The Impact of IoT on the Modern World

The Impact of IoT on the Modern World

By Dr. Heidrich Vicci

1. Introduction

The IoT provides users with dynamic and rich context-aware services that are highly responsive to the user needs. The users can remotely monitor and control the environment. The IoT will allow more direct integration of the physical world into computer-based systems, resulting in improved accuracy, efficiency, and economic benefit in addition to reduced human intervention. The basic premise is to have objects or things working for humans, rather than humans working for them. As we can see, the usage of the term follows a similar trend in both economics and search engine results, which could be a good indicator of the existence of a correlation between the two. More than 16 years after its inception, technology remains a hot topic both in the business world and in academia. (Jagarlamudi et al.2022)(Pradeep et al.2021)(Pradeep et al.2021)

The purpose of this article is to understand the impact of the Internet of Things on different aspects of business. This review focuses on understanding the services provided by the Internet of Things (IoT) to industries and how it can be used for their benefit. The Internet of Things represents a vision in which the Internet extends into the real world, embracing everyday objects. Physical items are no longer disconnected from the virtual world but can be controlled remotely and can act as physical access points to internet services. "Things" with built-in processors could be connected within an area to accomplish one or the other task, an idea that was first proposed by Ashton and Kamaras in the year 1999. (Greengard, 2021)(Tran-Dang et al.2020)(Lombardi et al., 2021)

2. Advantages of IoT

The growth rate of the Internet of Things (IoT) is phenomenal, with more than 36 billion devices expected to be connected by 2021. But the reality is that this growth brings more questions and challenges than mere connections and innovation could address without drastically increasing the workforce. There are predictions of a potential shortage of IoT skilled workers. The world is showing increasing interest in this new area, where to a greater or lesser extent people experience, use, and benefit from its contributions. The automation and control capabilities of IoT make it possible to provide services and to create systems to control different technological systems, promoting better quality of life and overall improving the welfare and well-being of people. (Zikria et al., 2021)(Alvares et al., 2021)(Sadeeq et al.2021)

To support digital transformation processes, a trend has emerged in IoT, which has shifted the perspective of people to the value of data generated by devices and devices connected to the Internet. This leads to a type of relationship in which the amount and quality of the data generated and collected by a device is directly related to its connectivity, leading Information Technology (IT) to expand the possibilities of associating the digital world with the real world through digital services, technology, and increasingly "smarter" products. The ubiquitous nature of IoT, i.e. its omnipresence in several aspects and sectors of modern life, can lead to the disappearance of "technological overload". That is, in the future, the technology that surrounds us will no longer be "seen" (it will rather be used) as the backdrop of our environment. Therefore, it is imperative that the creation and evolution of IoT solutions take into account this new reality. (Booij et al.2021)(Firouzi et al., 2022)(Lombardi et al., 2021)

2.1. Efficient Data Collection and Analysis

IoT-based solutions facilitate the emergence of new services and business models. These technologies are already implemented in many areas, for example, in smart cities, smart grids, or smart homes. It is estimated that in 2020, the number of active things will be between 26 and 212 billion. Every year, IoT technologies bring $1.9 trillion of new potential economic value. The final value will depend upon, among others, the implemented systems, the scope and effectiveness of the implemented solutions, as well as the level of acceptance of these technologies by the users. When used efficiently, IoT brings considerable benefits. They include, among others, faster decision-making, reduction of operation and control costs, competitive benefits, and the optimization of input resource and energy usage. IoT also, among other things, contributes to changing human behavior, influencing consciousness, and being an incentive for economic development. (Atitallah et al., 2020)(Rejeb et al., 2022)(Bellini et al., 2022)

The development of IT technologies influences, among others, the increased expectations for intelligent systems. Many assume that, in a few-year perspective, a computer system will take over many activities and responsibilities from people. Intelligent systems will be able to assist people without needing specific instructions. For example, by supplementing their experience, recognizing and analyzing situations, drawing appropriate conclusions, making decisions, and informing of a risky situation. The efficiency of these solutions stems, among others, from the comprehensive and reliable information, which constitutes the indispensable basis for these systems. These expectations, however, might have a detrimental effect. According to some researchers, they facilitate the erosion of competencies, which requires, for example, memorization and use of knowledge and skills, creation of interpersonal relationships, and obtaining experience, autonomously solving individual or collective problems. (Sarker, 2022)(Zavr?nik, 2020)(Yang & Gu, 2021)

