This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Civilization

Security and Privacy Factors that affect the Implementation of the Internet of Things

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Security and Privacy Factors that affect the Implementation of the Internet of Things

Introduction

The Internet of Things (IoT) is a developing paradigm, which incorporates electronic devices with detecting and computing aptitude into the Internet to attain intellectual processing and enhanced control. In a connected globe via IoT, where intersected devices are spreading to all facets of people’s lives, for instance, homes, offices, and value infrastructures, individuals have been empowered to undertake their activities in ways that have never been witnessed before. Nonetheless, as IoT transforms potentials in environment, civilization, and economy, resulting in remarkable benefits, the development also leads to significant security and privacy concerns such as personal information discretion and protected communication and computation. Hypothetically, when everything is connected, everything is at risk. Therefore, this research will address privacy and security concerns associated with IoT devices that affect their implementation.

Literature Review

Information systems have been exposed to numerous threats over time. According to research conducted by Ponemon, the average costs of a data breach to an organization rose from $3.52 million in 2014 to $3.79 million in 2015 (1). These breaches have had adverse impacts on corporations. Furthermore, a significant number of IoT users’ privacy has been compromised through hacking in recent years. All governments across the globe need to have consistent data on crime to develop proper policies and allot adequate revenues to ensure that the processes are cost-effective. Nonetheless, in a study by Armin et al., cybercrime has become a top tier of the National Security Strategy for most of the European Union states such as France and the Netherlands, among others (701). The authors content that cybercrime in the IoT has turned out to the leading threat above organized crime and fraud generally (Armin et al. 701). The frequency of IT threat incidents is on the rise at an astonishing rate. In a study conducted by Bada and Jason, the rate of computer-related attacks have risen dramatically (1). Razzaq et al. also contend that although IoT has enhanced the lives of individuals, most of the devices and applications are susceptible to security and privacy attacks (383). This vulnerability has increased security and privacy issues in IoT networks, such as secrecy and data veracity.

Lin and Neil also affirm IoT has enhanced crime that aims at gaining value from the illicit use of technology (3). The authors determine that the interconnected nature of the Internet implies that Internet resources can be breached from any location across the globe (Lin and Neil 3). A study by Maras also determines that the opportuneness IoT devices come with a security cost (101). The author’s research also provides that most of the IoT devices were built with no support security (Maras 101).

Methodology

The research will utilize a qualitative research method. The strategy entails an inductive approach that helps in understanding and construing reasons, sentiments, and essential drives regarding the topic and establishing fresh concepts to address the issues, in this case, privacy and security of IoT. Qualitative data will be developed from interviews, focus or affected groups, observations, and case studies. The data will be assessed as narrative text instead of numerical values.

Conclusion

IoT is a significant technological revolution that is already changing many aspects of people’s lives. Nonetheless, IoT is affected by security and privacy issues. The research aims at determining how security and privacy affect the implementation of IoT. Since most consumers are concerned about their private data being stored and shared on IoT devices, the study will be significant in suggesting ways in which IoT devices users can address their security and privacy concerns.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask