Abstract
Although the technical approach to securing the Internet of Things (IoT) witnesses considerable scholarly efforts, approaching the phenomenon from a social lens received scant attention. In this paper, I address this gap by perceiving the security of IoT as a social process. I view IoT security resulting from collective efforts among different actors. By examining such efforts in three cases; connected cars, wearable technologies, and smart home I shed light on the social process of IoT security and derive valuable insights that can enlighten future directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Statista: Internet of things (IoT): number of connected devices worldwide from 2012 to 2020 (in billions) (2017). https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/. Accessed 17 Jan 2017
Jacobsson, A., Boldt, M., Carlsson, B.: On the risk exposure of smart home automation systems. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 183–190. IEEE (2014)
Mukhopadhyay, S.C., Suryadevara, N.K.: Internet of things: challenges and opportunities. In: Mukhopadhyay, S.C. (ed.) Internet of Things. SSMI, vol. 9, pp. 1–17. Springer, Cham (2014). doi:10.1007/978-3-319-04223-7_1
Dhillon, G., Backhouse, J.: Current directions in IS security research: towards socio-organizational perspectives. Inf. Syst. J. 11(2), 127–153 (2001)
Dahabiyeh, L.: Networks of cybercrime prevention: a process study of the credit card. In: ECIS 2015 Research-in-Progress Papers, Paper 6 (2015)
Mookerjee, V., Mookerjee, R., Bensoussan, A., Yue, W.T.: When hackers talk: managing information security under variable attack rates and knowledge dissemination. Inf. Syst. Res. 22(3), pp. 606–623, Sep 2011
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)
Skarmeta, A., Hernández-Ramos, J.L., Bernabe, J.B.: A required security and privacy framework for smart objects. In: ITU Kaleidoscope: Trust in the Information Society (K-2015), pp. 1–7. IEEE (2015)
Zhang, Z.-K., Cho, M.C.Y., Shieh, S.: Emerging security threats and countermeasures in IoT. In: Proceedings of 10th ACM Symposium on Information, Computer and Communications Security, pp. 1–6. ACM (2015)
Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk. A report written by the staff of Senator E.J. Markey (D-Massachussetts), February 2015
Internet of Things. Hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary. House of Representatives. 29 July 2015. (ed.) (2015)
The Internet of Cars. Joint Hearing before the U.S. House of Representatives, Committee on Oversight and Government Reform. Subcommittee on Information Technology and Subcommittee on Transportation and Public Assets. 18 November 2015 (ed.) (2015)
Examining Ways to Improve Vehicle and Roadway Safety. Hearing Before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce. 21 October 2015 (ed.) (2015)
Understanding the Role of Connected Devices in Recent Cyber Attacks. Joint Hearing before the U.S. House of Representatives, Committee on Energy and Commerce. Subcommittee on Communications and Technology, and the Subcommittee on Commerce, Manufacturing, and Trade. 16 November 2016 (ed.) (2016)
FTC: Internet of Things - Privacy and Security in a Connected World Workshop (2013). https://www.ftc.gov/news-events/events-calendar/2013/11/internet-things-privacy-security-connected-world
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Dahabiyeh, L. (2017). The Security of Internet of Things: Current State and Future Directions. In: Themistocleous, M., Morabito, V. (eds) Information Systems. EMCIS 2017. Lecture Notes in Business Information Processing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-65930-5_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-65930-5_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-65929-9
Online ISBN: 978-3-319-65930-5
eBook Packages: Computer ScienceComputer Science (R0)