2.2. Improved Decision-Making

Compared to conventional methods, Industry 4.0 will provide complete real-time process monitoring and reporting capabilities. The data collected can be integrated with analytics and big data capabilities to make decisions on time to predict if trouble is likely and to also predict the quality and production time of a product. This allows plants to operate in the most efficient way by allowing movement and communication to work together as a whole. Also, the ability to exchange information, create tasks, execute tasks, and monitor task progress through real-time data collected by developers used to maintain factory floor visibility and allow intelligent decisions to be made quickly using real-time information. This greatly contributes to improving efficiency, reducing downtime, and improving overall business operations and strategies. (Javaid et al., 2021)(Shaheen & Németh, 2022)(Jamwal et al., 2021)(Saabye et al., 2020)

The advanced technologies outlined in the IoT strategy will be used to support the seamless exchange of data and information between devices, equipment, factories, and other business functions, so new revolutionary services can be offered to customers, and improved productivity and efficiency in value chains. This business-led approach will ensure that Europe's industry can take full advantage of the latest technological developments and ensure that IoT is incorporated into their best business strategies and operations. This will provide direct economic benefits and improve the daily lives of European citizens. Europe's industry is highly competitive but is struggling to innovate and secure worldwide market leadership positions in IoT application areas such as consumer equipment and network connectivity, apart from giving full value to manufacturing and Industry 4.0. (Yang & Gu, 2021)(Vermesan & Friess, 2022)(Behie et al.2023)

2.3. Enhanced Automation

IoT systems underpin improved automation of various forms, which increases efficiency, reduces time, eliminates costs, and eliminates human error. This asset is used by every business that employs IoT types. IoT constructs a "smart home" model with several smart devices operating collectively (each appliance also belongs to a small network within IoT networks) to automate a wide variety of household activities. Nonetheless, the greater system participates in "smart" businesses, "smart" housing suppliers, and "smart" cities. Given that most businesses' core operations are maintained by businesses, limiting use cases to personal usage does not reflect the broader picture. Limited integration with enterprise systems in recent reports has unreasonably prevented the elevated integration of smart home technology. (Swamy & Kota, 2020)(Ayvaz & Alpay, 2021)(Sgarbossa et al.2020)

Shared understanding and engagement with the design and development of the smart city framework is needed. Additionally, the importance of such undertaking must be emphasized, as it is imperative that leaders and economists impede into the easy stage of integrating "smart cities." Automated manipulation of basic household and business operations enhance operational effectiveness by joining IoT appliances. Moreover, automation has enhanced the performance of planet management by automating the entire device. Enhancements by automation and control of artificial intelligence, powered by machine learning through IoT, in transportation systems, manufacturing industry automation as well as in the automatic delivery of products will determine the path in the direction in which IoT helps to benefit most lives. (Apsilyam et al.2024)(Ng et al.2021)(Tyagi et al.2020)

3. Challenges and Concerns of IoT

Security and privacy are two major concerns that need to be addressed, especially now as more and more connected devices are being installed. Security is a major challenge within IT, but with IoT, it is even more challenging, making it the single biggest challenge of IoT. The more devices are connected, the faster networks have to get for real-time processing and reactions, and such networks would be mostly shared among other applications. When you have drones and autonomous cars with highly uplinked access with extremely high speed, defense networks will require an infrastructure that is equally as robust with no delays in reaction times. (Malhotra et al.2021)(Karale, 2021)(Abiodun et al.2021)

Current firewalls are not designed well for IoT type of traffic as they classify and manage traffic based on domain and IP addresses, which as we have seen is expected to be a whopping 4.3 ZB. VPNs work well with low latency, but when you have an autonomous car driving at speeds of over 100km/h, delays of microseconds diverting traffic back to home base for inspection would lead to accidents leading to loss of lives, and this is simply not acceptable. (Alabady et al.2020)(VARZANEH et al.2024)(Kumar et al.2022)

Privacy is an issue with IoT as all data repositories may be integrated to store and analyze data. With colossal gains being expected from monetization, citizens' privacy is expected to level with public safety; otherwise, citizens may object to massive deployment of CCTVs in public arenas. A surveillance system that is cross-referenced is definitely questionable due to its ethical implications. Ethical implications lead to legal implications, and IoT compliance regulations are expected to go up. (Atlam & Wills, 2020)(Chatterjee et al., 2021)(Munoko et al., 2020)

Trust involves integrity and non-repudiation, and in IoT, clients and servers are expected to be mutually authenticated to prove service from authorized parties is from intended parties with appropriate levels of integrity and non-repudiation. Lower levels of trust require real-time actions of appropriate security policies enforcing them through various pattern recognition and self-improvising cryptographic policies. (Panda & Chattopadhyay, 2020)(Sun et al.2021)(Zheng et al.2022)

