The rapid development of Internet of things (IoT) technology has made the IoT applicable in many areas of life and has contributed to the IoT’s improvement. IoT devices are equipped with various sensors that enable them to perform the tasks they were designed for. The use of such devices is associated with securing communication between devices and users. The key stages of communication are the processes of authentication and the process of agreeing on session keys because they are the basis of the subsequent communication phases. The specially designed security protocols are used to secure communication. These protocols define the course of communication and cryptographic techniques employed for securing. In this article, we have reviewed the latest communication protocols designed to secure authentication processes and agree on session keys in IoT environments. We analyzed the proposed protocols’ security level, vulnerability, and computational and communication costs. We showed our observations, describing the requirements that a secure protocol should meet.
Various researchers have suggested the need to develop sound ethical information technology practices to combat the increased incidence of computer misuse. Relating to the ubiquity of information technology, this article presents a basis to understand the nature of computer misuse. Such an analysis will help in developing ethical practices to minimize computer misuse. Finally, this article argues that by addressing ethical issues at both formal and informal levels, the risks associated with information technology usage can be minimized.Modern organizations widely apply information technology (IT) to conduct their businesses more efficiently and effectively. Indeed, the logical malleability of computers has ensured enormous application of computer technology in the future (Moor, 1985). This has led organizations to become dependent on IT. In spite of the potential benefits that might occur, the use of IT within organizations has resulted in new types of problems. These can range from incompetence, ignorance, and negligence in the use of IT to deliberate misappropriation by individuals or groups of individuals.The focal concern of this article is to analyze problems related to computer misuse. Computer misuse encompasses a wide range of illicit activities such as fraud, virus infections, illicit software, theft of data and software, unauthorized private work, invasion of privacy, and sabotage. Such illicit activities could vary from simple pranks to serious crimes.This article is an attempt to understand the nature of computer misuse such that necessary management practices could be developed. It argues that to minimize computer misuse, organizations must focus on developing ethical practices. In conducting the argument, ethical aspects are discussed and evaluated. Furthermore, ethical principles are identified that might assist in minimizing computer misuse.This article is divided into five sections. After this brief introduction, the next section analyzes the nature of computer misuse. The third section addresses issues that deal with managing and controlling computer misuse. The subsequent section discusses the emergent issues and concerns. The final section presents the conclusions of the article.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.