law: crimes where the
computer is used as the instrument of crime; crimes where the computer is incidental to the
offense, and crimes where the computer is the target of crime. These classifications, while
imperfect, are useful to our understanding of cybercrime.
Another classification is that espoused by Gordon and Ford. They classified cybercrime into
Type I and Type II offenses using a continuous scale. Type I cybercrime, they said, is crime which
is more technical in nature (e.g. hacking) while Type II cybercrime is crime that relies more on
human contact rather than technology (e.g. online gambling). However, these authors state that
‘there are likely to be very few events which are purely Type I or Type II; these types represent
either end of a continuum’ (Gordon & Ford, 2006, p. 16). However, artificial intelligence and
developments in robotics are quickly changing the technological landscape. One could argue that
these phenomena could give rise to a ‘Type III’ cybercrime perpetrated by instruments capable of
self-learning.
McGuire and Dowling (2013) also developed a useful classification tool. They classify
cybercrime into ‘cyber-enabled’ crime and ‘cyber-dependent’ crime. Cyber-enabled crimes
are traditional crimes facilitated by the use of computers. The range of ‘cyber-enabled’ crimes
is myriad – from white-collar crime, such as fraudulent financial transactions, identity theft,
and the theft of electronic information for commercial gain, to drug-trafficking, aberrant
voyeuristic activities, harassment, stalking or other threatening behaviors. While these have
always been deemed criminal activities, they are now so much easier to pursue with a
computer.
Cyber-dependent crimes are those crimes that cannot exist without the cyber technology. A
cybercriminal can inflict massive commercial damage using the internet. In fact, it is now easier
and safer for a criminal to disrupt a business by destroying its database through malware than by
throwing a Molotov cocktail through its front door. Cyber-dependent criminality was acutely felt
across the world in May 2015 when Cryptowall 3.0 ransomware began attacking businesses. Using
an exploit kit capable of attacking software vulnerabilities, Cryptowall 3.0 searched for files on the
victims’ computers, encrypted these documents, deleted the originals, and then alerted the victims
that they needed to pay thousands of dollars in ransom money in order to get their files back. It
has been estimated that these attacks infected hundreds of thousands of computers across the
world, and caused close to USD325 million damage.
Another modern manifestation of cyber-dependent crime is the work of the ‘hacktivist,’
someone who protests against an organization’s actions or policies. Perhaps the most memorable
is the 2010 Anonymous hacktivist attack on Mastercard, Visa and Paypal in retribution for their
ceasing to transact donations to the WikiLeaks group. Anonymous encouraged the spread of
Distributed Denial of Service (DDoS) attacks which bombarded the trio’s websites with requests.
A DDoS attack is when one attempts to make an online service unavailable by overwhelming it
with traffic from multiple sources, causing it to collapse. Damage from this specific cybercrime
was considerable. For PayPal alone, damage was estimated at USD5.5 million. Cyber-dependent
crimes can be set up easily and cheaply using tools that may be readily available online. Indeed, it
was widely reported on 25 April 2018 that access to a website (later taken down by police) had
been offered for USD14.99 to anyone wishing to carry out a DDoS attack.
Possibly the greatest concern to governments, however, is the ability of cybercriminals across
the globe to use the internet for purposes of espionage and terrorism (Sarre, 2017). The borderless
nature of the internet, and hence cybercrime, means that governments can be targeted from
anywhere in the world, making law enforcement not only challenging, but, in some instances,
almost impossible. Moreover, today’s criminals can engage in espionage without the need for
high-level technical skills. As mentioned above, the internet can assist, with ‘do-it-yourself’
malware kits, for example, available in online forums.
Fraudulent scams, too, need not be sophisticated in order to be highly successful and therefore
seriously damaging. These scams have seen lonely hearts swept up in false relationships, with the
unsuspecting victims sending vast amounts of money electronically to support the ‘unfortunate’
situation of their fraudulent ‘partner’. Businesses, too, are perennially vulnerable to scammers.
Many businesses may not even realize their vulnerability, or the fact that they have become
victims.
What can we do to curb the spread of cybercrime? Surveillance by government agencies can be
an effective crime deterrent at some level. To that extent police (public and private) are necessary
(indeed essential) but not sufficient. In the short term, criminal justice responses are usually a case
of ‘too little, too late’ – assuming that police can detect the behavior at all. It is rarely the case that
they can thwart it ahead of time.
In the longer term the best responses to cybercrime are in the education of those who are most
vulnerable, and the deployment of crime prevention tools more generally. There has been some
success with victims of fraud and deception, particularly those people who have sent money
overseas in the expectation of winning a heart or claiming a prize (neither of which ever existed).
We suggested this special issue for the journal as a reflection of the valuable work done by the
International Conference on Cybercrime and Computer Forensics (ICCCF). The papers in this
Special Issue emerged from the ICCCF conference co-hosted by the Australian Institute of
Criminology (AIC) and the Asia Pacific Association of Technology and Society (APATAS). It
was held at the Gold Coast, Queensland, Australia, in July 2017. The conference theme,
Cybercrime Research, Policy and Practice: the Collaboration Imperative, was especially relevant
for two reasons. First, cybercrime is a subject that cries out for urgent prophylactic measures
across the globe. Indeed, cybercrime is one of the most pressing problems for policing today and
into the future, as advanced technology becomes more deeply embedded into daily life.
International collaboration is thus essential in the fight against cyber criminality. Second, this
POLICE PRACTICE AND RESEARCH 517
conference drew on and brought together the learning and experience of persons from the Asian
region and the Pacific Rim, extending beyond the boundaries of the global north to the global
south.
As a matter of structure, this volume is a collection of selected papers from the conference.
Between them, the articles cover both emerging and key issues which Asian and Pacific Rim
jurisdictions face in their efforts to meet, understand, and overcome cybercrime.
Importantly for readers of Police Practice and Research, Diarmaid Harkin, Chad Whelan
and Lennon Chang in ‘The challenges facing specialist police cyber-crime units: An empirical
analysis’ review the significant challenges facing police organisations by the growing threat of
cybercrime.
The next two papers discuss cybercrime victimization generally. Jacqueline Drew and Lucy
Farrell in ‘Online victimization risk and self-protective strategies: developing police-led cyber
fraud prevention programs’ highlight the role of police in preventing online fraud. Likewise, the
paper from Cassandra Cross, ‘Victims’ motivations for reporting to the ‘fraud justice network’
reveals effective counter-measures that emerged from her interactions with victims of online
fraud.
In their paper ‘Policing image-based sexual abuse: Stakeholder perspectives,’ Nicola Henry,
Asher Flynn and Anastasia Powell explore the cyber-enabled crime of image-based sexual abuse.
The penultimate paper touches on the role of international cyber-policing more specifically,
namely tackling crimes committed with computers across mainland China. Tianji Cai, Li Du,
Yanyu Xin and Lennon Chang, ‘Characteristics of cybercrimes: Evidence from Chinese judgment
documents’ give readers a rare insight into the cybercrime phenomenon in the Far East.
Finally, in their essay, ‘Intelligence-sharing in the context of policing transnational serious and
organized crime: a note on policy and practice in an Australian setting,’ Phil Kowalick, David
Connery and Rick Sarre look specifically at what they believe are the shortcomings of the current
approach to cybercrime in Australia, and suggest the means by which the malaise should be
addressed.
It is clear from this volume that no other field of criminality observes international borders
more permeable than they are in cyber criminality. There is thus a need for international co-
operation between the public sector, academia, industry and private practitioners. The phenom-
enon presents all nation states with an uphill task. The authors in this volume make a significant
contribution to the means by which that challenge can be met by academics and police practi-
tioners. We commend it to you.