Regulatory issues are expected to be complex, confusing, and extremely legal-driven. It is complex as it involves thinking and addressing problems on a global level, as IoT can happen indecent of national and geographic borders, and it is confusing because it has so many layers implementing it at various levels of technology. (Stoyanova et al.2020)(Veale and Zuiderveen2021)(Brown and Pressley2023)

3.1. Security Risks

Initially, the attraction to IoT stemmed from the potential to drive vastly improved business processes and the resulting high demand for data analytics software and Big Data infrastructure investments. Then global usage of IoT rapidly expanded into Industrial IoT, Smart Cities (with a broader emphasis on environmental impacts), and a trend towards greater interest and concern about implications for consumers. In such a system based on IoT technologies, potential security risks are varied and multi-layered. These risks can be the security challenges on the data transport between thing-to-thing, place-to-place, one-to-many data flows, and security management problems, resilience, service-level impacts, security in integrated services and applications, as well as many levels of identity and policy issues in an increasingly open environment. (Magaia et al.2020)(Syed et al., 2021)(Javed et al.2022)

An overview of potential security faults is presented with brief explanations on the scales and impacts. Sensor data stream in IoT applications (intruder alarm, water tap sensor, smart meter for electricity and water; wireless body area sensor network for healthcare, etc.), actuators are often used for actuations in these applications, and these are expected to be security-hardened in such environments. Unfortunately, current IoT devices and services are very much about how to enhance the security in a reasonably secure way, and there are very few formal IoT security specifications in the real market. Moreover, IoT brings a new dynamic layer into otherwise isolated computing systems with scattered data flow and trust contexts, allowing the creation of very large-scale multi-layered attacks covering all the above-mentioned potential risks. In a compromised system, cloud data exchange mechanisms are widely applied and are also an ideal place for compromising credentials in very large attacks. (Martin et al.2020)(Cirne et al., 2022)(Iqbal et al.2020)

3.2. Privacy Issues

Given the extent to which IoT can and will be used in critical aspects of human life, it is paramount to secure reliable privacy-enhancing technologies (PET). IoT raises new privacy concerns, such as possible inferences on position, personal health indicators, personal and professional habits, personal predispositions and fears, and doxing. Citizens, both in personal and professional capacities, have the right to keep certain aspects of their lives private, such as their habits, cultural preferences, and personal environment. However, studies indicate that nearly 85% of IoT devices expose user data to potential privacy and security risks. (Chanal & Kakkasageri, 2020)(Emami-Naeini et al.2021)(Karale, 2021)

Over the past years, many technical solutions have been proposed to mitigate IoT privacy concerns. Furthermore, several high-level solutions have been defined at the EU level. The European Commission, in charge of environmental and privacy policy and strategy, has taken proactive steps to set the foundation of the IoT privacy debate. On May 4th, 2016, a new EU regulation specifically addressing the security of IoT solutions was introduced. The concept of EU levels addressing IoT privacy and security is as follows: Level 1 (highest degree of centralization) called specific data sets sensitive to privacy reasons operations, Level 2 contextualized PET across sensitive data sets and privacy local devices of PET across sensitive data sets, and Level 3 (highest degree of decentralization) called privacy-by-design across IoT devices (similar to the GDPR). (Cirne et al., 2022)(Karale, 2021)(Chiara)

3.3. Compatibility and Interoperability

Notably, one of the most challenging technical problems to which the IoT has given rise is making the devices and systems - what many researchers and analysts individually refer to as things - themselves. Adding incompatibility, different standards, privacy and security checks, voided warranties by adding new functions, market profusion, and over a hundred protocols, the challenges appear clearly. Problems emerge from the widespread and extensive use of proprietary solutions, which has created a situation in this field similar to and yet even more serious than that which the computer world had many years ago, a situation which has made it hard for users to interface with different systems. What every IoT standard has in common is the ability to analyze data extremely quickly and to react and execute actions in response. (Karie et al.2021)(Gupta and Quamara2020)(Iqbal et al.2020)

A passive RFID may be used as an ID card at work, school, or another office; an employee's smartphone might be used to connect to the internal wireless network, to send or receive emails or messages, or to access services provided only by an intranet. It may be useful to connect the device that reads the card to the electronic clocking-in machine that registers the day's start or end time; only a sophisticated mobile application can be used to register the entry of a person in accordance with safety procedures, and only a company-provided mobile phone can receive shared calendars, scheduled training events, or technical support alerts. It is necessary to consider, especially from the point of view of the employer, that integrating work activities with everyday activities automatically disadvantages those employees who cannot afford a smartphone, even a basic one, and therefore have limited access to enhanced services. (Derks et al., 2021)(Thulin and Vilhelmson2022)(Lutz et al., 2020)

