The Internet of Things: Review and theoretical framework
Tài liệu tham khảo
AIS Senior Scholars Basket of Eight (2011). Retrieved fromhttps://aisnet.org/?SeniorScholarBasket, (Accessed 12 December 2018).
Alshehri, 2018, Clustering-driven intelligent trust management methodology for the Internet of Things (CITM-IoT), Mobile Networks and Applications, 1
Atzori, 2010, The Internet of Things: A survey, Computer Networks, 54, 2787, 10.1016/j.comnet.2010.05.010
Baldini, 2016, Ethical design in the Internet of Things, Science and Engineering Ethics
Bandyopadhyay, 2013, Interoperations among IoT standards, Journal of ICT Standardization, 1, 253, 10.13052/jicts2245-800X.12a9
Bao, 2013, Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems, 1
Bartje, 2016, The top 10 application areas – Based on eeal IoT projects, IoT Analytics
Ben-Daya, 2017, Internet of Things and supply chain management: A literature review, International Journal of Production Research, 1, 10.1080/00207543.2017.1402140
Bian, 2016, Mining twitter to assess the public perception of the ‘Internet of Things’, PLoS One, 11, 10.1371/journal.pone.0158450
BITAG (2016). Internet of Things (IoT) security and privacy recommendations. BITAG Broadband Internet Technical Advisory Group, November 2016. Retrieved fromhttps://www.bitag.org/documents/BITAG_Report_-_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf, (Accessed 11 November 2018).
Burrus, D. (2014). The Internet of Things is Far Bigger than Anyone Realizes. Retrieved fromhttps://www.wired.com/insights/2014/11/the-internet-of-things-bigger/, (Accessed 11 November 2018).
Chaudhuri, 2018, The proactive and preventive privacy (3P) framework for IoT privacy by design, EDPACS, 57, 1, 10.1080/07366981.2017.1343548
Chen, 2011, TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things, Computer Science and Information Systems, 8, 1207, 10.2298/CSIS110303056C
Chen, 2016, Trust management for SOA-Based IoT and its application to service composition, IEEE Transactions on Services Computing, 9, 482, 10.1109/TSC.2014.2365797
De Leusse, 2012, Self-managed security cell, A security model for the Internet of Things and services, 47
DHS (2014). Strategic principles for securing the Internet of Things (IoT). Retrieved fromhttps://www.dhs.gov/sites/default/files/publications/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL_v2-dg11.pdf, (Accessed 12 December, 2018).
Fernandes, 2017, Internet of Things security research: a rehash of old ideas or new intellectual challenges, IEEE Security & Privacy, 15, 79, 10.1109/MSP.2017.3151346
Fernandez-Gago, 2017, Modelling trust dynamics in the Internet of Things, Information Sciences, 396, 72, 10.1016/j.ins.2017.02.039
Gessner, 2012, Trustworthy infrastructure services for a secure and privacy-respecting Internet of Things, 998
Gigli, 2011, Internet of Things: Services and applications categorization, Advances in Internet of Things, 1, 27, 10.4236/ait.2011.12004
Gillett, 2018
Gregor, 2006, The nature of theory in information systems, MIS Quarterly, 30, 611, 10.2307/25148742
Guo, 2017, A survey of trust computation models for service management in Internet of Things systems, Computer Communications, 97, 1, 10.1016/j.comcom.2016.10.012
Heer, 2011, Security challenges in the IP-based Internet of Things, Wireless Personal Communications, 61, 527, 10.1007/s11277-011-0385-5
Hsu, 2016, An Empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives, Computers in Human Behavior, 62, 516, 10.1016/j.chb.2016.04.023
Hsu, 2018, Exploring factors affecting the adoption of Internet of Things services, Journal of Computer Information Systems, 58, 49, 10.1080/08874417.2016.1186524
Huang, 2016, SecIoT: A security framework for the Internet of Things, Security and Communication Networks, 9, 3083, 10.1002/sec.1259
Jaccard, 2010
Javed, 2012, Automated sensor verification using outlier detection in the Internet of Things, 291
Jay, 2018
Jayaraman, 2017, Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation, Future Generation Computer Systems, 540, 10.1016/j.future.2017.03.001
Junnila, 2018
Kanuparthi, 2013, Hardware and embedded security in the context of Internet of Things, 61
Kim, 2014, Determining the factors that influence college students’ adoption of smartphones, Journal of Association for Information Science Technologies, 65, 578, 10.1002/asi.22987
Koo, 2017, Enforcing high-level security policies for Internet of Things, The Journal of Supercomputing
Kothmayr, 2013, DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, 11, 2710, 10.1016/j.adhoc.2013.05.003
Kowshalya, 2017, Trust management in the social Internet of Things, Wireless Personal Communications, 96, 2681, 10.1007/s11277-017-4319-8
Lee, 2015, The Internet of Things (IoT): Applications, investments, and challenges for enterprises, Business Horizons, 58, 431, 10.1016/j.bushor.2015.03.008
Leidner, 2006, Review: A review of culture in information systems research: toward a theory of information technology culture conflict, MIS Quarterly, 30, 357, 10.2307/25148735
Liu, 2010, Trust control in heterogeneous networks for Internet of Things, 632
Lueth, 2015
Lund, 2014
Luo, 2016, A dynamic trust management system for wireless sensor networks, Security and Communication Networks, 613, 10.1002/sec.1384
Madakam, 2015, Internet of Things (IoT): A literature review, Journal of Computer and Communications, 3, 164, 10.4236/jcc.2015.35021
Mäkinen, 2015, Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things, Information & Communications Technology Law, 24, 262, 10.1080/13600834.2015.1091128
Malina, 2016, On perspective of security and privacy-preserving solutions in the Internet of Things, Computer Networks, 102, 83, 10.1016/j.comnet.2016.03.011
Maple, 2017, Security and privacy in the Internet of Things, Journal of Cyber Policy, 2, 155, 10.1080/23738871.2017.1366536
Marias, 2011, Security and privacy issues for the network of the future, Security and Communication Networks, 5, 987, 10.1002/sec.384
Miorandi, 2012, Internet of Things: Vision, applications and research challenges, Ad Hoc Networks, 10, 1497, 10.1016/j.adhoc.2012.02.016
Mišura, 2016, Negotiation in Internet of Things, Automatika, 57, 304, 10.7305/automatika.2016.10.1193
Nicolescu, 2018, Mapping the values of IoT, Journal of Information Technology, 10.1057/s41265-018-0054-1
Ning, 2013, Cyberentity security in the Internet of Things, Computer, 46, 46, 10.1109/MC.2013.74
Ornes, 2016, The Internet of Things and the explosion of interconnectivity, 113, 11059
Peppet, 2014, Regulating the Internet of Things: First steps toward managing discrimination, privacy, security, and consent, Texas Law Review, 93, 85
Perera, 2016, Privacy-knowledge modeling for the Internet of Things: A look back,, Computer, 49, 60, 10.1109/MC.2016.366
Petersen, 2014, The role of the Internet of Things in network resilience, International Internet of Things Summit, 283
Raferty, 2017
Ransbotham, 2016, Special section introduction – Ubiquitous IT and digital vulnerabilities, Information Systems Research, 27, 834, 10.1287/isre.2016.0683
Raza, 2014, Secure communication for the Internet of Things – A comparison of link-layer security and IPsec for 6LoWPAN, Security and Communication Networks, 7, 2654, 10.1002/sec.406
Rekleitis, 2014, How to protect security and privacy in the IoT: A policy-based RFID tag management protocol, Security and Communication Networks, 7, 2669, 10.1002/sec.400
Rivard, 2014, The ions of theory construction, MIS Quarterly, 38, 3
Roman, 2011, Securing the Internet of Things, Computer, 44, 51, 10.1109/MC.2011.291
Roman, 2013, On the features and challenges of security and privacy in distributed Internet of Things, Computer Networks, 57, 2266, 10.1016/j.comnet.2012.12.018
Saied, 2013, Trust management system design for the Internet of Things: A context-aware and multi-service approach, Computers & Security, 39, 351, 10.1016/j.cose.2013.09.001
Samani, 2015, Privacy in Internet of Things: A model and protection framework, Procedia Computer Science, 52, 606, 10.1016/j.procs.2015.05.046
Shaikh, 2017, Enabling technologies for green Internet of Things, IEEE Systems Journal, 11, 983, 10.1109/JSYST.2015.2415194
Sicari, 2016, A security-and quality-aware system architecture for Internet of Things, Information Systems Frontiers, 18, 665, 10.1007/s10796-014-9538-x
Sicari, 2015, Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, 76, 146, 10.1016/j.comnet.2014.11.008
Stankovic, 2014, Research directions for the Internet of Things, IEEE Internet of Things Journal, 1, 3, 10.1109/JIOT.2014.2312291
Team, 2017
Team, 2017
Team, 2017
Team, 2017
Team, 2017
Weber, 2012, Evaluating and developing theories in the information systems discipline, Journal of the Association for Information Systems, 13, 1, 10.17705/1jais.00284
Webster, 2002, Analyzing the past to prepare for the future: Writing a literature review, MIS Quarterly, 26, 13
Weinberg, 2015, Internet of Things: Convenience vs. privacy and secrecy, Business Horizons, 58, 615, 10.1016/j.bushor.2015.06.005
Wiener, 2016, Control configuration and control enactment in information systems projects: Review and expanded theoretical framework, MIS Quarterly, 40, 741, 10.25300/MISQ/2016/40.3.11
Wortmann, 2015, Internet of Things, Business & Information Systems Engineering, 57, 221, 10.1007/s12599-015-0383-3
Yan, 2014, A survey on trust management for Internet of Things, Journal of Network and Computer Applications, 42, 120, 10.1016/j.jnca.2014.01.014
Ziegeldorf, 2014, Privacy in the Internet of Things: Threats and challenges, Security and Communication Networks, 7, 2728, 10.1002/sec.795