In conclusion, we wish to thank each of the authors for their contributions, and offer our
sincere gratitude to the general editorial staff of the Police Practice and Research for making this
Special Issue possible.
Disclosure statement
No potential conflict of interest was reported by the authors.
Notes on contributors
Rick Sarre is Adjunct Professor of Law and Criminal Justice at the School of Law, University of South Australia.
During his 34 years in the tertiary sector, Dr Sarre taught commercial law, criminology, and policing law. He is the
immediate Past President of the Australian and New Zealand Society of Criminology. He served eight years as the
President of the South Australian Institute of Justice Studies, and eighteen years as an Associate of the Australian
Institute of Criminology. He is currently a Director of the IPES.
Laurie Yiu-Chung Lau is currently Chair of the Asia Pacific Association of Technology and Society (APATAS) and
an active member of IEEE Hong Kong Section. He is an entrepreneur and philanthropist in Hong Kong with a PhD
from the University of Glamorgan, UK. Dr Lau has wide experience in research on policing internet-related crime,
518 R. SARRE ET AL.
including O2O fraud, technology and society, the Internet of things, and AI and robotics. Dr Lau is actively
involved in mentoring students at Wu Yee Sun College, the Chinese University of Hong Kong.
Lennon Y.C. Chang is a Senior Lecturer in Criminology at Monash University. Dr Chang has degrees from
National Taipei University, Taiwan, and a PhD from the Australian National University, Canberra. He is the author
of Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait.
Dr Chang researches crime and governance of cyberspace in Asia and is working on training programmes to build
cyber security capacity and cyber security awareness in ASEAN. He is currently researching online vigilantism in
Asia.
ORCID
Rick Sarre http://orcid.org/0000-0001-6268-1313
References
Broadhurst, R., & Chang, L. Y. C. (2013). Cybercrime in Asia: Trends and Challenges. In J. Liu, B. Hebenton, & S.
Jou (Eds.), Handbook of Asian Criminology (pp. 49–63). New York: Springer.
Chang, L. Y. C. (2012). Cybercrime in the Greater China Region: Regulatory responses and crime prevention across
the Taiwan Strait. Cheltenham: Edward Elgar Publishing.
Gordon, S. & Ford, R. (2006). On the definition and classification of cybercrime. Journal of Computer Virology, 2,
13–20.
Grabosky, P. (2007). Electronic crime. New Jersey. Prentice Hall.
McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence: Summary of key findings and implications.
Home Office Research Report 75. London: Home Office, October.
Sarre, R. (2017). Metadata retention as a means of combatting terrorism and organized crime: A perspective from
Australia. Asian Journal of Criminology, 12, 167–179.
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/311953774
CITATIONS READS
215 18,471
3 authors:
Giacomo Morabito
University of Catania
186 PUBLICATIONS 14,651 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Antonio Iera on 09 October 2017.
Abstract—The high penetration rate of new technologies in all picture of IoT, as it will be elaborated in Section VII. All this
the activities of everyday life is fostering the belief that for any noise around the phenomenon has increased the confusion so
new societal challenge there is always an ICT solution able to that it has become necessary to shed light on it and come to
successfully deal with it. Recently, the solution that is proposed
almost anytime is the “Internet of Things” (IoT). This apparent a definition, shared by the whole community, of what IoT is
panacea of the ICT world takes different aspects on and, actually, and what is not.
is identified with different (often very different) technological Some researchers [1] [2] are inclined to think that the idea
solutions. As a result, many think that IoT is just RFIDs, others of IoT has its roots back in the late nineteenth century, when
think that it is sensor networks, and yet others that it is machine- Nikolas Tesla theorized that
to-machine communications. In the meanwhile, industrial players
are taking advantage of the popularity of IoT to use it as a very “When wireless is perfectly applied the whole earth will
trendy brand for technology solutions oriented to the consumer be converted into a huge brain, which in fact it is, [...]
market. The scientific literature sometimes does not help much and the instruments through which we shall be able to do
in clarifying, as it is rich in definitions of IoT often discordant this will be amazingly simple compared with our present
between them. telephone”
Objective of this paper is to present the evolutionary stages,
i.e., generations, that have characterized the development of IoT, (Nikola Tesla, Teleautomation).
along with the motivations of their triggering. Besides, it analyzes Maybe it is a little excessive to assume that the undoubted
the role that IoT can play in addressing the main societal genius and visionary nature of Tesla allowed him to imagine
challenges and the set of features expected from the relevant the Internet of Things so many years ago, but certainly, from
solutions. The final objective is to give a modern definition that date on, he and many others helped forming the idea of
of the phenomenon, which de facto shows a strong pervasive
nature, and, if not well understood in its theories, technologies, IoT by starting from a clear knowledge of current technologies
methodologies, and real potentials, then runs the risk of being and making a leap into the future. To name a few, it is the
regarded with suspicion and, thus, rejected by users. case of Mark Weiser who defined Pervasive Computing and
stated that “The most profound technologies are those that
disappear. They weave themselves into the fabrics of everyday
I. I NTRODUCTION life until they are indistinguishable from it” [3], of Bruce
Years have passed since the Internet of Things (IoT) has Sterling who coined the SPIME neologism referring to an
appeared on the scene becoming one of the major research object “by definition, the protagonist of a documented process
and industrial subjects in the Information and Communications [...] an historical entity with an accessible, precise trajectory
Technology (ICT) arena. The IoT term appears so frequently through space and time” [4], of Kevin Ashton who first used
in so many contexts as rarely happened in the past to other the term “Internet of Things” at that time focusing mainly on
ICT themes, so as to raise the doubt whether it is more a the RFID technologies.
“trendy” name, speculatively ridden to increase the attention The idea of IoT has, therefore, evolved over time and has
on studies and products around mature technologies, rather undergone succeeding transformations that will predictably
than a real element of technological discontinuity. This doubt still continue over the next years with the advent of new
comes also from the fact that, in spite of its huge success, enabling technologies. For instance, the advent of the new
what IoT really represents is not completely clear. This is concepts, such as cloud computing, information centric net-
mostly due to the fact that several works in the literature working, big data, social networking, have already partially
associate the idea of IoT to some of its building blocks only impacted and still are impacting the IoT idea and novel
rather than to a complete combination of all the necessary futuristic paradigms are already in the horizon (see [5], [6]).
elements. This is the case, for instance, of platforms that This paper is motivated by the above considerations and
just use RFID for global traceability of goods, algorithms for aims at providing a careful analysis of the technologies that
new intelligence and pervasive computing solutions, network have contributed to the birth of the IoT and to its growth over
architectures based on IP protocols (especially IPV6) enhanced the time.
to support resource constrained devices, and proposals for The approach we follow to conduct the analysis of the
novel application protocols to collect sensed data from wireless Internet of Things paradigm is evolutionary in nature. Ac-
sensor networks. Indeed, the numerous proposals that just cordingly, we identify three main stages of evolution of the
touch some of these disparate issues do not offer a complete paradigm, each one characterized by key enabling technolo-
gies, major reference architectural solutions, and available Automatic context-aware processes will be also activated, for
products. The transition from one generation to the next is not instance to guide the patient in taking the right medicines. The
only characterized by the introduction of new technologies IoT can play a key role in this context. However, this implies
and architectures complementary to those of the previous that its components should be ubiquitously embeddable in
generation, but also by a distinctive approach to the design of the environment, wearable so to constantly monitor human
the IoT. Notwithstanding, what is IoT today and what it will conditions, transparent as much as possible, and trustful in
be in the future is, undoubtedly, the result of the convergence handling personal data in a secure way.
