2017
DOI: 10.1016/j.techsoc.2017.09.004
|View full text |Cite
|
Sign up to set email alerts
|

Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…They do so through AI that allows an intelligent intrusion detection model to expose threats, through Decision Trees for network intrusion detection [23]. It also enables household participants to obtain control over intelligent IoT agents operating in their personal spheres [60]; executives to provide businesses with an approach for securing an enterprise by a dynamic architecture of Extended Risk-Based Approach on Cloud and the IoT [61]; and in general, to virtually all paperless work environments [62], by targeting threats related to the distributed denial of service (DDoS) on power grids and hacking of industrial control systems (ICS) along with the ensuing regulatory responses [13].…”
Section: The Internet Of Things (Iot)mentioning
confidence: 99%
“…They do so through AI that allows an intelligent intrusion detection model to expose threats, through Decision Trees for network intrusion detection [23]. It also enables household participants to obtain control over intelligent IoT agents operating in their personal spheres [60]; executives to provide businesses with an approach for securing an enterprise by a dynamic architecture of Extended Risk-Based Approach on Cloud and the IoT [61]; and in general, to virtually all paperless work environments [62], by targeting threats related to the distributed denial of service (DDoS) on power grids and hacking of industrial control systems (ICS) along with the ensuing regulatory responses [13].…”
Section: The Internet Of Things (Iot)mentioning
confidence: 99%
“…Some of these reviews have been comprehensive (Macedo et al, 2019;Pandey et al, 2019;Sengupta et al, 2020;Sepulveda et al, 2020) while others have focused on specific aspects, such as the internet of things (IoT) (Oravec, 2017) enabled cyberattacks in industry, smart grid, transportation, medical services and smart homes (Stellios et al, 2018;Kennedy et al, 2019;Gupta et al, 2020a), Block Chain integration in health supply chain management (SCM) (Nanda and Nanda, 2021) or ethical and regulatory issues as related to cyberattacks (Pesapane et al, 2018). These reviews have covered key issues and provided key insights, but ours is one of the first studies to examine cyberattacks on Chinese SCs and calls for global governance, an issue not well studied in the literature, our works aim to reduce these gaps.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This issue has shed light on the implementation of intrusion de-tection systems, able to protect data and physical devices, through for instance AI that allows an intelligent intrusion detection model to detect threats, through Decision Trees for network intrusion detection [23]. It operates also to household participants, to obtain control over the intelligent IoT agents operating in their personal spheres [60]; to executives, in providing businesses with an approach for securing an enterprise by a dynamic architecture of Extended Risk-Based Approach on Cloud and IoT [61]; and in general to all virtually paperless work environments [62], aiming at threats re-lated with distributed denial of service (DDoS) on power grids and hacking of indus-trial control systems (ICS) along with the ensuing regulatory responses [13].…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%