Changes

no edit summary
Line 63: Line 63:  
   <p class="highlighted mw-collapsible-content">The IoT evolved from machine-to-machine (M2M) communication. The M2M data is commonly used as a way to determine the health and status of things – inanimate or living. Taking M2M communication to the next level, IoT is a “sensor network” that can be composed of billions of smart devices that connect people, systems, and other applications to collect and share data.</p>
 
   <p class="highlighted mw-collapsible-content">The IoT evolved from machine-to-machine (M2M) communication. The M2M data is commonly used as a way to determine the health and status of things – inanimate or living. Taking M2M communication to the next level, IoT is a “sensor network” that can be composed of billions of smart devices that connect people, systems, and other applications to collect and share data.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="inline">The IoT’s systems and platforms enable physical objects and infrastructure to interact with monitoring, analytic and control systems over digital Internet-style networks.<ref>Forrester. (2018).<i> [https://www.forrester.com/staticassets/glossary.html#heading-i Glossary]</i>. Retrieved from Forrester</ref></p><p class="highlighted inline mw-collapsible-content"> Many IT administrators use IoT systems for anything in their physical environment that they want to collect information about. The IoT describes a world where almost anything can be connected and can communicate in an intelligent fashion.</p><p class="inline"> With IoT, the physical world is becoming an aggregated information system where everyday physical objects are connected to the internet and are able to identify themselves to other devices. This is significant because an object that can represent itself digitally becomes something greater than the object by itself. The object no longer relates just to its user, but is now connected to the surrounding environment</p><p class="highlighted inline mw-collapsible-content">, objects, and to database data. When many objects act in unison, they are said to have “ambient intelligence” </p><p class="inline">.</p>
+
   <p class="inline">The IoT’s systems and platforms enable physical objects and infrastructure to interact with monitoring, analytic and control systems over digital Internet-style networks.<ref>Forrester. (2018).<i> [https://www.forrester.com/staticassets/glossary.html#heading-i Glossary]</i>. Retrieved from forrester.com</ref></p><p class="highlighted inline mw-collapsible-content"> Many IT administrators use IoT systems for anything in their physical environment that they want to collect information about. The IoT describes a world where almost anything can be connected and can communicate in an intelligent fashion.</p><p class="inline"> With IoT, the physical world is becoming an aggregated information system where everyday physical objects are connected to the internet and are able to identify themselves to other devices. This is significant because an object that can represent itself digitally becomes something greater than the object by itself. The object no longer relates just to its user, but is now connected to the surrounding environment</p><p class="highlighted inline mw-collapsible-content">, objects, and to database data. When many objects act in unison, they are said to have “ambient intelligence”<ref>Emery, C. (2016, June 24).<i> [https://www.techopedia.com/2/31587/it-business/it-marketing/the-awakening-of-ambient-intelligence The Awakening of Ambient Intelligence]</i>. Retrieved from Techopedia.com</ref></p><p class="inline">.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p>
 
   <p class="highlighted inline mw-collapsible-content">There are many types of IoT smart devices, and more emerge every day.</p><p class="inline"> The IoT technology in the home can consist of entertainment systems, including televisions, gaming systems,</p><p class="highlighted inline mw-collapsible-content"> speakers, and headphones,</p><p class="inline"> as well as heating/cooling systems such as</p><p class="highlighted inline mw-collapsible-content"> the thermostat, ceiling fan,</p><p class="inline"> carbon monoxide detector, smoke alarm, and lights. Home security IoT systems include alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants. Home IoT appliances can include refrigerators, coffee makers, the oven, and the vacuum cleaner. External IoT objects can include connected smart cars, buses, trains, and airplanes. They also include wearables like fitness trackers and smartwatches, and healthcare devices like heart and blood pressure monitors.</p><p class="highlighted inline mw-collapsible-content"> Even pets can be connected via IoT with a tracking collar.</p><p class="inline"> By combining these connected devices with automated systems and Artificial Intelligence (AI), it is possible to gather new information, analyse it in real-time, and create an immediate action to help with a particular task, improve processes, or gain new insights.</p>
Line 70: Line 70:     
   <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled  smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p>
 
   <p>Internet of Things refers to the ever-growing network of physical objects that feature digital Internet connectivity. The IoT technology works via web-enabled  smart devices that transmit information gathered from their surroundings using embedded sensors, software, and processors. The IoT extends Internet connectivity beyond traditional devices like desktops, laptops, smartphones and tablets to a more diverse range of devices, everyday objects and industrial devices that communicate via the Internet.</p>
  <p class="inline-spacer"></p>
+
 