into the primary evolutionary path of all R&D experiences in Food security and sustainable agriculture is aimed at making
several ICT domains, as shown in Figure 1 and described in the best use of our biological resources. The smart farms
the remainder of the paper. built by exploiting the IoT paradigm represent major means
To ease the reading, in Table I we summarize all the to reach these goals. In a smart farm the status of the crop
acronyms that are used throughout the paper. Additionally, in and terrain is always under control, many of the production
order to have a comprehensive view of all the technological procedures can be activated remotely by the farmer, sales can
fields involved in the evolution of the IoT over the three be synchronized with the production (as the time schedule of
generations, in Table II we summarize the major objective for the crop can be shared with external systems), and the usage of
each addressed technological field, the key standards, and the resources matches the actual needs (thus, wastage are avoided).
representative scientific works. However, it is extremely important that the relevant systems
The remainder of the paper is organized as follows. In are easy to deploy and use. Otherwise, the configuration and
Section II we describe how the IoT had the potential to the maintenance costs may overcome the benefits.
play a key role in the solutions of most societal challenges. Most countries have agreed on ambitious plans to reduce
In the following Sections III, IV, and V we provide details greenhouse gas emissions, increase the share of renewable en-
of the major technical concepts and solutions proposed for ergies, and improve energy efficiency. Achieving these objec-
each generation of the IoT. In Section VI we overview the tives would advance our society along the path to sustainabil-
technologies that will impact the evolution of the IoT in the ity. IoT technologies will take a major role in this context with
next few years. In light of such upcoming evolutions, we the intent of delivering systems for automatic management of
elaborate on the concept of the IoT itself to reach a correct production and distribution of energy by means of sensors and
definition of the IoT paradigm in Section VII. Finally, in actuators distributed across the whole chain, with the smart
Section VIII we draw our final conclusions. grid as one of the major application scenarios. Stringent QoS
(quality of service) requirements characterize the management
II. ROLE OF I OT FOR S OCIETAL CHALLENGES of power grids as immediate actions have to be taken upon
Our societies are facing many challenges and ICT can failure detections. Additionally, the resulting network should
assume a pivotal role, with the raise of IoT systems taking be highly adaptive to match the time varying behaviour, which
a momentous responsibility in this process. An effective characterize both the renewable energy production systems and
classification of the societal challenges is provided by the the energy consumption.
Horizon 2020 framework, which is the main program funding The challenge of a smart, green and integrated mobility
research and innovation activities in Europe [7]: health, demo- is enabling a transportation system that is resource-efficient,
graphic change and wellbeing; food security and sustainable environment-friendly, safe and seamless for the benefit of all
agriculture; secure, clean and efficient energy; smart, green and citizens and of the economy. This is the area where IoT has
integrated transport; climate action, environment, resource ef- taken its first steps, since RFID tags have been massively used
ficiency and raw materials; inclusive, innovative and reflective to track goods and improve the efficiency of transport and
societies; secure societies. logistics procedures. Indeed, real-time information processing
In the following Section II-A we describe how IoT can technology based on RFID and NFC can implement real-time
play a key role in addressing the above societal challenges. monitoring of almost every segment of the supply chain. By
Then, in Section II-B we describe how public authorities obtaining information related to products promptly, timely, and
can support the adoption of IoT for the above purposes and accurately, either a single enterprise or even the whole supply
discuss technical and non-technical barriers that still exist to chain can respond to intricate and changeable markets in the
the adoption of the IoT technologies. shortest time. It is a matter of fact that the era of seemingly
plentiful and low cost natural resources is coming to an end:
sources of raw materials, water and air, as well as terrestrial,
A. IoT and societal challenges aquatic and marine ecosystems are all under pressure. As a
The aging process of the working population puts the health consequence, there is a need for decoupling economic growth
and wellbeing issues among the top priorities in our society. from resource usage. An IoT challenge in this direction is to
Advancements in this area require the introduction of systems support green economy activities. An exemplary application
and technologies able to continuously monitor the status of the is the automatic management of the energy consumption in
environment where people live, work, travel, and to acquire smart cities so that the waste of energy resources is limited if
data about conditions of people themselves. The resulting not completely avoided. To this end, IoT systems should be
information should be available everywhere to doctors, nurses, able to become aware of the environment through a sort of
and relatives so that proper actions can be taken when needed. distributed intelligence and take appropriate local decision on
TABLE I
L IST OF ACRONYMS USED THROUGH ALL THE PAPER .
Fig. 1. Evolution of the IoT.
TABLE II
T HE THREE I OT GENERATIONS : MAJOR OBJECTIVE FOR EACH ADDRESSED TECHNOLOGICAL FIELD , KEY STANDARDS AND REPRESENTATIVE SCIENTIFIC
WORKS .
TABLE III
E XPECTED MAJOR CONTRIBUTIONS OF THE I OT SYSTEMS IN ADDRESSING THE SOCIETAL CHALLENGES AND DESIRED FEATURES .
the energy usage. corresponding required IoT features and possible contributions
Our society is also facing a number of important economic to their overcoming.
and political challenges posed by global interdependencies
and unprecedented transformations. These strongly affect its B. Role of public authorities and barriers to the adoption of
capacity to ensure economic growth, high employment lev- IoT solutions
els, and social stability. However, it suffers from sluggish In the contexts we have described above, public authorities
growth, difficulties to effectively implement structural reforms must play a key role in actively driving innovation. This may
in favour of innovation and employment, and increasing scepti- happen in different ways:
cism among citizens, especially young people. The revolution • Forcing the diffusion of open IoT data and processes:
of having our physical world at our hands through the net- as already mentioned, produced data and relevant services
work, introduces huge opportunities for innovators and new should be available to the external world, for other public
entrepreneurs for the benefit of the whole society. However, the or private activities. There are already rules that obligate
relevant technologies should be available to anybody, should public authorities to provide some data in an open way.
be easy to understand. Thus, schools will assume a funda- However, incentives to make available data produced by
mental role, as they will be the places where innovations are private companies should be introduced as well, at least
taught to everybody. Additionally, the data generated by these for the data relevant to the status of public environments.
systems have to be available to everybody; also the process • Fostering the utilization of the IoT infrastructure in
should be open to foster the interoperability and reutilization the city management: for instance, multiple distributed
of the services, especially those deployed by public authorities. sources available in the context of the open data, the
Security is one of the major concerns in our society, and big data and the smart city activities, can be managed,
in this respect IoT systems are involved from two different analyzed and visualized to understand urban development
points of view. First, pervasiveness of the IoT deployments patterns [8];
will imply that trillions of objects will be observing us in our • Introducing regulatory changes: the way the data is
daily activities; these must be designed so that the collected exchanged must be well-regulated to prevent any abuse.
data is used in the most reliable and secure way. Second, IoT IoT has still to face several challenges to be ready to play
systems themselves will be used as an effective tool in support the pivotal role we expect.
of the security of our society as the connected smart things First of all, it has to gain the trust of people. In fact, the
should be able to collect data about malicious behaviours in idea of a smart world all around us, which observes our habits
both the digital and physical worlds. Additionally, IoT systems and modifies its behavior according to what we do, what we
should be trustable, i.e., they should provide the requested say, and (soon maybe) what we think, may scare people for
services at the needed quality of service. Even more important, several reasons:
they should be perceived as trustable, i.e., it is necessary that • What if an IoT system controlling personal health related
people feel that IoT systems handle their data by preserving processes makes a mistake? We are accustomed to com-
freedom and security, like it is happening with cloud services puters and smartphones malfunctioning (due to software
that almost everybody uses without caring about security. or hardware failures). What if the above computers or
Table III summarizes the described challenges and the smartphones are key players in ensuring our healthy life?
