2017 International Conference on Engineering and Technology (ICET) 2017
DOI: 10.1109/icengtechnol.2017.8308189
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise security and privacy: Why adding IoT and big data makes it so much more difficult

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…The use of multiple data sources that may themselves be insecure leads to potentially insecure solutions (Duncan et al, 2017). During the completion of this study, Simon Weckart tricked Google Maps into reporting that 100 cell phones in a wagon were a tra c jam demonstrating the ease with which some big data systems can be fooled by injection of IoT devices (Torres, 2020).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of multiple data sources that may themselves be insecure leads to potentially insecure solutions (Duncan et al, 2017). During the completion of this study, Simon Weckart tricked Google Maps into reporting that 100 cell phones in a wagon were a tra c jam demonstrating the ease with which some big data systems can be fooled by injection of IoT devices (Torres, 2020).…”
Section: Discussionmentioning
confidence: 99%
“…This subtheme also aligns well with the subthemes of minimizing data noise and minimizing data sources. This is because many big data sources are often insecure which leads to potentially inaccurate analysis (Duncan, Whittington, & Chang, 2017). Developing processes for validating data sources is a key governance practice for data scientists.…”
Section: Theme 1: Ensuring Business Centricitymentioning
confidence: 99%
“…This subtheme also aligns well with the subthemes of minimizing data noise and minimizing data sources. This alignment is because many big data sources are often insecure, leading to potentially inaccurate analysis [60]. Developing processes for validating data sources is a key governance practice for data scientists.…”
Section: Establishing Validation Processesmentioning
confidence: 99%
“…Should the data from these sensors be reliant upon an actuator, a wrong decision or operation could then be performed. Hence, security becomes a challenge [42].…”
Section: Self-configured Security Within Iot Ecosystemmentioning
confidence: 99%