Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Big data and smart cities: How to battle the pandemic while preserving privacy

By Ivan Kot
smart-city-freepik1170x658b6.jpg

Image by fanjianhua via Freepik

July 12, 2022

Over 30 years ago, authorities in urban centers such as Amsterdam, Copenhagen and Geneva pioneered the first smart city projects. Their main goal was to facilitate operations and improve the well-being of citizens using Information and Communication Technologies (ICT). These early initiatives mainly involved increasing internet availability and digitalization of administrative tasks and services.


Today, smart city projects span dozens of cities across six continents, predominantly in Europe, North America, and East Asia. Sensors, connected infrastructure, and mobile devices aid in the sustainable development and operation of urban environments, enhancing waste management, supply distribution, traffic flow and more.


Smart city solutions continue to evolve, using technologies like big data and IoT to face old and new challenges — most recently, the coronavirus and data privacy issues. Let’s explore how big data developers are helping cities tackle these difficulties and shape the future of intelligent urban centers worldwide.


Smart cities versus the pandemic

If there’s a positive side to the coronavirus crisis, it’s the fact that it has sped up the adoption of smart city projects. 


To keep the virus in check, municipalities leveraged technology to streamline healthcare access, ensure quarantine measures, and limit contact between citizens. A report by Oracle revealed that 65% of city leaders named realizing the importance of smart city implementation the most important lesson learned during the pandemic. Let’s look at three examples of how some countries and cities adopted smart city projects to flatten the curb.


South Korea, a highly urbanized country that garnered universal praise for efficient control of the virus in the first months of the pandemic, owes its success in part to intelligent city technologies. The primary objective of South Korean policymakers was to use day-to-day data to track the mobility of infected citizens and enforce containment regulations when necessary. 


To that end, the police granted epidemiological investigators access to vast amounts of citizen data. These included mobile phone location, public transport history and cashless transactions records, as well as CCTV recordings and heatmap tracking. Aggregating this information was enabled largely by smart city infrastructures such as transport card readers and monitoring systems. These across-the-board measures allowed the country to go largely unscathed by the socioeconomic impact of lockdown.


Chicago provides another remarkable example. The Windy City partnered with a healthcare tech company to collect anonymous location data from citizens’ mobile phones. The technology compared device location during night and day in 30-minute intervals to determine how much time the user spends self-isolating at home instead of going out. The solution also leverages artificial intelligence (AI) and big data to analyze movement patterns in and outside the city to build spread models. According to city officials, that information helped Chicago significantly flatten the curve, preventing close to 2,000 deaths.


In Europe, Italy was among the countries hit hardest by the virus. As a result, the country’s municipalities launched smart city initiatives to ensure a timely and safe recovery from the lockdown. For example, the city of Florence uses the Smart City Control Room (SCCR) system to gather big data from diverse periods and sources such as traffic and pollution sensors, public Wi-Fi spots, and venues like museums, parks, or shopping malls. Then, the system turns this information into valuable insights into citizen mobility or potentially overcrowded spaces. The project is now planned to expand to other cities in the region.


Smart cities and data privacy

Increasing reliance on technology and data can improve the quality of life in urban spaces and help them face the challenges of the global pandemic. However, the dependence can expose cities and their inhabitants to data privacy challenges.


Mistrust can severely hamper the development of smart city projects, which rely on a high level of cooperation between all involved parties: officials, service providers, tech companies, and, most importantly, citizens themselves. For any data-driven smart city project to be successful, it must communicate its value and data safety to its primary stakeholders — the citizens. 


Big data-based urban initiatives must also provide transparency in terms of data sources and how they are used. In general, data can fall into two categories:


●    Personally identifiable — all information that can be associated with personal details, e.g., name, address, location, specific email addresses, IP numbers, and health records.

●    Non-personally identifiable — information that cannot be used to identify an individual, e.g., non-specific email address or anonymized data.


The classification is vague, and its interpretation varies wildly depending on the country. The General Data Protection Regulation (GDPR) places strict restrictions on the use of personal data of all EU citizens and residents. Meanwhile, less stringent laws in other countries allow authorities to easily implement special measures if need be, as it was the case with South Korea. 


In extraordinary circumstances, such as the pandemic, cities and countries normally bound by strict data protection regulations usually have legal ways to relax them temporarily if it serves a greater purpose. This may seem disturbing for some, but in fact, when big data programs are implemented properly, sharing data can be voluntary, and personal information may remain undisclosed publicly or anonymized.


Data privacy is one of the main concerns of many new and upcoming intelligent city projects. Launched in January 2021, the EU’s Citizen Control of Personal Data initiative focuses on encouraging citizens to share their details for the general good and giving them greater agency over the distribution and use of data. The goal of the platform is to reach 300 million citizens by 2025.


In London, the UK, the plans for future development will be informed by the new Emerging Technology Charter. The charter will serve as a guide for Londoners to learn how new smart city tech will affect their lives and use their personal information. The program’s ultimate goal is to stimulate innovation and get citizens involved in the process. More initiatives like this one can be found worldwide.


The future of big data in cities

Although we tend to think of smart cities as futuristic innovations, the transition has been already ongoing for many years. Building sustainability and resilience through data without compromising citizens’ details is a demanding challenge that municipalities need to focus on now, not in the future.

KEYWORDS: big data compliance data privacy privacy smart cities

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ivan Kot is a Senior Manager at Itransition, focusing on business development in verticals such as eCommerce, Business Automation, and cutting-edge tools.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Don't Disarm Individuals in the Battle for Data Protection, Privacy and Security

    See More
  • Top 3 Misconceptions About Data After Death - Security Magazine

    How to Personalize Customer Experiences at Scale while Guaranteeing Privacy

    See More
  • Two people studying documents

    The future of data privacy and compliance (and how to stop it)

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!