An integrated model of technical and non-technical perspectives on managing IoT security

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Security and data privacy are two inseparable issues regarding Internet of Things (IoT) implementation. Most research discusses the method of overcoming these issues by utilizing IoT reference architectures, namely application, network, and perception layers. Studies present information about what kind of attacks appear in each IoT layer followed by how to prevent and mitigate said attacks. Moreover, some researchers conduct inquiries in regard to security issues emerging in cross layers and the integration of multi-layer architecture. In this research, we try to use different perspectives to examine the problems and solutions concerning IoT security. We involve technical and non-technical elements for managing these problems and propose an integrated model in which actors—regulators, industry, and users—actively participate in addressing security and data privacy issues that arise on every IoT architecture.

Original languageEnglish
Title of host publicationICICM 2019 - Proceedings of 2019 the 9th International Conference on Information Communication and Management
PublisherAssociation for Computing Machinery
Pages142-146
Number of pages5
ISBN (Electronic)9781450371889
DOIs
Publication statusPublished - 23 Aug 2019
Event9th International Conference on Information Communication and Management, ICICM 2019 - Prague, Czech Republic
Duration: 23 Aug 201926 Aug 2019

Publication series

NameACM International Conference Proceeding Series

Conference

Conference9th International Conference on Information Communication and Management, ICICM 2019
Country/TerritoryCzech Republic
CityPrague
Period23/08/1926/08/19

Keywords

  • Data Privacy
  • Governmental regulations
  • IoT Regulation
  • IoT Security
  • Policy

Fingerprint

Dive into the research topics of 'An integrated model of technical and non-technical perspectives on managing IoT security'. Together they form a unique fingerprint.

Cite this