The paper highlights five objectives to be achieved for IoT to avoid being misused and end up harming the users. The right of deletion, the right to be forgotten, data portability, privacy, and data protection principles must not be compromised or neglected. The following examples below list just three common ways that these five objectives were not met in many internet applications.
Firstly, one such risk is that a user’s personal information might not be directly known, but it could be revealed through IoT’s data collection from different sources or even uncover new information, thus violating the user’s privacy. A person who does not wish to be recognized online can therefore be identified through such means.
Secondly, the paper details that many applications only consider the installation of “information security, privacy and data protection” only as an afterthought, rather than in the beginning, at the drawing board. This compromises the application’s security and the user’s privacy substantially, as the capabilities of these measures would be reduced.
Thirdly, with the advent of cloud computing and social