   <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).</p><p class="inline"> Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p>
+
   <p class="highlighted inline mw-collapsible-content">First, sensors or devices collect data from their environment. Data is then sent to the cloud connected through a variety of methods including: cellular, satellite, WiFi, Bluetooth, Low-Power Wide-Area Networks (LPWAN), an IoT gateway, other edge devices, or by connecting directly to the internet via Local Area Networks (LANs) or Wide Area Networks (WANs).<ref>McClelland, C. (2017, November 20).<i>[https://medium.com/iotforall/iot-explained-how-does-an-iot-system-actually-work-e90e2c435fe7 IoT Explained — How Does an IoT System Actually Work?]</i> Retrieved from medium.com</ref></p><p class="inline"> Some IoT devices have internal systems that are capable of processing and analyzing data at their local level, such that data sent to the cloud is not simply raw data. In other words: data processing can occur closer to the point of contact, at the edge of the network. Edge computing and processing has become a major component in IoT. This saves data-driven decision-making time by allowing the IoT device to act upon its own analysis, rather then sending large data volumes to a data centre’s analytic system and waiting for that system to signal an alert or make a decision. The connectivity, networking and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p>
 
   <p class="inline">Once data gets to the cloud, analytic software processes it to enable decision making. This could be very simple, such as checking if a temperature reading is within an acceptable range, or very complex, such as using computer vision on IoT video to identify objects (such as prolonged unattended bags at airports).</p><p class="highlighted inline mw-collapsible-content"> This information is made useful to the end-user in some way, usually in near real-time with an alert (email, text, notification, etc), although many IoT reactions can be performed automatically via predefined rules set by the user.</p><p class="inline"> As such, most of the work is done by the IoT devices without human intervention, although users can interact with the devices through initial set-up, establishing pre-defined instructions, or by accessing data.</p>
Line 89: Line 89:  
   <h2>Canadian Government Use</h2>
 
   <h2>Canadian Government Use</h2>
   −
   <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services, the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p>
+
   <p class="highlighted inline mw-collapsible-content">Internet of Things has the potential to transform the public sector by profoundly altering how government entities gather data and information by bringing together the major technical and business trends of mobility, automation, and data analytics.</p><p class="inline"> Although the Government of Canada (GC) has a large focus on introducing mobile applications to improve citizen interactions in obtaining GC data and services,<ref>Treasury Board of Canada. (2013, April 1).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=27088 Standard on Optimizing Websites and Applications for Mobile Devices].</i> Retrieved from tbs-sct.gc.ca</ref> the broad adoption and use of IoT in the GC is still in its infancy. The Treasury Board of Canada Secretariat (TBS) is developing<ref>Treasury Board of Canada. (2018, June). <i>[https://www.canada.ca/en/treasury-board-secretariat/services/information-technology/digital-policy-ideas-stage-what-we-heard-report.html Digital Policy: Ideas Stage - Report on What We Heard].</i> Retrieved from canada.ca</ref> an IoT guidance, overarching strategy, and policy direction. However, many departments, such as the Canada Border Services Agency (CBSA), have adopted IoT pilot programs without guidance in order to help solve their complex issues.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel. The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p>
+
   <p class="highlighted inline mw-collapsible-content">Although the CBSA is not the only GC department leveraging IoT, it provides a clear use case.</p><p class="inline"> The CBSA delivers integrated border services that support national security and public safety priorities and facilitate the free flow of legitimate trade and travel.<ref>Mungham, T. (2019, April 19).<i>[https://iot613.ca/speaker/tony-mungham/ Integrating IoT to Bring Ideas To Life – Use Cases at CBSA].</i> Retrieved from iot613.ca</ref> The IoT touches on many aspects of CBSA’s operational technology that range from standard desktop computers with document readers attached to audio/video surveillance systems, RFID systems, non-intrusive imaging systems (e.g. X-Rays), non-intrusive detection systems (e.g. radiation/drug detectors), face recognition systems, and mobile/wearable devices.</p><p class="highlighted inline mw-collapsible-content"> The CBSA uses IoT devices to sense, collect, analyse, and control situations, while also capturing vital information, providing deterministic automated responses, real-time alerts for officers, and data for trend analysis.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p>
 