In other words, the IoT, with all relevant technologies, a function is needed which is able to locate a resource and
must prove to be robust and resilient. provide information on how to reach it. This is the function
• What if some hackers violate IoT systems to compromise of the DNS in traditional IP networks and of the ONS in the
the correct functioning of the processes governing our EPC platforms as we will discuss in the next section.
daily life? What if they steel our private data? There are
many people worldwide who avoid any form of electronic III. T HE FIRST GENERATION OF THE I OT: THE TAGGED
payments for this type of fear. Are we sure that those THINGS
people will consciously accept the risks associated to a
violation of a pervasive IoT systems? Again, IoT must In this section we focus on the First Generation of IoT
prove to guarantee security and privacy. solutions. More specifically, we begin in Section III-A by
• How can an obscure technology be trusted by people who providing a general overview of motivations and solutions con-
do not have a clue about its internal operations? This is a sidered within such a generation. Then we provide more details
typical problem that technology faces: to be accepted they about the EPCGlobal Network (Section III-B), machine-to-
need people to build a mental model of their operations machine communications (Section III-C) and the technologies
[9]. This can be done in two ways: by educating people or provided to integrate RIFD systems and wireless sensor net-
by deceiving them, that is by hiding the real operations works (Section III-D).
behind the interfaces people are used to. Recall: many
electronic digital appliances still have a knob to control A. Overview
their behavior.
Unquestionably,
Only when the IoT will be much more resilient, robust,
secure, and easy to understand, people will trust it. the Radio-Frequency IDentification (RFID) technology
Additionally, IoT solutions must be practical. A smart played the role of founding technology for the Internet
environment enriched with a large number of sensors and of Things.
actuators is an attractive prospect as long as people will not The first definition of this paradigm, given by Ashton at
be required to periodically change the batteries on each of the end of last century, directly referred to RFID [13]. The
them. A lot of work has been done in this context, however, remarkable contributions by the Auto-ID Labs [14], a world-
energetically autonomous smart sensors and actuators have not wide network of academic research laboratories, have also put
reached the maturity level required to fulfil the real needs of the concept of Internet of objects into strong relationship with
IoT applications. In other words, the idea of networked RFIDs.
advances are required in both the domains of energy Consequently, the earliest steps towards the IoT have been
efficiency and energy harvesting. led by efforts to create an industry-driven global standard
As a last remark, to support the spread use of the Electronic Product CodeTM
people will accept the IoT if there are applications (EPC) and of RFID tagging solutions at a world-wide scale
justifying the presence of such an intrusive system [15]. The idea was to overcome the limitations of the Barcode
around them. approach and achieve a global item identification through
However, applications need developers and developers need unique worldwide identifiers, represented by the EPC codes
clearly defined, easily programmable, hopefully extensible, stored in tags directly attached to objects.
and rarely changing APIs. Here, the diffusion of the RESTful The idea that RFID solutions could have been the funda-
model in the Web of Things domain is helping a lot although, ments of the IoT is recurrent in early IoT related research
like we have seen, the IoT keeps evolving and nobody can [16] [17] [18]. Great emphasis has been given to the potential
safely say that the APIs typical of a RESTful model are at the to provide, through this technology, a cost-effective way to
end of such an evolution. In this context, public bodies can tag objects and give them an identity. Interesting examples
play a fundamental role by at least taking clear and shared of relevant applications based on RFID have been given, and
decisions on the open APIs to be used to access those data new regulatory approaches to ensure privacy and security in
collected by sensors deployed with the taxpayers money and, their fruition have been suggested. Accordingly, IoT was seen
thus, belonging to the collectivity. as an emerging global Internet based information architecture
Furthermore, a naming scheme must be decided. In fact, facilitating the exchange of goods and services in global
APIs allow interactions with IoT resources (objects, services, supply chain networks [18].
data servers, etc.) and, to this end, it is necessary to identify While the work on an RFID-based IoT was ongoing, remote
these resources. A lot of work on naming is being carried sensing solutions based on Wireless Sensor Networks (WSN),
within the context of Information-Centric Networking (ICN) Telemetry, and Supervisory Control and Data Acquisition
and even if there are very different opinions [10], the most (SCADA) [19] technologies had already reached a mature
accepted approach is the one proposed in [11] and derived stage. It was, therefore, quite clear that these
by the Universal Resource Locator [12]. As discussed in the technologies for remote sensing would have played the
following Section V-D, an ICN network would be able to route same key role in the IoT as RFID.
messages to interact with a resource by using only the name This is confirmed, for example, in [20], wherein Near Field
of such a resource. Nevertheless, this cannot be given for Communications (NFC) and Wireless Sensor and Actuator
granted (at least in the short and medium term). Therefore, Networks (WSAN) together with RFID are recognized as the
As it can be seen in Figure 2, the EPCglobal Network
includes six components (some physical, some logical):
• RFID tags: these represent the tags attached to the ob-
jects. They are characterized by a unique ID and may
have some processing capabilities.
• RFID readers: these are responsible to query the RFID
tags in their proximity and communicate the information
gathered to some backend server.
• Electronic Product Code: this represents the scheme uti-
lized to assign and interpret the unique tag identifier. 1
• Filtering middleware: this is responsible of receiving the
requests from the applications (opportunely translated by
the EPC Information Service as described later), process-
ing the data from the RFID reader(s), and returning data
to the requesting element (or another system specified
in the request). The data reported in the form of EPC
identifier is captured by a reader, and this has happened.
Fig. 2. The EPCglobal Network architecture. • Object Name Service (ONS): this is responsible for
transforming an EPC identifier into an URL and vice
versa. Its function is similar to that of Domain Name
atomic components that will link the real world with the digital
Systems in the Internet.
world.
• EPC Information Service (EPCIS): this is responsible for
Within the Pervasive Computing and the RFID communi-
storing the events (as described above) and responding to
ties, the idea of building a global standard infrastructure for
the queries generated by the applications.
WSN and RFID, based on the framework proposed for EPC,
soon began to take shape [21] [22]. However, despite the few Interactions with the above components occur through stan-
trials performed, it was immediately evident that integrating dard interfaces as discussed below. According to EPCglobal,
WSNs, as they were, into the EPC framework would have tags with different complexity level and functionalities can be
been a very tough task to accomplish. read by RFID readers: class 1 refers to Identity-tags, which
At the same time, a complementary approach was be- store an identifying code only; class 2 includes tags with
ing considered by the Sensor Network community to make additional memory storage and, optionally, with sensing capa-
data generated by sensors, SCADA and other telemetry sys- bility, such as Wireless Identification and Sensing Platforms
tems available in the Internet (the most relevant carried out (WISPs) [25]; class 3 specifies battery-assisted tags which
within the context of the Machine-to-Machine Communication use an on-board power source to empower sensors but not to
(M2M) group of ETSI). The great body of research carried generate the communicate signal; and class 4 tags, which use
out in this domain, summarized and commented in [23], batteries to also empower the communicate module. The radio
has contributed significantly to the understanding of sensor communication between RFID readers and tags is regulated
virtualization techniques. It must be said that none of the by the Air Interface standards, EPC Gen-2 protocol [26],
aforementioned attempts succeeded in reaching the critical and ISO 18000-63 [27]. These standards are aligned on the
mass necessary for a real take off. core functionalities and define modulations, encoding, medium
It was clear since the beginning that the proposed solutions access schemes, and a set of basic commands for Selection,
could not incorporate the RFID technology in a simple way. Inventory and Access to tags.
