Abstract
The Internet of Things (IoT) are being enthusiastically adopted by consumers. By the year 2020 the sum of 31 billon IoT devices will be deployed globally. Subsequent as the IoT device landscape is expanding at such speed, so does the threat landscape and vulnerabilities it introduces increases. Thus, making IoT devices easily prone to attacks or to be used to for launching attacks at large economical scale and society is seeing a growth in the scale and frequencies of these attacks. The large scale of attacks and frequency have caught global attention and causing governments to take the security and privacy threats of IoT very seriously and the UK government amongst others are now turning these concerns into actionable measures by considering ways of protecting consumers against the vulnerabilities and threats of IoT. It is part of these actionable measures that the NCSC (National Cyber Security Centre) recently published in a report about the new laws being proposed by the government to strengthen IoT devices. This chapter will look at the IoT security threats and privacy issues, it will explore whether the growing concern of the government to protect consumer has a foundation by investigating consumers awareness and attitude towards IoT security threats and privacy issues and propose a framework to facilitate the introduction of the new initiative of the government to bring in laws to govern IoT products thereby shifting the responsibility of the security threats to the manufacturers and away from the consumer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alsubaei F, Abuhussein A, Shiva S (2017) Security and privacy in the internet of medical things: taxonomy and risk assessment. In: 2017 IEEE 42nd conference on Local Computer Networks Workshops (LCN Workshops). IEEE, pp 112–120
Alsubaei F, Abuhussein A, Shiva S (2019) Ontology-based security recommendation for the internet of medical things. IEEE Access 7:48948–48960
Brenner J (2007) ISO 27001: risk management and compliance. Risk Manage 54(1):24
Data Governance Program. Available at: https://cio.ubc.ca/data-governance/data-governance-program. Accessed on: 24 July 2019
Farahat IS, Tolba AS, Elhoseny M, Eladrosy W (2018) A secure real-time internet of medical smart things (IOMST). Comput Electr Eng 72:455–467
Hevner AR, March ST, Park J, Ram S (2004, March) Design science in information systems research. MIS Q 28(1):75–105. https://doi.org/10.2307/25148625. Management Information Systems Research Center, University of Minnesota. https://www.jstor.org/stable/25148625
Jalali MS, Kaiser JP (2018) Cybersecurity in hospitals: a systematic, organizational perspective. J Med Internet Res 20(5):e10059
Osborne JW (ed) (2008) Best practices in quantitative methods. Sage, Los Angeles/London
Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng 2017:9324035
Wolf M, Serpanos D (2017) Safety and security in cyber-physical systems and internet-of-things systems. Proc IEEE 106(1):9–20
Wrestling the data quality bull: using informatic IDQ so upstream business. Available at: http://sullexis.com/blog/wrestling-the-data-quality-bull-using-informatica-idq-so-upstream-business-users-can-grab-data-quality-by-the-horns-and-wrestle-it-to-submission/. Accessed on: 24 July 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sagay, A., Jahankhani, H. (2020). Consumer Awareness on Security and Privacy Threat of Medical Devices. In: Jahankhani, H., Kendzierskyj, S., Chelvachandran, N., Ibarra, J. (eds) Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-35746-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-35746-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-35745-0
Online ISBN: 978-3-030-35746-7
eBook Packages: Computer ScienceComputer Science (R0)