   <p class="highlighted mw-collapsible-content">Economic and political pressures have increased the expectation for all GC departments to respond to operational challenges, without significantly increasing the existing workforce or operational footprint. Using the IoT, the focus of GC operations shifts toward higher efficiencies and facilitating services.</p>
Line 102: Line 102:  
   <p>Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.</p>
 
   <p>Deploying IoT devices and platforms offers a number of benefits to organizations such as: assisting in monitoring overall business processes; improving customer experience; saving time and money; enhancing cost-effectiveness; enhancing employee productivity; integrating and adapting business models; improving business decisions; and generating more revenue. The IoT can also assist in real-time and near-to-real-time visibility of the IT ecosystem and help in the pursuit of transforming traditional business to a data-driven business. The business impact of new data from IoT can help inform situational awareness, drive process improvements, and lead to overall better business decision making.</p>
   −
   <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p>
+
   <p class="inline">In most cases, organizations leverage the IoT to assist in boosting their existing processes as well as improving optimization, and business models.</p><p class="highlighted inline mw-collapsible-content"> Organizations first use IoT to increase efficiency, reduce cost, or improve utilization rates. While this is beneficial, it largely keeps a business-as-usual culture.</p><p class="inline"> By contrast, leading organizations use IoT to fundamentally alter and enhance their business models based on the new data, analytics, and automation possibilities accrued from IoT. Here, the balance can shift from improving existing processes to transforming the business with entirely new models since almost all parts of the business processes become interconnected through the IoT.</p><p class="highlighted inline mw-collapsible-content"> In today’s integrated world, it is not enough to rely on business data from isolated business systems.</p>
   −
   <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way. Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.</p>
+
   <p class="highlighted mw-collapsible-content">The IoT can assist in one of the GC’s most complex areas – asset monitoring and control. Managing assets across the country where distances are vast and device numbers are huge, lessening the burden of asset tracking, monitoring, and managing would be a great benefit. The GC has a tremendous amount of materiel and assets which must be managed in a financially responsible way.<ref>Department of Finance Canada. (2018, October 19).<i>[https://www.fin.gc.ca/afr-rfa/2018/report-rapport-eng.asp Annual Financial Report of the Government of Canada].</i> Retrieved from fin.gc.ca</ref> Assets and materiel must be managed by departments in a manner that supports the cost-effective and efficient delivery of government programs.<ref>Treasury Board of Canada. (2006, June 26).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12062 Policy on Management of Materiel].</i> Retrieved from tbs-sct.gc.ca</ref></p>
    
   <h4>Challenges</h4>
 
   <h4>Challenges</h4>
Line 110: Line 110:  
   <p class="inline">There are many challenges SSC will face in the development and deployment of IoT devices and platforms. Most notable is the large amount of time, guidance, effort, resources, and funding required for establishing and maintaining a robust GC IoT program</p><p class="highlighted inline mw-collapsible-content"> that also has a high level of interoperability</p><p class="inline">. Additional planning will be needed for SSC’s infrastructure to accommodate increased IoT data traffic and data processing.</p>
 