Therefore, only a few research activities tried to integrate To foster widespread adoption of these technologies, spe-
RFID systems and WSNs into a unique comprehensive picture. cific protocols define the message structure and the modalities
for applications interacting with RFID readers. To overcome
interoperability problems and to facilitate the development
B. Technologies for interconnecting RFIDs: the EPCglobal of applications, communications can happen at different ab-
Network straction levels. The Application Level Events (ALE) proto-
Objective of the EPCglobal Network is to link information col [28] specifies a software interface through which client
with objects, equipped with a tag identified by a unique EPC, applications may interact with filtered and consolidated EPC
and people. This is mainly done by defining and supporting data. Typically, the Filtering middleware implements the ALE
primitives that allow applications to query specific objects interface, but also smart RFID readers can provide it. This
about their status. 1 In this perspective, it is worth mentioning the IEEE 1451 standard
The EPCglobal Network architecture is based on a lay- (standard for Networked Smart Transducer Interface), whose major component
ered service oriented architecture (SOA) with an emphasis is the TEDS (Transducer Electronic Data Sheets). TEDS is a sort of identi-
on defining the interfaces between the different components fication card carried by a person. It stores manufacture-related information
for the transducer(s), such as manufacturer identification, measurement range,
[24]. When defining the interfaces, modularity becomes a key accuracy, and calibration data, similar to the information contained in the
feature with several technical and economic advantages. transducer data sheets normally provided by the manufacturer.
M2M Area Network that can be based on any LAN standard
such as IEEE 802.15.4.
The M2M Service Capabilities layer has the objective to
abstract the resources of the M2M Device and to establish a
secure communication between the application running in the
Network Domain and that running in the M2M Device. The
idea is to allow different applications to run over the same
M2M Device.
The M2M Application layer, instead, defines the application
logic. Instances of the M2M Application layer (as well as of
the M2M Service Capability layer) run in both the Device &
Gateway and the Network Domains.
It is important to note that in the ETSI view, which is
strongly influenced by the perspective of cellular network
operators, M2M Devices or their M2M Gateway must be
equipped with a cellular wireless interface.
Fig. 3. High level architecture for M2M Communications according to ETSI. In the Network Domain the Access Networks provide
M2M Devices with access to the Core Network: these are
independent, in general, from the M2M technologies, and
interface can be used by applications or the EPCIS. By means
include most of the available data access standards. The Core
of ALE, an application generates a high-level description of,
Network instead offers (at least) IP connectivity, service and
for example, the data to be read from or to be written to
network control functions, interconnection with other networks
tags, the period of time, and the filters to select particular
and roaming functionality.
tags. Alternatively, Low Level Reader Protocol (LLRP) [29]
provides specific parameters and controls to set the command
and timing parameters of the RFID air protocol. Obviously, D. Technologies to integrate RFIDs and WSNs in the IoT
the ONS and the EPCIS implement interfaces that can be used In this context, two approaches can be considered: (i)
by applications to retrieve the EPC identifier associated to a integration at the object level, i.e., any type of objects can be
logical name (a URI for example) or to query the system about integrated in the IoT; (ii) Integration at the system level, i.e.,
some events. a unique abstraction of object is defined which can represent
An interesting project aiming at creating a microcosm any type of device.
for the IoT spanning applications, systems, and social is- Integration at the object level: This integration is fostered
sues, that are likely to emerge in a realistic day-to-day set- by technological advances in miniaturization, energy harvest-
ting, has been carried out at the University of Washington. ing, and energy efficiency that make it possible to integrate
There, the involved researchers have developed a building- passive (in terms of energy usage) hardware platforms, like
scale, community-oriented research infrastructure called RFID some RFID tags, with some environmental sensors and mem-
Ecosystem (http://rfid.cs.washington.edu). ory banks needed to store data. Relevant examples include the
WISP as well as the proposals in [31] and [32].
C. Technologies for machine-to-machine communication Two families of architectures can be distinguished that
The European Telecommunication Standards Institute support integration at the object level: some solutions consider
(ETSI) has focused on the definition of a standard for cellular the resulting nodes as RFID tags equipped with sensors,
M2M communications. In fact, cellular network operators while others consider the resulting nodes as wireless sensor
see in the spreading of M2M technologies the opportunities nodes with a unique ID. In the first case, the EPCglobal
to include machines in their user basin, so as to increase network architecture is the starting point and extensions are
their revenues despite the continuous decrease in the per-user introduced to support the new formats of messages (which
revenues. can accommodate the values measured by sensors). However,
The high level architecture envisioned by ETSI is depicted solutions based on such an approach cannot integrate the data
in Figure 3 and is based on a RESTful service approach [30]. generated by traditional sensor networks (already deployed in
As shown in the picture, two domains can be distinguished: the environment) and do not support direct communications
the Network Domain and the Device & Gateway Domain. between nodes; i.e., a reader is needed in the proximity of the
Major components of the Device and Gateway Domain are node to collect the measured data.
the M2M Applications and the M2M Service Capabilities lay- In the second case, instead, nodes can communicate with
ers. In some cases, these layers will be executed by the M2M each other according to the multi-hop wireless communication
Device. In other cases, the M2M Devices have not enough paradigm supported by the WSN solutions. A remarkable
resources to run them and therefore, the above components run example of such an approach is proposed in [33], where a
in appropriate gateways (M2M Gateways) acting as a proxy Smart Object (wireless node with sensing capabilities and
between the Network Domain and a few M2M Devices. Such unique ID) is defined, which is able to directly communicate
M2M Devices are connected to the M2M Gateway through a with its peers. Differently from RFID tags equipped with
IoT-Architecture (IoT-A) project, which was funded by the
European Commission to define an architecture for the IoT
[37].
Central in the IoT-A architecture, shown in Figure 5, is
the clear separation between the physical entities and the
services associated to the IoT devices. For example, a room
in a building is a physical entity whereas the temperature
sensor deployed in that room provides a service associated
to it. In IoT-A physical entities have representations in the
digital world called Virtual Entities (VEs). Virtual Entities
are associated to services offered by the IoT devices pro-
viding information about VEs. Such services are called IoT
Services. Examples of IoT Services are the measure of some
Fig. 4. Possible integration of RFID and WSN at the system level. environmental parameter achieved through some sensor or the
positioning of some object achieved thanks to RFID systems.
Processes concerning a single VE are managed by the IoT
Process Management component.
In the IoT-A architecture a very important role is played by
the Service Organization component which is a sort of hub that
orchestrates the processes triggered by the Applications to im-
plement a meaningful business logic. Obviously, all the above
components exploit the service offered by a Communication
component. Finally, there will be a Management and a Security
component which will span all layers of the architecture.
While the holistic approach followed by IoT-A project
delivers an architecture which is able to fully integrate RFID
Fig. 5. IoT-A architecture.
tags and wireless sensor nodes, the implementation of relevant
modules is still at the prototype stage and most solutions are
still based on the EPCglobal network architecture.
sensors, Smart Objects are characterized by high communica- In the view of the RFID and sensor integration, it is worth
tion and interaction capabilities as well as higher management citing SARIF [38] and MoCoSo [39] as examples of projects
autonomy. that, together with the EPC Sensor Network of the Auto-ID
Furthermore, in the solution proposed in [33] nodes are clus- Lab Korea, represents efforts to combine concepts of object
tered and a cluster head is identified. This collects information identification, sensor data and the Internet.
generated by other nodes in its cluster and is responsible to
transfer this information towards the network infrastructure. IV. T HE SECOND GENERATION OF THE I OT: FULL
The use of a cluster head is common to improve efficiency in INTERCONNECTION OF T HINGS AND THE ( SOCIAL ) W EB
the WSN literature [34]–[36]. OF T HINGS
As a general consideration, solutions that envision the In this section we focus on the Second Generation of IoT
integration at the object layer are unpractical in that they solutions. More specifically, we begin in Section III-A by
cannot integrate objects already deployed in the environment. providing a general overview of motivations and solutions
Integration at the system level: The basic idea of the considered within such a generation. Then we provide more
solutions envisioning the integration at the system level is to details about the solutions proposed to integrate constrained
introduce a component at the edge of the network infrastruc- devices into IP networks (Section IV-B), the Web of Things
ture which hides the differences and heterogeneities among technologies (Section IV-C), and the earliest attempts to ex-
nodes. ploit social networking in the IoT (Section IV-D).
