Citizens connect!

This week I would like to take a look at a couple of technological and social systems that use Apps and are designed to improve urban living in cities. If you have ever asked yourself how technology can improve our lives then the following might be of interest to you.

The first thing I would like to look at is called Citizens Connect, a system that operates in Boston in the USA (where I currently live). According to the website “Citizens Connect enables real-time collaboration with citizens, “deputizing” mobile users to become the city’s eyes and ears. Citizens report potholes, graffiti, and other issues from anywhere in the city using their mobile phone”

And this is how it works, and it is a simple system if you have a reasonably good mobile phone. While walking or driving through the city you see something that you feel should be reported to the City Council, an abandoned car, vomit on the pavement, water gushing from a hole in the road, cat stuck up a tree, that kind of thing. You take a photo of it, upload it on the City of Boston website, they show it on a public map and (hopefully) send somebody out to fix the problem.

A map showing reported problems on Citizens Connect

I personally believe that a person is much more likely to report something if they can take a photo and send it off in real time than if they have to go home, look up a phone number and make a call. Could this be a fist step in making the citizen and the state more communicative and more responsible?

The City of Boston also offers another App called Street Bump. This is even simpler to use, you download it into your phone and it monitors your movement as you drive round the city. When you near a hole in the road you slow down, as does everyone else passing that spot, and this information is used to determine the quality of the road surface.

If you think your local council should try such a scheme, you can direct them towards Click Fix, a commercial system that is currently on sale and operated by several cities and other organizations. This is not a recommendation however, but their work does look very interesting.

Next week I will continue this theme with a look at an interesting university course all about “Urban Cybernetics” that is run at Harvard University. Some of the projects may offer great things for the future.

How to safely operate a bring your own device policy

Technology is growing by leaps and bounds and companies of every size are constantly looking for ways to leverage all of the benefits that these technological advances can bring them. It may not be cost effective for companies of any size to jump on every single new technological wonder, even when the price of technology is at an all-time low.

There is a way for companies to benefit from the latest and greatest technological gadgets without having to make any type of monetary investment. Portable devices are making their ways into the hands of people all over the world. Just about everyone has a smartphone, and tablet computers are quickly becoming the norm.

Many companies are choosing to adopt a ‘Bring Your Own Device’ policy in order to take advantage of these technological advances without incurring any type of costs, but there are security risks involved with a Bring Your Own Device Policy. Here are five things that companies can do to ensure their data does not end up in the wrong hands.

Know who is accessing data, and what devices they are using to do it

The very first step towards a successful ‘Bring Your Own Device’ policy is understanding what types of devices are being used to access data. It is also important to understand which employees are accessing which data.

A security audit is a great way for businesses to get a better understanding of exactly what types of devices are being used by employees to access sensitive corporate data. This will help a company determine exactly how to move on to the next step in securing their data in the mobile world.

Decide what data devices can access

The very first conclusion that many companies are jumping to is restricting access to corporate networks via personal devices. This is not the right choice. A security audit should have identified what types of devices are accessing the network.

The next step to properly protect data is to classify it and the networks that are being used to send and retrieve the data. By classifying data, businesses will be able to get a much better look at the areas that need protection, and the areas that do not. Once the data has been classified it will be much easier to see the bigger picture. Companies will be able to set forth a policy that allows certain groups of people access to certain areas of data.

Identify problem apps

Not every app will play nice. Some apps have been known to have huge security vulnerabilities. These apps, without notice to the user can copy and send address lists and personal photos through the corporate network.

The two most popular mobile device operating systems are both guilty of these two examples. iOS which powers Apple devices, and the Android operating system have both been known to have these same security problems. Once the problem apps are identified, they can be prevented from being installed through company networks. Another solution is to restrict app downloads to a company approved app market place.

Create company policies to help reduce mobile security problems

Once these other issues have been addressed, companies will need to create strict policies that will teach employees what can and cannot be done with their own devices on a company network. If an employee uses their own mobile device to conduct work in the work place, a strict policy should dictate what he or she can or can’t do with the device. These policies must also have strict repercussions for any employee that chooses to violate them.

Enforcing policy with software

A security key on a keyboardThere are several solutions on the market that can and will help corporations manage all of this information. These resolutions are called Mobile Device Management Solutions. These types of solutions will allow corporations to enforce the policies that have been set during all of the previous steps.

A mobile device management solution will protect data, manage apps, address mobile device security, protect content, and protect emails. A mobile device management system will also be compatible with every major mobile device operating system on the market.

Allowing employees to use their own portable devices should not present a security breach to any company regardless of its size. Proper planning will always be the best way to prevent any sort of problems.

Texting While Driving

Communication, communication, communication, but at what cost? In many countries it is illegal to use the phone while driving the car, but many people still do so. Maybe using the phone doesn’t seem such a risky thing to do, but texting?

Figures suggest that many accidents are caused by texting drivers, and many companies are offering possible solutions to the problem. Some Apps block phones that are moving through their GPS systems, but this also blocks passenger phones and cannot tell when the owner is on a bus or train, so have override options. Maybe this override option would be attempted while driving however, and that might be dangerous.

A somewhat typical sight?

Other systems make it so difficult to access the texting facility that it would be impossible to use while driving. Well this is all well and good but a teenager that NEEDS to send a text will find a way, and persistence might not be a good thing at this point. The more difficult it is to enter then the more concentration required, and probably more accidents and deaths caused.

Many of the systems available today also require downloading, so they only work in the phone that carries the App. These systems only work if somebody has downloaded it into a phone (typically their teenage son or daughter’s) and the user cannot work out how to disable it, or doesn’t have another phone or friends for just such emergencies.

More sophisticated systems plug directly into the car and broadcast directly to the driver’s seat, but here hardware is required and other problems of system compatibility are raised.

Although I make light of the situation we are addressing an extremely serious issue. If behaviour does not change than these systems may actually put more people at risk, and that is obviously not to anyone’s advantage.

Many other systems that read out text messages or allow you to dictate them are also available, but I am raising a finger at systems that aim to prohibit rather than adapt behaviour, sold to worried parents that think they might be able to stop their children doing something, and not at those that are aimed at responsible drivers.

So does anybody have experience either as a parent or teenage user that they would like to share with the community?

For a few references and more discussion see this article on NBC News.