The Internet of Things: Review and theoretical framework

Expert Systems with Applications - Tập 133 - Trang 97-108 - 2019
Jeretta Horn Nord1, Alex Koohang2, Joanna Paliszkiewicz3
1Management Science and Information Systems Department, Oklahoma State University, Stillwater, OK 74078, USA
2Middle Georgia State University, Macon, GA 31206, USA
3Warsaw University of Life Sciences, Warsaw, Poland

Tài liệu tham khảo

AIS Senior Scholars Basket of Eight (2011). Retrieved fromhttps://aisnet.org/?SeniorScholarBasket, (Accessed 12 December 2018). Alshehri, 2018, Clustering-driven intelligent trust management methodology for the Internet of Things (CITM-IoT), Mobile Networks and Applications, 1 Atzori, 2010, The Internet of Things: A survey, Computer Networks, 54, 2787, 10.1016/j.comnet.2010.05.010 Baldini, 2016, Ethical design in the Internet of Things, Science and Engineering Ethics Bandyopadhyay, 2013, Interoperations among IoT standards, Journal of ICT Standardization, 1, 253, 10.13052/jicts2245-800X.12a9 Bao, 2013, Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems, 1 Bartje, 2016, The top 10 application areas – Based on eeal IoT projects, IoT Analytics Ben-Daya, 2017, Internet of Things and supply chain management: A literature review, International Journal of Production Research, 1, 10.1080/00207543.2017.1402140 Bian, 2016, Mining twitter to assess the public perception of the ‘Internet of Things’, PLoS One, 11, 10.1371/journal.pone.0158450 BITAG (2016). Internet of Things (IoT) security and privacy recommendations. BITAG Broadband Internet Technical Advisory Group, November 2016. Retrieved fromhttps://www.bitag.org/documents/BITAG_Report_-_Internet_of_Things_(IoT)_Security_and_Privacy_Recommendations.pdf, (Accessed 11 November 2018). Burrus, D. (2014). The Internet of Things is Far Bigger than Anyone Realizes. Retrieved fromhttps://www.wired.com/insights/2014/11/the-internet-of-things-bigger/, (Accessed 11 November 2018). Chaudhuri, 2018, The proactive and preventive privacy (3P) framework for IoT privacy by design, EDPACS, 57, 1, 10.1080/07366981.2017.1343548 Chen, 2011, TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things, Computer Science and Information Systems, 8, 1207, 10.2298/CSIS110303056C Chen, 2016, Trust management for SOA-Based IoT and its application to service composition, IEEE Transactions on Services Computing, 9, 482, 10.1109/TSC.2014.2365797 De Leusse, 2012, Self-managed security cell, A security model for the Internet of Things and services, 47 DHS (2014). Strategic principles for securing the Internet of Things (IoT). Retrieved fromhttps://www.dhs.gov/sites/default/files/publications/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL_v2-dg11.pdf, (Accessed 12 December, 2018). Fernandes, 2017, Internet of Things security research: a rehash of old ideas or new intellectual challenges, IEEE Security & Privacy, 15, 79, 10.1109/MSP.2017.3151346 Fernandez-Gago, 2017, Modelling trust dynamics in the Internet of Things, Information Sciences, 396, 72, 10.1016/j.ins.2017.02.039 Gessner, 2012, Trustworthy infrastructure services for a secure and privacy-respecting Internet of Things, 998 Gigli, 2011, Internet of Things: Services and applications categorization, Advances in Internet of Things, 1, 27, 10.4236/ait.2011.12004 Gillett, 2018 Gregor, 2006, The nature of theory in information systems, MIS Quarterly, 30, 611, 10.2307/25148742 Guo, 2017, A survey of trust computation models for service management in Internet of Things systems, Computer Communications, 97, 1, 10.1016/j.comcom.2016.10.012 Heer, 2011, Security challenges in the IP-based Internet of Things, Wireless Personal Communications, 61, 527, 10.1007/s11277-011-0385-5 Hsu, 2016, An Empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives, Computers in Human Behavior, 62, 516, 10.1016/j.chb.2016.04.023 Hsu, 2018, Exploring factors affecting the adoption of Internet of Things services, Journal of Computer Information Systems, 58, 49, 10.1080/08874417.2016.1186524 Huang, 2016, SecIoT: A security framework for the Internet of Things, Security and Communication Networks, 9, 3083, 10.1002/sec.1259 Jaccard, 2010 Javed, 2012, Automated sensor verification using outlier detection in the Internet of Things, 291 Jay, 2018 Jayaraman, 2017, Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation, Future Generation Computer Systems, 540, 10.1016/j.future.2017.03.001 Junnila, 2018 Kanuparthi, 2013, Hardware and embedded security in the context of Internet of Things, 61 Kim, 2014, Determining the factors that influence college students’ adoption of smartphones, Journal of Association for Information Science Technologies, 65, 578, 10.1002/asi.22987 Koo, 2017, Enforcing high-level security policies for Internet of Things, The Journal of Supercomputing Kothmayr, 2013, DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Networks, 11, 2710, 10.1016/j.adhoc.2013.05.003 Kowshalya, 2017, Trust management in the social Internet of Things, Wireless