For example, as shown in Figure 4, the authors of [21]
introduce a sort of gateway between wireless sensor networks
and the EPCglobal network infrastructure to translate events A. Overview
generated by the wireless sensor network into the appropriate The second generation is characterized by a continu-
formats. Major advantage of such a solution is that it does not ous reduction in the interest around tag-centric solutions.
require changes in the EPCglobal network infrastructure which In fact, in the second stage of the IoT evolution, the major
has strong industrial support. Nevertheless, it has two major focus was on giving the simple objects the capabilities to
drawbacks: it is not tailored to handle information generated be directly connected to the Internet like any other host.
by sensors and it leaves the management of the WSN external Undoubtedly, the driving force in this direction has been
to the management of the rest of the system, which may result the consensus gathered around the work conducted by Work-
in inefficiencies. ing Groups of the Internet Engineering Task Force (IETF)
A more holistic approach has been considered within the finalized to the deployment of IoT by leveraging on the IP
protocol. This latter is light, already connects a huge number LR-WPANs, characterized by short frames whose payload can
of communicating devices, and can run on tiny and battery almost be completely filled by the combination of IPv6 and
operated embedded devices. Therefore, it can support IoT TCP headers.
through a wise adaptation of its basic functionalities and Another topic addressed is related to the bootstrap phase,
the incorporation of the reference standard for Personal Area during which objects need to acquire their network addresses.
Networks (short range networks with a radius of a few meters) This may happen in two ways: either statelessly by combining
into its architecture; this was exactly the task of the cited a EUI-64 unique identifier with an IPv6 address prefix or
working groups. The encouraging results in this context have through a dynamic address assignment mechanism like in
soon inspired several interesting attempts of integrating RFID DHCPv6. Network discovery protocols have been also defined
devices into the IP-based IoT vision of the IETF [40] [41], to support neighbour nodes to discover each other, manage
[42], [43], [44], [45]. the other presence, determine link-layer addresses, discover
During the same years the new approach of designing neighbour routers, and maintain information about the active
applications in the Internet as web applications (i.e. able neighbours.
to run in a web browser, because created in a browser- The actual integration of 6LoWPAN networks into the Inter-
supported programming language) was rapidly emerging. This net requires the functions of a gateway translating 6LoWPAN
also brought IoT into a sort of generational leap to enter the packets into standard IPv4 (or IPv6) packets. By deploying
Web of Things era [46], [47]. According to this paradigm Web 6LoWPAN it is possible to consider a node of a WSN as a
standards are reused to connect and integrate everyday-life node of the Internet. 6LoWPAN also provides the functionality
objects, which contain an embedded device or computer, into to transform each device into a web server. Additionally,
the Web. sensor virtualization techniques allow for creating abstractions
In parallel with the depicted activities, also social network- of sensors which could be queried without the need of
ing concepts began to penetrate several ICT technological knowing the specific features of the sensor node. Since its
domains, which span from delay-tolerant to peer-to-peer net- introduction, several 6LoWPAN protocol stacks have been pro-
working, from content searching to content recommendation. posed. Contiki is one of the major efforts (http://www.contiki-
IoT was not immune to this phenomenon. Several research os.org), which is anopen sourceoperating systemfor networked,
efforts appeared in the literature intended for exploiting social memory-constrained systems with a particular focus on low-
concepts in the IoT domain [48]. These were just the first power wirelessInternet of Things devices.
signs of a new approach to design social IoT solutions that
will emerge in its full disruptive nature during the subsequent
C. Web of Things technologies
generation of IoT.
Making low power sensing devices capable of communi-
cating in an IP network is not sufficient, as explained in
B. Technologies for integrating constrained devices into IP [50]. Integration of wireless sensor nodes into the IoT requires
networks the support of HTTP-based services so that sensor nodes can
Towards the creation of a full IoT, Internet technologies become devices of the World Wide Web. Indeed, HTTP-based
and protocols are expected to be extended to seamlessly applications are the leading traffic sources of the Internet [51].
and efficiently integrate objects (mostly moving) into the Thus, the HTTP-based interaction model is extremely popular
broad internetworking community. Such extensions have been and most software developers have developed a thorough
studied for more than a decade, by following two main knowhow in web technologies and programming.
axioms: i) Things are wirelessly connected to the rest of the It would therefore be desirable, from the point of view
world and ii) IP will continue to be the core protocol of of software developers, to deal with all devices connected
the Internet. Accordingly, major amendments to the running to the Internet by exploiting web services. To satisfy
Internet architectures have been proposed, which are mostly such a compelling request, technologies have been intro-
finalized to enable Things to use the IP protocol and related duced in the market that embed Web server functionalities
facilities exactly the same as it happened for other hosts. even in the tiniest communication devices. Examples in-
In this framework, in 2005 the Internet Engineering Task clude the ttpd (http://www.acme.com/software/thttpd/), Busy-
Force (IETF) started the activities around the IPv6 over Low box (http://www.busybox.net), Boa (http://www.boa.org), and
power Wireless Personal Area Networks (6LoWPAN [49]) lighttpd (http://www.lighttpd.net).
working group with the major objective of an adaptation of The introduction of the Web of Things concept is a natural
IPv6 and the incorporation of IEEE 802.15.4, i.e. the reference result of the above trend. In the Web of Things, IoT devices
standard for Low Rate Wireless Personal Area Networks (LR- are considered as resources of the World Wide Web [46], [47].
WPAN, short range networks with a radius of a few meters), Devices are modelled as web services, which are uniquely
into the IP architecture. Accordingly, 6LoWPAN specifies identified by a Universal Resource Identifier (URI) such as
a lightweight IPv6 version which can be run by resource web pages in the Internet.
constrained devices. One of the addressed issues is related to For example [46], the Sun SPOT platform is a Java-
the size of the packet headers; indeed, appropriate strategies programmable embedded system equipped with a few sensors
have been defined for their compression to the purpose of (light, temperature, and accelerometer) and actuators besides
making the IP header (mostly IPv6) conveyable into low rate the internal components such as the radio transceiver and the
Fig. 7. Architecture of the Web of Things.
Fig. 6. Architecture envisioned by CoRE.
the fact that data sensed by things is made available to the solution is the Toyota Friend Network, which has been con-
humans through their major social communication platforms. ceived as one of the earliest platforms in which data generated
However, this major objective can be further classified accord- by objects, in this case automobiles, are made available in a
ing to the specific intended use of the data produced by the social network of humans for marketing purposes.
objects. In all the mentioned scenarios, objects interact with humans
Some implementations are aimed at enabling the owners to through their SNS. In parallel there have been studies that
have an easy way to access her own objects data though the ob- augmented the objects with social capabilities to improve their
ject capability of posting messages on the owner social board aptitude in exchanging data with the external world without
with limited visibility. In this way, users are continuously the use of human SNS. Indeed, one of the first ideas of
connected to and updated about their social things while also pseudo-socialization between objects can be found in [65],
connected to their friends. This is the case of the socialFarm which proposes the Smart-Its Friends procedure that allows
experimented in [60], in which farmers check the status of the users to have a very easy-to-use interface to impose temporary
animals, crops and greenhouses by making relevant sensors relationships / connections among smart wireless on the basis
capable of publishing their data on Facebook. of the devices context. Other approaches had the objective
Other implementations are instead specifically focused on of facilitating human social communications. Finally, some
making this information available to the community of either researchers focused on tools for the analysis of IoT data [66].
current friends or potential friends, i.e. unknown people but The tools to compose and build personalized and social
with high level of homophily discovered though the social applications that process data from different sources are in
things. One of the first proposals along this line is in [61]. continuous evolution. Among these tools are: Ninja Blocks
The main idea proposed in that article is that a user who [67], IFTTT [68] and the already mentioned Paraimpu [63].