   <p class="inline">There are many challenges SSC will face in the development and deployment of IoT devices and platforms. Most notable is the large amount of time, guidance, effort, resources, and funding required for establishing and maintaining a robust GC IoT program</p><p class="highlighted inline mw-collapsible-content"> that also has a high level of interoperability</p><p class="inline">. Additional planning will be needed for SSC’s infrastructure to accommodate increased IoT data traffic and data processing.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems. This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p>
+
   <p class="inline">Security is one of the biggest challenge facing IoT initiatives. The IoT connects billions of devices to the internet; these devices also represent billions of network end points, all of which need to be secured. Due to its expanded “attack surface”, IoT security and IoT privacy are cited as major concerns.</p><p class="highlighted inline mw-collapsible-content"> Hackers will target networks via IoT devices through their default usernames/passwords, which are usually admin/admin.</p><p class="inline"> Additionally, there is no single IoT industry standard for communication between IoT devices, although a number of competing groups have formed with the aim of designing the IoT standards of the future.</p><p class="highlighted inline mw-collapsible-content"> The IoT standard-less situation resembles the early days of mobile operating-systems.<ref>Mariani, J. (2017, February 14).<i>[https://www2.deloitte.com/insights/us/en/focus/internet-of-things/regulating-iot-technology-role-of-government.html Guiding the IoT to safety].</i> Retrieved from deloitte.com</ref> This lack of standards increases the complexity of managing network security. This poses significant risks to critical infrastructure, including electricity, transportation, and financial services as IoT devices are potential access points into these critical systems. Certification has emerged as a means to confirm IoT devices are secure, but there still remains no central standard.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
   <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities. In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties. Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered.  As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p>
+
   <p class="inline">In many cases, IoT devices lack the technical ability to apply security patches when vulnerabilities are discovered and as a result, exposed IoT devices can be used to carry out malicious activities.<ref>Communications Security Establishment. (2017, June).<i>[https://www.cse-cst.gc.ca/en/node/2097/html/27699#a4 Internet of Things - The Future is Now].</i> Retrieved from cse-cst.gc.ca</ref> In general, most IoT devices use proprietary software with weak encryption schemes and limited endpoint security to protect information. Many things connected to the internet also tend to send information about their use back to the manufacturer, which can be hacked by outside parties.<ref>Get Cyber Safe. (2017, September 1).<i>[https://www.getcybersafe.gc.ca/cnt/blg/pst-20170901-en.aspx How to #ConnectSmarter on the Internet of Things (IoT)].</i> Retrieved from getcybersafe.gc.ca</ref> Likewise, if manufacturers don't update their devices regularly, or at all, they leave their products vulnerable to cybercriminals.</p><p class="highlighted inline mw-collapsible-content"> In many cases, IoT devices lack the actual technical ability to apply security patches that are pushed by the manufacturer when vulnerabilities are discovered.  As with any emerging technology, mitigations and streamlined patch solutions are not always available.</p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline-spacer"></p>
 
   <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p>
 
   <p class="inline">Privacy is another major concern for IoT users, including GC employees who may be required to input personal information on IoT devices in order to use them for work purposes. Connected devices often ask users to input their personal information, including names, ages, addresses, phone numbers, and even social media accounts – valuable privacy information for hackers. Public Service organizations may also expose employees to privacy risks by asking them to use these IoT devices, thereby increasing their digital footprint beyond what the employee would normally have done.</p><p class="highlighted inline mw-collapsible-content"> Lastly, even the companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data either legally through terms of use or illegally.</p>
Line 122: Line 122:  
   <h4>Considerations</h4>
 
   <h4>Considerations</h4>
   −
   <p>A strategic policy approach to IoT investments will need to be developed to ensure that the IoT opportunities are properly leveraged. The GC invests a significant portion of its annual budget on IT and supporting infrastructure. Without strategic IoT direction, the fragmented approaches to IT investments, coupled with rapid developing technology and disjointed business practices, can undermine effective and efficient delivery of GC programs and services.</p>
+
   <p>A strategic policy approach to IoT investments will need to be developed to ensure that the IoT opportunities are properly leveraged. The GC invests a significant portion of its annual budget on IT and supporting infrastructure. Without strategic IoT direction, the fragmented approaches to IT investments, coupled with rapid developing technology and disjointed business practices, can undermine effective and efficient delivery of GC programs and services.<ref>Government of Canada. (2018, December 3).<i>[https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=15249 Directive on Management of Information Technology].</i> Retrieved from tbs-sct.gc.ca</ref></p>
    
   <p class="highlighted mw-collapsible-content">A clear vision and mandate for how IoT will transform services and what the end-state IoT initiative is supposed to look like is a prominent consideration. In fact, most IoT considerations will need to be made on the non-technical side. Questions such as why a particular IoT solution is needed, what business requirements it will solve, how clients will use the IoT service from SSC, what the IoT service should look like from a client’s perspective etc., should all be taken into account first. Often the organizational cost of deploying and integrating IoT is higher than expected with regard to funding, time, and resource expertise.</p>
 
   <p class="highlighted mw-collapsible-content">A clear vision and mandate for how IoT will transform services and what the end-state IoT initiative is supposed to look like is a prominent consideration. In fact, most IoT considerations will need to be made on the non-technical side. Questions such as why a particular IoT solution is needed, what business requirements it will solve, how clients will use the IoT service from SSC, what the IoT service should look like from a client’s perspective etc., should all be taken into account first. Often the organizational cost of deploying and integrating IoT is higher than expected with regard to funding, time, and resource expertise.</p>
Line 132: Line 132:  
   <p class="highlighted mw-collapsible-content">Enterprises like SSC should be cognisant of not flooding their ability to conduct business with massive amounts of data without properly planning for its analysis, simply due to a fear-of-missing-out. An IoT device on its own does not understand what is happening around it, meaning that IoT devices and near-to-real-time analytics constitute a package that go hand in hand. Organizations will often deploy IoT for a specific purpose in silos but fail to handle the new influx of data or fail to connect these devices with other systems for aggregate analysis.</p>
 
