3,992 research outputs found

    After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy

    Get PDF
    This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Things—and any of its unforeseen progeny—develop with an eye toward safeguarding individual privacy while allowing technological development

    Cybersecurity Hygiene in the Era of Internet of Things (IoT): Best Practices and Challenges

    Get PDF
    The rapid growth of the Internet of Things (IoT) has resulted in an increasing number of interconnected devices, creating new opportunities for data collection and automation. However, this expansion also brings with it unique cybersecurity challenges. This research paper aims to investigate the best practices for maintaining cybersecurity hygiene in the IoT environment and explore the challenges that need to be addressed to ensure robust security for these connected devices. This study will delve into the vulnerabilities associated with IoT devices, their impact on overall system security, and the potential solutions that can be implemented to enhance cybersecurity hygiene in the IoT environment

    Privacy matters:issues within mechatronics

    Get PDF
    As mechatronic devices and components become increasingly integrated with and within wider systems concepts such as Cyber-Physical Systems and the Internet of Things, designer engineers are faced with new sets of challenges in areas such as privacy. The paper looks at the current, and potential future, of privacy legislation, regulations and standards and considers how these are likely to impact on the way in which mechatronics is perceived and viewed. The emphasis is not therefore on technical issues, though these are brought into consideration where relevant, but on the soft, or human centred, issues associated with achieving user privacy

    The Internet of Things: Multi-faceted Research Perspectives

    Get PDF
    Living beyond the hype, the Internet of things (IoT) continues to grow and has clearly emerged as a leading-edge topic in information systems. As the IoT moves beyond novel technologies and exploratory sandbox initiatives to ubiquitous technologies and full production, understanding the phenomenon surrounding IoT challenges and issues has become even more important. In this paper, we explore the critical issues and challenges currently facing IoT adoption and implementation in order to identify areas that require further study. Specifically, we discuss IoT from several key perspectives including IoT connectivity, platforms and 5G, IoT analytics, IoT privacy, security, and litigation risks, IoT business value and monetization, and human interaction with IoT and design considerations Finally, through identifying the current state of IoT and IoT research, we identify potential areas of contribution and future directions for IoT research

    A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets

    Get PDF
    open access articleThe Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices. This idea fascinated people and originated a boom of IoT devices together with an increasing demand that was difficult to support. Many manufacturers quickly created hundreds of devices implementing functionalities but neglected some critical issues pertaining to device security. This oversight gave rise to the current situation where thousands of devices remain unpatched having many security issues that manufacturers cannot address after the devices have been produced and deployed. This article presents our novel research protecting IOT devices using Berkeley Packet Filters (BPFs) and evaluates our findings with the aid of our Filter.tlk tool, which is able to facilitate the development of BPF expressions that can be executed by GNU/Linux systems with a low impact on network packet throughput
    • …
    corecore