Security and Privacy Factors that affect the Implementation of the Internet of Things
Introduction
The Internet of Things (IoT) is a developing paradigm, which incorporates electronic devices with detecting and computing aptitude into the Internet to attain intellectual processing and enhanced control. In a connected globe via IoT, where intersected devices are spreading to all facets of people’s lives, for instance, homes, offices, and value infrastructures, individuals have been empowered to undertake their activities in ways that have never been witnessed before. Nonetheless, as IoT transforms potentials in environment, civilization, and economy, resulting in remarkable benefits, the development also leads to significant security and privacy concerns such as personal information discretion and protected communication and computation. Hypothetically, when everything is connected, everything is at risk. Therefore, this research will address privacy and security concerns associated with IoT devices that affect their implementation.
Literature Review
Information systems have been exposed to numerous threats over time. According to research conducted by Ponemon, the average costs of a data breach to an organization rose from $3.52 million in 2014 to $3.79 million in 2015 (1). These breaches have had adverse impacts on corporations. Furthermore, a significant number of IoT users’ privacy has been compromised through hacking in recent years. All governments across the globe need to have consistent data on crime to develop proper policies and allot adequate revenues to ensure that the processes are cost-effective. Nonetheless, in a study by Armin et al., cybercrime has become a top tier of the National Security Strategy for most of the European Union states such as France and the Netherlands, among others (701). The authors content that cybercrime in the IoT has turned out to the leading threat above organized crime and fraud generally (Armin et al. 701). The frequency of IT threat incidents is on the rise at an astonishing rate. In a study conducted by Bada and Jason, the rate of computer-related attacks have risen dramatically (1). Razzaq et al. also contend that although IoT has enhanced the lives of individuals, most of the devices and applications are susceptible to security and privacy attacks (383). This vulnerability has increased security and privacy issues in IoT networks, such as secrecy and data veracity.
Lin and Neil also affirm IoT has enhanced crime that aims at gaining value from the illicit use of technology (3). The authors determine that the interconnected nature of the Internet implies that Internet resources can be breached from any location across the globe (Lin and Neil 3). A study by Maras also determines that the opportuneness IoT devices come with a security cost (101). The author’s research also provides that most of the IoT devices were built with no support security (Maras 101).
Methodology
The research will utilize a qualitative research method. The strategy entails an inductive approach that helps in understanding and construing reasons, sentiments, and essential drives regarding the topic and establishing fresh concepts to address the issues, in this case, privacy and security of IoT. Qualitative data will be developed from interviews, focus or affected groups, observations, and case studies. The data will be assessed as narrative text instead of numerical values.
Conclusion
IoT is a significant technological revolution that is already changing many aspects of people’s lives. Nonetheless, IoT is affected by security and privacy issues. The research aims at determining how security and privacy affect the implementation of IoT. Since most consumers are concerned about their private data being stored and shared on IoT devices, the study will be significant in suggesting ways in which IoT devices users can address their security and privacy concerns.