   <p class="highlighted mw-collapsible-content">Enterprises like SSC should be cognisant of not flooding their ability to conduct business with massive amounts of data without properly planning for its analysis, simply due to a fear-of-missing-out. An IoT device on its own does not understand what is happening around it, meaning that IoT devices and near-to-real-time analytics constitute a package that go hand in hand. Organizations will often deploy IoT for a specific purpose in silos but fail to handle the new influx of data or fail to connect these devices with other systems for aggregate analysis.</p>
   −
   <p>To add value, organizations should consider the Analytics of Things (AoT) before creating sensors that stream enormous amounts of data to databases from the devices. This also means that decisions will need to be made on how much local processing the IoT device does, including what data to keep, what data to abbreviate or discard, what data to segment off and send immediately as an alert, and what data to simply log on local storage that can be later retrieved manually by personnel and transferred to databases for review. There are specific data transmission needs due to privacy retrictions or national security, where the data classification may not allow the information to be transferred over the network and instead require a physical pick-up for data transfer.</p>
+
   <p>To add value, organizations should consider the Analytics of Things (AoT)<ref>Pal, K. (2016, August 11).<i>[https://www.techopedia.com/2/31958/trends/big-data/analytics-of-things-taking-iot-to-the-next-level Analytics Of Things: Taking IoT to the Next Level].</i> Retrieved from techopedia.com</ref> before creating sensors that stream enormous amounts of data to databases from the devices. This also means that decisions will need to be made on how much local processing the IoT device does, including what data to keep, what data to abbreviate or discard, what data to segment off and send immediately as an alert, and what data to simply log on local storage that can be later retrieved manually by personnel and transferred to databases for review. There are specific data transmission needs due to privacy retrictions or national security, where the data classification may not allow the information to be transferred over the network and instead require a physical pick-up for data transfer.</p>
    
   <p class="highlighted mw-collapsible-content">Additionally, there is a significant consideration to be made on whether real-time visibility and analytics is a business requirement or if near-to-real-time is adequate. In the vast number of business cases, real-time visibility is almost never needed for business operations. Near-to-real-time is sufficient for the vast majority of business processes, however, senior executives will need to consider the policy when deciding what processes will actually require real-time analytics.</p>
 
   <p class="highlighted mw-collapsible-content">Additionally, there is a significant consideration to be made on whether real-time visibility and analytics is a business requirement or if near-to-real-time is adequate. In the vast number of business cases, real-time visibility is almost never needed for business operations. Near-to-real-time is sufficient for the vast majority of business processes, however, senior executives will need to consider the policy when deciding what processes will actually require real-time analytics.</p>
Line 138: Line 138:  
   <p>Although security has been flagged as an issue, most of the IoT security issues can be resolved by banning the use of default device passwords of any device that comes onto the network. Banning default password and setting the IT requirements for any device that connects to the network will be a paramount project for SSC to consider in the future. In this way, the diverse nature of IoT services can be better managed based on the requirements set out by SSC. Shared Services will need to remain open to many different IoT solutions, however, it may want to consider how particular it will be concerning the low-level requirements of devices and software implemented on the network.</p>
 
   <p>Although security has been flagged as an issue, most of the IoT security issues can be resolved by banning the use of default device passwords of any device that comes onto the network. Banning default password and setting the IT requirements for any device that connects to the network will be a paramount project for SSC to consider in the future. In this way, the diverse nature of IoT services can be better managed based on the requirements set out by SSC. Shared Services will need to remain open to many different IoT solutions, however, it may want to consider how particular it will be concerning the low-level requirements of devices and software implemented on the network.</p>
   −
   <p class="highlighted inline mw-collapsible-content">Shared Services will need to consider how to ensure it is an agile and flexible IT service provider as it pursues IoT deployments. This will be vital since the value, impact, and success of IoT initiatives can vary greatly from one organization to the next. Many enterprises have launched pilot projects to develop IoT-enabled products and services or have used the IoT to achieve operational improvements. Of these, less than 30 percent have taken their IoT programs beyond the pilot phase. Even among companies with large-scale IoT efforts, a significant gap separates the top tier of performers from the bottom tier.</p><p class="inline"> The continued support and use of Open Standards, Open Source, and standard APIs may need to be considered as a means to maintain SSC as an agile and flexible organization. No single IoT platform will be able to meet all the diverse technical and business requirements of IoT devices and business processes. Using Open Source and Open Standards may be needed in order to accommodate diverse devices and software.</p>
+
   <p class="highlighted inline mw-collapsible-content">Shared Services will need to consider how to ensure it is an agile and flexible IT service provider as it pursues IoT deployments. This will be vital since the value, impact, and success of IoT initiatives can vary greatly from one organization to the next. Many enterprises have launched pilot projects to develop IoT-enabled products and services or have used the IoT to achieve operational improvements. Of these, less than 30 percent have taken their IoT programs beyond the pilot phase.<ref>Chui, M., May, B., Narayanan, S., & Shah, R. (2019, January).<i>[https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/what-separates-leaders-from-laggards-in-the-internet-of-things What separates leaders from laggards in the Internet of Things].</i> Retrieved from mckinsey.com</ref> Even among companies with large-scale IoT efforts, a significant gap separates the top tier of performers from the bottom tier.</p><p class="inline"> The continued support and use of Open Standards, Open Source, and standard APIs may need to be considered as a means to maintain SSC as an agile and flexible organization. No single IoT platform will be able to meet all the diverse technical and business requirements of IoT devices and business processes. Using Open Source and Open Standards may be needed in order to accommodate diverse devices and software.</p>
    
   <p>Lastly, SSC may wish to consider evaluating the current Service Catalogue in order to determine where IoT can be leveraged to improve efficiencies, reduce costs, and reduce administrative burdens of existing services as well as how a new IoT service could be delivered on a consistent basis. Any new procurements of devices or platforms should have high market value and can be on-boarded easily onto the GC network.</p>
 
   <p>Lastly, SSC may wish to consider evaluating the current Service Catalogue in order to determine where IoT can be leveraged to improve efficiencies, reduce costs, and reduce administrative burdens of existing services as well as how a new IoT service could be delivered on a consistent basis. Any new procurements of devices or platforms should have high market value and can be on-boarded easily onto the GC network.</p>
 +
 +
  <h2>References</h2>
 
</div>
 
</div>
  −
<!--
  −
<h2>References</h2>
  −
<ol>
  −
  <li>Diedrich, H. (2016). <i>Ethereum: Blockchains, Digital Assets, Smart Contracts, Decentralized Autonomous Organizations.</i> Scotts Valley: CreateSpace Independent Publishing Platform.</li>
  −
  <li>Furlonger, D., & Kandaswamy, R. (25 July 2018). <i>[https://www.gartner.com/document/3883991 Hype Cycle for Blockchain Technologies].</i> Retrieved on 23 May 2019</li>
  −
  <li>Gilder, G. (2018). Life After Google: <i>The Fall of Big Data and the Rise of the Blockchain Economy.</i> New Jersey: Gateway Editions.</li>
  −
  <li>Gupta, V. (28 February 2017). <i>[https://hbr.org/2017/02/a-brief-history-of-blockchain A Brief History of Blockchain].</i> Retrieved on 23 May 2019</li>
  −
  <li>Orcutt, M. (19 February 2019). <i>[https://www.technologyreview.com/s/612974/once-hailed-as-unhackable-blockchains-are-now-getting-hacked/ Once hailed as unhackable, blockchains are now getting hacked].</i> Retrieved on 23 May 2019</li>
  −
  <li>Secretariat, T. B. (29 March 2019). <i>[https://www.canada.ca/en/government/system/digital-government/digital-operations-strategic-plan-2018-2022.html Digital Operations Strategic Plan: 2018-2022].</i> Retrieved on 23 May 2019</li>
  −
  <li>Vallée, J.-C. L. (April 2018). <i>[https://www.conferenceboard.ca/temp/7dc77c07-7e5a-4be6-ad6d-7d1070f9ac20/9591_Cautious%20Optimism_BR.pdf Adopting Blockchain to Improve Canadian Government Digital Services].</i> Retrieved on 23 May 2019</li>
  −
</ol>
  −
-->
      
{{#css:
 
{{#css: