Search results

1 – 5 of 5
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 2 December 2022

Akansha Tripathi and Madan Kushwaha

In the existing era, the Internet of Things (IoT) can be considered entirely as a system of embedding intelligence. The transverse character of IoT systems and various components…

98

Abstract

Purpose

In the existing era, the Internet of Things (IoT) can be considered entirely as a system of embedding intelligence. The transverse character of IoT systems and various components associated with the arrangement of IoT systems have confronted impediments in the form of security and trust. There is a requirement to efficiently secure the IoT environment. The present study recommends a framework for impediments to secure and trustworthy IoT environments.

Design/methodology/approach

The present study identifies thirteen potential impediments to secure and trustworthy IoT environment. Further, a framework is developed employing Total Interpretive Structural Model (TISM) and Cross-Impact Matrix Multiplication Applied to Classification (MICMAC) approach. The integrated approach is employed as TISM organizes inter-relations among the identified impediments, while MICMAC analysis organizes interpretations related to the driving and dependence power of the impediments.

Findings

The results from the study represents that security of IoT from arbitrary attacks is the impediment that has attained the highest driving power. The impediments such as “security of IoT from arbitrary attacks”, “profiling” and “trust and prominence structure” are identified at the top level in the analysis.

Research limitations/implications

The previous studies highlight the facilitating contribution of IoT on various devices but neglect the impediments that can contribute towards a safe and trustworthy IoT environment. Also, the present study has its limitations as it depends upon the experts’ recommendations and suggestions.

Originality/value

The existing framework could be beneficial in constructing policies and suggestions to efficiently cater the impediments to a secure and trustworthy IoT environment.

Available. Content available
Book part
Publication date: 28 September 2023

Abstract

Details

Digital Transformation, Strategic Resilience, Cyber Security and Risk Management
Type: Book
ISBN: 978-1-80455-262-9

Access Restricted. View access options
Book part
Publication date: 20 May 2024

Farha Khan and Akansha Mer

Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting…

Abstract

Introduction: As Internet usage increases, so does widespread concern about surveillance and privacy. While most of the research primarily focuses on a particular digital setting, these problems cut beyond national boundaries and impact economies everywhere.

Purpose: This study critically analyses the Data Protection Bill 2019’s effectiveness within the context of surveillance and privacy in India’s digital economy. Investigating critical provisions of the bill, comparing it to international privacy laws and standards, and identifying potential gaps and weaknesses, this study provides insights into the bill’s ability to protect personal data and limit surveillance practices.

Methodology: The chapter is based on secondary sources of data, including academic articles, government reports, and news articles on the topics of surveillance, privacy, and the Data Protection Bill 2019 in India, involving content and critical discourse analyses.

Findings: The Data Protection Bill 2019 evaluation reveals a set of provisions with the overarching intent to safeguard citizens’ privacy worldwide and curtail undue surveillance practices exercised by both governmental bodies and private enterprises. Intricately delineates the entitlements of individuals concerning their data, encompassing vital aspects such as the right to access, rectify, and erase their data, the bill mandates stringent adherence to the principle of explicit consent when collecting and processing personal data.

Nevertheless, a comprehensive analysis also reveals several gaps and constraints inherent in the bill’s framework. One such area is the inclusion of exemptions for governmental entities, an aspect that raises international concerns regarding potential disparities in data protection practices.

Details

Sustainable Development Goals: The Impact of Sustainability Measures on Wellbeing
Type: Book
ISBN: 978-1-83797-098-8

Keywords

Available. Content available
Book part
Publication date: 13 May 2024

Abstract

Details

VUCA and Other Analytics in Business Resilience, Part A
Type: Book
ISBN: 978-1-83753-902-4

Available. Content available
Book part
Publication date: 28 September 2023

Abstract

Details

Digital Transformation, Strategic Resilience, Cyber Security and Risk Management
Type: Book
ISBN: 978-1-83797-009-4

1 – 5 of 5
Per page
102050