Personal Communications, 96, 2681, 10.1007/s11277-017-4319-8 Lee, 2015, The Internet of Things (IoT): Applications, investments, and challenges for enterprises, Business Horizons, 58, 431, 10.1016/j.bushor.2015.03.008 Leidner, 2006, Review: A review of culture in information systems research: toward a theory of information technology culture conflict, MIS Quarterly, 30, 357, 10.2307/25148735 Liu, 2010, Trust control in heterogeneous networks for Internet of Things, 632 Lueth, 2015 Lund, 2014 Luo, 2016, A dynamic trust management system for wireless sensor networks, Security and Communication Networks, 613, 10.1002/sec.1384 Madakam, 2015, Internet of Things (IoT): A literature review, Journal of Computer and Communications, 3, 164, 10.4236/jcc.2015.35021 Mäkinen, 2015, Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things, Information & Communications Technology Law, 24, 262, 10.1080/13600834.2015.1091128 Malina, 2016, On perspective of security and privacy-preserving solutions in the Internet of Things, Computer Networks, 102, 83, 10.1016/j.comnet.2016.03.011 Maple, 2017, Security and privacy in the Internet of Things, Journal of Cyber Policy, 2, 155, 10.1080/23738871.2017.1366536 Marias, 2011, Security and privacy issues for the network of the future, Security and Communication Networks, 5, 987, 10.1002/sec.384 Miorandi, 2012, Internet of Things: Vision, applications and research challenges, Ad Hoc Networks, 10, 1497, 10.1016/j.adhoc.2012.02.016 Mišura, 2016, Negotiation in Internet of Things, Automatika, 57, 304, 10.7305/automatika.2016.10.1193 Nicolescu, 2018, Mapping the values of IoT, Journal of Information Technology, 10.1057/s41265-018-0054-1 Ning, 2013, Cyberentity security in the Internet of Things, Computer, 46, 46, 10.1109/MC.2013.74 Ornes, 2016, The Internet of Things and the explosion of interconnectivity, 113, 11059 Peppet, 2014, Regulating the Internet of Things: First steps toward managing discrimination, privacy, security, and consent, Texas Law Review, 93, 85 Perera, 2016, Privacy-knowledge modeling for the Internet of Things: A look back,, Computer, 49, 60, 10.1109/MC.2016.366 Petersen, 2014, The role of the Internet of Things in network resilience, International Internet of Things Summit, 283 Raferty, 2017 Ransbotham, 2016, Special section introduction – Ubiquitous IT and digital vulnerabilities, Information Systems Research, 27, 834, 10.1287/isre.2016.0683 Raza, 2014, Secure communication for the Internet of Things – A comparison of link-layer security and IPsec for 6LoWPAN, Security and Communication Networks, 7, 2654, 10.1002/sec.406 Rekleitis, 2014, How to protect security and privacy in the IoT: A policy-based RFID tag management protocol, Security and Communication Networks, 7, 2669, 10.1002/sec.400 Rivard, 2014, The ions of theory construction, MIS Quarterly, 38, 3 Roman, 2011, Securing the Internet of Things, Computer, 44, 51, 10.1109/MC.2011.291 Roman, 2013, On the features and challenges of security and privacy in distributed Internet of Things, Computer Networks, 57, 2266, 10.1016/j.comnet.2012.12.018 Saied, 2013, Trust management system design for the Internet of Things: A context-aware and multi-service approach, Computers & Security, 39, 351, 10.1016/j.cose.2013.09.001 Samani, 2015, Privacy in Internet of Things: A model and protection framework, Procedia Computer Science, 52, 606, 10.1016/j.procs.2015.05.046 Shaikh, 2017, Enabling technologies for green Internet of Things, IEEE Systems Journal, 11, 983, 10.1109/JSYST.2015.2415194 Sicari, 2016, A security-and quality-aware system architecture for Internet of Things, Information Systems Frontiers, 18, 665, 10.1007/s10796-014-9538-x Sicari, 2015, Security, privacy and trust in Internet of Things: The road ahead, Computer Networks, 76, 146, 10.1016/j.comnet.2014.11.008 Stankovic, 2014, Research directions for the Internet of Things, IEEE Internet of Things Journal, 1, 3, 10.1109/JIOT.2014.2312291 Team, 2017 Team, 2017 Team, 2017 Team, 2017 Team, 2017 Weber, 2012, Evaluating and developing theories in the information systems discipline, Journal of the Association for Information Systems, 13, 1, 10.17705/1jais.00284 Webster, 2002, Analyzing the past to prepare for the future: Writing a literature review, MIS Quarterly, 26, 13 Weinberg, 2015, Internet of Things: Convenience vs. privacy and secrecy, Business Horizons, 58, 615, 10.1016/j.bushor.2015.06.005 Wiener, 2016, Control configuration and control enactment in information systems projects: Review and expanded theoretical framework, MIS Quarterly, 40, 741, 10.25300/MISQ/2016/40.3.11 Wortmann, 2015, Internet of Things, Business & Information Systems Engineering, 57, 221, 10.1007/s12599-015-0383-3 Yan, 2014, A survey on trust management for Internet of Things, Journal of Network and Computer Applications, 42, 120, 10.1016/j.jnca.2014.01.014 Ziegeldorf, 2014, Privacy in the Internet of Things: Threats and challenges, Security and Communication Networks, 7, 2728, 10.1002/sec.795