“…E-government IoT systems can use firewalls, authentication, encryption, security protocols, and intrusion detection systems to provide the required level of security. Moreover, the other issues with IoT devices, according to Balte et al (2015), include device heterogeneity, ubiquitous data exchange, and scalability, through wireless technologies, energy-optimized solutions, localization and tracking capabilities, among others. It can be noticed that regardless of who uses them, who owns them, or which industry they are used in, data privacy and security continue to pose the greatest risks associated with IoT devices.…”