Advertisement

Internet of Things: Analyzing the Impact on Businesses and Customers

  • Mandeep PannuEmail author
  • Iain Kay
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 953)

Abstract

The Internet of Things (IoT) refers to intelligently connected smart devices and systems using embedded technology software and sensors to communicate, collect and exchange data with one another. According to analyst firm Gartner, there will be 20 billion connected devices to be deployed by 2020. The IoT encompasses sensor, actuators, electronic processing, microcontrollers, embedded software, communications services and information services associated with the things. The focus of this research is to find out the impact of IoT on businesses and their customers and design a prototype system that will assist users to make informed decision and protect their IoT devices. IoT is a collection of fragmented and complicated data from different devices. Data are collected from and shared between devices to gather information for various uses, such as improving customer relationships and identifying customer segments. This research will use quantitative research methods to collect data from selected companies that utilize IoT. By analyzing the data collected, we can identify and define the requirements to design a prototype system. The prototype system will collect information from IoT devices, perform critical data analysis, and provide insightful information to help businesses make decision about IoT future.

Keywords

Internet of Things (IoT) Security+ 

References

  1. 1.
    McAfee Business whose job do you think it is to ensure they’re properly secured (2019). https://twitter.com/McAfee_Business/status/1096448932899483648
  2. 2.
  3. 3.
    Gerber, A.: Top 10 IoT Security Challenges (2017). https://developer.ibm.com/articles/iot-top-10-iot-security-challenges/. Accessed Mar 2019
  4. 4.
    Wurm, J., Hoang, K., Arias, O., Sadeghi, A. R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: Report Published in 21st Asia and South Pacific Design Automation Conference (2016)Google Scholar
  5. 5.
    Schiffer, A.: How a fish tank helped hack a Casino (2017). The Washington Post. https://www.washingtonpost.com/news/innovations/wp/2017/07/21/how-a-fish-tank-helped-hack-a-casino/?utm_term=.62a1ae94d829. Accessed Mar 2019
  6. 6.
    Miu, T., Yeung, R., Li, D.: DDoS Threat Report Q2 2018. Report published by NexusGuard (2018)Google Scholar
  7. 7.
    Rayome, A.D.: CES 2019: 58% of Consumers Don’t Secure Their Personal Devices (2019). https://www.techrepublic.com/article/ces-2019-58-of-consumers-dont-secure-their-personal-devices/

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and Information TechnologyKwantlen Polytechnic UniversitySurreyCanada

Personalised recommendations