wishes to share data sensed by her own objects can do this by Ninja Blocks controls devices that can sense their environment
posting such data on Facebook and allowing selected people and can act by controlling lights, power sockets, and other
to view them. A similar approach is proposed in the CenceMe actuators. The system provides a tool to drive the composition
application [62], which focuses on combining information of actions and sensing tasks with common social web sites
on the presence of individuals obtained through off-the-shelf such as Twitter, Facebook, Instagram. IFTTT is aweb-based
sensor-enabled mobile phones, with the user profile in social service that allows users to create chains of simple conditional
networking platforms such as Facebook and MySpace. statements involving any type of objects and through many so-
Slightly different from the previous scenario are those of cial network sites. Accordingly, when some events monitored
benchmarking and crowdsourcing. According to the former, by objects make some statements becoming true, other objects
data gathered from the IoT systems is used to benchmark are triggered to perform specific actions.
the activity of humans in a given domain with respect to A further remarkable project to mention is under develop-
the average behaviour of communities of interest. This is the ment at the Ericsson Research laboratories, where researchers
case, for instance, of the SocialElectricity prototype, which is of the Usability Laboratory are implementing their vision
a Facebook application that allows people to compare their of Social Web of Things [9]. Accordingly, objects become
electricity footprint with their friends in a wide-scale. [60]. capable of more autonomy and the interactions between ob-
Some works have proposed the use of the human social jects of the IoT are presented in analogy to the interactions
networking platforms to manage things. This is the case of people usually experience in Facebook or Twitter or other
the Paraimpu project, where the humans can connect sens- social networks. This helps people to master the complexity
ing devices to either actuating devices or web services by introduced by the IoT networking paradigm.
accessing her own social networking account [63]. A more
complete framework in this sense is the one presented in [64], V. T HE THIRD GENERATION OF THE I OT: AGE OF SOCIAL
where the authors design a social networking service as the OBJECTS , CLOUD COMPUTING , AND F UTURE I NTERNET
converging point for people, web services, and devices and the In this section we focus on the Third Generation of IoT
SN is considered as a meaningful opportunity to finally bring solutions. More specifically, in Section V-A we provide an
the Semantic Web and the IoT to users. Another interesting overview of the motivation and solutions considered within
this generation. In the following sections we then present the robustness, energy efficiency, to mention some) by relying
major characteristics of Social Internet of Things solutions on IP-based solutions. ICN features such as the effective
(Section V-B), the use of semantic technologies and ICN content naming schemes, the associated data retrieval and data
paradigm in the IoT domain (Sections V-C and V-D), the sharing approaches, the native mobility support, the in-network
integration of IoT and cloud computing solutions (Section caching, and the content-based security are very appealing to
V-E), and the evolved RFID solutions in the IoT (Section V-F). IoT designers. Therefore, the strong commitment of several
research groups towards the application of ICN principles in
IoT contexts opens new opportunities [72].
A. Overview As a further point, it is worth highlighting the central role
The Internet world is rapidly evolving under the pressure played by knowledge representation solutions in this stage of
of a new wave, which is changing the way of building Inter- the IoT evolution. Currently, IoT systems and applications
net services and enabling ubiquitous, convenient, on-demand cannot be effective without a complete knowledge about
access to them: cloud computing. At the same time, a new their components, characteristics and features, which must be,
generation of social objects is raising and is pushing towards somehow, formalized and disseminated. To this end, ontology
new disruptive paradigms for social networks of things. Last, can be used to introduce a formal, explicit specification of a
the Internet, as we have been knowing it, is about to undergo shared conceptualization so as to represent knowledge within
profound transformations which put content and services at a domain as a set of concepts related to each other. Ontology
the very center of the network operations. is then used by semantic engines for different purposes, such
All these aspects are causing a further generational leap as: search, composition, and translation.
which is taking the IoT in what is often referred to as To conclude the description of this new era of the IoT, it is
the Future Internet which will exploit cloud computing also worth pointing out what happened to its funding technol-
technologies and will be people-, content-, and service- ogy, i.e. RFID. Actually the interest on it has not completely
centric. disappeared, but surely its centrality in third generation IoT
The reasons for an extension of cloud computing technolo- solutions is severely reduced.
gies and solutions to the IoT domain are various. Things
generate great amounts of data that need to be stored. Being B. Social Internet of Things
local device memory usually limited and costly, the best
A keen attention to the social potential of the IoT building
solution is to send data to the cloud, where functionalities
blocks characterizes this generation. In fact, one finds papers,
such as encryption, authentication, duplication, annotation [69]
such as [73], which describe architectures where objects are
can be implemented easily. Also the things need for on-
clearly identified as potentially able to participate in communi-
demand use of IT resources (e. g., computer, storage, and
ties of objects, create groups of interest, and take collaborative
network) in a scalable and cost efficient way matches the cloud
actions. This kind of researches, however, theorize the Social
computing paradigm very well. Besides, IoT devices are highly
Internet of Things but do not indicate how to build the
heterogeneous in terms of interfaces, achievable performance,
envisioned social network of objects and how to implement the
and capabilities. The cloud may help in managing this hetero-
needed architecture and protocols. This is provided by [74],
geneity by providing a common IoT application development
where the authors propose mechanisms that can be used by
layer wherein the different hardware devices are virtualized.
objects to build friendship relationships. Besides, they suggest
At the same time, services from different providers can be
an architectural model for the resulting social IoT with the
merged (mashup process) in the cloud to provide complex
major building blocks to create and manage the objects social
services [70].
network. By relying on this architecture, [75] analyses the
As already mentioned, during the third stage disruptive
problem of evaluating the trustworthiness of each node in the
novel approaches to exploiting social networking concepts and
network and propose a method to allow objects mimicking the
technologies in the IoT domain are fast arising. The driving
behavior of the humans when evaluating the trustworthiness
idea is to allow objects to autonomously establish social
of friends. Motivated by the considerable amount of work in
relationships and create their own social network separated
this field, a recent review of related researches appeared in
from the one of the humans. The motivation is that a social-
the literature [76]. Herein, the use of the social networking
oriented approach is expected to boost the deployment of
technologies are seen as means to increase the pervasiveness
effective solutions to discover, select, and compose services
and ubiquity of the computing systems as (social) interactions
and data provided by distributed objects. It allows objects to
among objects in our living places are necessary to improve
create a network, which manifests interesting properties in
the ICT system performance.
terms of navigability, trustworthiness in data exchange and,
scalability in a community of billions of devices.
At the network layer, the Information Centric Networking C. Semantic in the Internet of Things
(ICN) paradigm, recently proposed to replace the host-centric One of the most notable efforts in this area is the Se-
networking paradigm of the Internet with a solution centred mantic Sensor Network Ontology (SSN) [77], which is not
around the exchanged data units, is gaining ground [71]. It application-dependent and is frequently adopted in different
represents a solution to the difficulties in matching the strin- IoT domains to describe the sensor and context properties.
gent performance requirements of IoT systems (scalability, SSN is natively able to model the most common context
properties and the set of properties can also be extended typical of the IoT, greatly differ from the SRs in the core
unlimitedly. An important characteristic of SSN is that sensors networks. Therefore, a content-centric internetworking scheme
are not constrained to physical sensing devices; rather a sensor and relevant specific strategies to adapt to the needs of weak
is anything that can estimate or calculate the value of a devices, playing the role of producers and consumers of IoT
phenomenon. Therefore, either a device or a computational data and applications, are studied in [87]. Similarly, the work
process or combination of these can play the role of a sensor, in [88] combines CCN with the concept of IoT and investigates
while a sensing device is a device that implements sensing different ways to make use of the hierarchical CCN content
and belongs to the sensor class [78]. naming, in-network caching, and other information-centric
The main drawback of SSN lies in the limitations of the networking characteristics in a sensor environment.
adopted semantic web approach, which is unable to describe Differently, with reference to the Named Data Networking
and perform reasoning over the system dynamics. In the IoT, (NDN) architecture, a high-level architecture for IoT systems
this precludes any object representation that can evolve over has been described in [89]. On top of the Thing layer, that
time (e.g., having their access policy, availability, geo-location, accounts for the multitude of devices of the IoT ecosystem,
etc. changing over time). The highlighted issue is clearly iden- NDN acts as a networking layer, which hides to applications
tified in the recent literature. Proposals are appearing, which the complexity and diversity of the underlying things by
propose to combine semantic web technologies with temporal adapting its modules to their features. Besides, in [90], the
and spatial reasoning in order to accurately reflect the behavior authors propose an NDN-based framework for the support of
of the considered IoT systems. The contribution in [79] is multi-source data retrieval (e.g., environmental monitoring),
noteworthy in that it also demonstrate that the effectiveness of which is a typical IoT traffic pattern not natively supported by
proposed solutions can be increased by adopting distributed NDN.
models. An overview of possible naming schemes for the IoT is also
described in [91] as part of a study conducted by referring
D. The Information Centric Networking paradigm in the IoT to the MobilityFirst architecture 2 . This report is interesting
The “prehistory” of ICN approaches for the IoT is probably in that it lists the different naming scheme applicable to IoT
represented by the ideas proposed by Ivan Stojmenovic and and compares them with naming schemes available in ICN
Stephan Olariu in their work [80], which dates back to 2005, solutions.
when the idea of IoT had not received yet the attention it is Differently, in [92] the authors propose a service discov-
receiving now. Although the authors actually review a number ery architecture for IoT which enables multi-ownership and
of emerging topics pertaining to a data-centric view of wireless flexible management of information that is associated with
sensor networks (such as data-driven routing for example), an object during its entire supply chain (clearly they refer to
their work already includes some interesting ideas that have objects tagged by RFID technology). The authors claim that a
been later recovered to handle data in ICN-based solutions for prototype will be implemented, based on the information cen-
the IoT. Scenarios for information centric wireless sensor and tric Publish-Subscribe Internet (PSI) architectures, originally
actuator networks are also the subject of later works, such as created by the FP7 project PSIRP3 .
[81], [82], [83], and [84].
More recently, several research activities have been devoted
to the integration of the ICN concepts specifically into the E. The IoT moves to the Cloud
IoT. Research in this area is still at an early stage, although The need to migrate to the cloud typical features of IoT
the advantages and opportunities that ICN offers and the is rooted in the specific nature of the objects that populate
related challenges in a perspective of ICN-IoT integration have it. Due to the energy-constrained nature of wireless sensor
already emerged. Also, solutions to the problems of service devices, several solutions in the relevant literature envision the
discovery and naming for IoT have already been proposed as alternation of duty-periods [93] and periods in which the RF
part of the main platforms of ICN developed. interface of these devices is switched off. Similarly, RFID tags
Recent IETF Drafts [85], [86] address the issue of building spend most of their time outside the radio coverage of an RFID
a unified IoT platform based on the Information Centric Net- reader. It can be concluded that IoT things are unreachable
work architecture. The authors clearly highlight the limitations during most of their lifetime. Oppositely, IoT applications
of IP in serving as an internetworking layer for the different usually require things to be always reachable.
intranets of things developed without any form of coordination. Hence, the need has been identified for a digital counterpart
They also illustrate the potential of the main features of ICN of any IoT devices always on and running in some Internet
to achieve seamless mobility support, scalability, and efficient servers [94] and to design solutions in which applications
content and service delivery in an Internet of Things. interact with such digital representatives of physical entities.
Most of the work concerning the integration of ICN in According to the current technological trends in the ICT
the IoT has the Content-Centric Networking (CCN) [11] community, the straightforward next step is to move these
architectures at its very basis. CCN provides a core network for entities into the cloud. Therefore, solutions have been proposed
the future Internet characterized by in-network memory and that envision a Cloud of Things [95], [96], [97].
composed of Super Routers (SRs) with large content stores,
high computing capabilities, and relatively reliable commu- 2 http://mobilityfirst.winlab.rutgers.edu/
new ways of addressing energy management issues (IoT for in the next future IoT platforms will evolve towards the
energy), new approaches to handling people health and well- architecture shown in Figure 10, as explained in the following.
being (IoT for e-health). The novelty is that not only human Appropriate software drivers will create abstractions of the
beings, using objects enhanced by pervasive technologies in IoT physical resources. Note that drivers can run either in the
innovative way, are involved in the process. Rather people and IoT devices or in some server. Such abstractions will hide
objects interact with each-other, as peers. Such an inclusion of the specific hardware/software features of the IoT resources.
everyday objects (or better their virtual representations) in the The abstractions of the IoT resources will be used by the IoT
process allows to create applications with a higher penetration Operating System which is organized in three layers:
rate into everyday life. • Southbound API: This is a common layer of modern Net-
If one does not accept the definition of IoT as a new work Operating Systems, e.g., [119], and is responsible
“conceptual framework” that includes these three points of of creating internal representations of the IoT resources
views, which might seem a little too inclusive, then, for intel- and their services which are used by the Core layer. One
lectual honesty, the risk is having to define IoT a “big hoax” of the most important operations executed by the South-
because the greatest part of the self-styled IoT technological bound API layers are the mapping between a unique,
solutions, which nowadays are inflating the ICT market, would platform-independent identifier of a specific IoT resource
discover to be nothing more than solutions belonging to the and the platform-dependent address of such a resource.
old domains of pervasive computing, wireless sensor networks, Another fundamental operation of the Southbound API
M2M, RFID based tracking, and social sharing of devices. layer is the implementation of the specific communica-
It is indisputable that today the attention on the use of these tion/interoperation protocol of the physical resource.
technologies under the new name of IoT has grown at an • Core layer: This is responsible of the most critical
incredible pace, never observed before, and has brought great operations executed by the IoT Operating System. In
results. In this view, “the Internet of Things panacea” is wel- the Core layer the Social IoT will play a key role as
come; but unfortunately, at least for now, it is hardly possible it allows to create an overlay network spanning differ-
to speak about any new real emerging IoT technology in the ent and even heterogeneous IoT platforms [74]. Other
current ICT scene. Rather, we are persuaded that the best defi- important operations performed by the Core layer are
nition that can be given, in our humble opinion, for the Internet related to the management of the resources and include
of Things as it appears today and is sketched in Figure 9 is: Scheduling, the management of Security and Trust, and
a conceptual framework that leverages on the the Resource/Service Discovery. Note that Security and
availability of heterogeneous devices and Trust Management as well as Resource/Service Discovery
interconnection solutions, as well as augmented will strongly rely on-the SIoT.
physical objects providing a shared information base on • Northbound API: Finally, we have the Northbound API,
global scale, to support the design of applications which is responsible of creating an abstraction of the
involving at the same virtual level both people and services offered by the physical resources. A good
representations of objects. starting point for the Northbound API is the work
In accordance with the above definition, we envision that carried out within the Open Connectivity Foundation
Fig. 9. A high level representation of the IoT conceptual framework.
Northbound
Core layer
Management func;ons
Resource
Security/
Scheduling Search/ …
IoT Opera;ng System Trust
Discovery
Social IoT
Southbound API
ID
Drivers
(Abstrac;ons of IoT
resources)
(https://openconnectivity.org). By leveraging the North- interconnection through web technologies; the third one of
bound API, it will be possible to implement applications social objects, semantic data representation, and cloud of
according to the SAaaS as presented in Section V-E. things.