4. Future of IoT

This potential future of IoT brings with it a lot of controversies about how the main stakeholders should manage it. Fog (edge) computing appears as a possible solution to some current and upcoming disagreements. The requirements of computation, communication, attachment to the physical world, reliability, security, real-time response, continuous operation during many years, low cost, and privacy are not all equally satisfied with the current and available general-purpose IT ecosystem, via the core cloud paradigm. Especially IoT, almost all the time and almost all together, require this set of requirements. (Laroui et al.2021)(Mijuskovic et al.2021)(Salaht et al., 2020)

The core cloud is much more flexible, powerful, and advanced than other technologies developed in the past. However, it is facing difficulties in properly satisfying IoT, all warranting the demand for a change of paradigm. It is also argued that legacy technology applications will also further benefit from a complementary computing edge, by on top of it reusing in whole or in part the basic principles of functionalities invented for IoT, which is compounding the benefits of changing IoT from a cloud computing environment to a fog one. Sometimes it is required to use the explicit prefix of fog to dissociate common mist concepts or paradigms and help engineers understand that this new generation of programmable computation is indeed different from traditional ones. (Firouzi et al., 2022)(Cai et al.2020)(Serhani et al.2020)

The recent advances in computing, new architecture paradigms, technologies in general, or applications and developments that are mostly based upon the widespread availability of the internet, mobile devices, and anticipation of future trends can be classified as new generations of some underlying basic concept. Despite the value of other generations, the cost of IoT is behaving not as it was expected initially. Hence, it is hard to forecast the real evolution of such impact and it may remain high or vanish completely when only desirable consumer product applications emerge - for sure a very important market but perhaps not as much as to warrant the huge potential economic increase that was expected from IoT. Regardless of the real economic impact of IoT, it has indeed pushed a large amount of research for IT subjects in either case, making such endeavor a worthwhile effort of the information technology community. (Kurt et al.2020)(Savazzi et al., 2020)(Alifah and Kusumawati2022)

4.1. Expansion of IoT Applications

The range of applications and use cases of IoT has been rapidly increasing in recent years. In 2014, 29,832 organizations worldwide invested $476 billion on IoT, where 89 percent of the business managers expect IoT to be a major source of competitive advantage over the next three years. Furthermore, the Internet of Things market will grow to $21.7 billion by 2018. Some of the most explored areas to benefit from IoT are Precision Agriculture, Smart Cities, Health Care, Smart Home, and Industrial IoT. ACHMA is one of the major Brazilian research centers focusing on IoT, providing technologies that enable IoT research and IoT-related applications. Some examples of ACHMA-supported research areas and projects are: waste management, urban air quality monitoring, medical equipment, smart grid applications (smart apartment buildings and industry), and IoT for disaster management. (Gupta and Quamara2020)

As opposed to consumer electronics, IoT solutions have specific characteristics that are commonly present in diverse applications such as: the need to support a variety of devices with different capabilities; context data (high volume and variety of context sources with temporal variation); distributed data processing based on devices with limited processing capacity; focus on event driven communication, using publish/subscribe paradigms (and even in scenarios not focused on IoT); and support the connection of new devices through dynamic device discovery and configuration. Since IoT follows the traditional phases of IoT data, where IoT devices capture information about physical objects, sending it to an IoT service where they are combined, processed and analyzed. These are viewed and shared by the recipient, in order to make the best decision, and can be transformed into actions that are executed, finally impacting the real world. (Gupta and Quamara2020)(Tawalbeh et al., 2020)(Lombardi et al., 2021)

4.2. Integration with AI and Machine Learning

One of the key barriers to the widespread integration of IoT devices is the impressive volume of data that is being generated and transmitted. Businesses are now faced with the challenge to not only monitor and analyze this data, but to also contextualize it within web applications or services. As computing capabilities develop, and encroaching advancements such as the increased availability of cloud-computing resources - users will likely see the development of advanced, reactive IoT-driven applications, and have the ability to respond to the context in which it is being used. Technologies integrated with machine learning and decision-supporting AI will unlock another level of important context-aware applications to benefit both businesses and consumers. Ultimately, IoT will accelerate the path to create an environment that can be the epitome of the truly connected world and revolutionize lifestyle in every aspect. (Younan et al., 2020)(Hamad et al.2020)(Qiu et al.2020)

While 5G will drive superfast wireless communication and drive the progress in the IoT sector, AI and machine learning, on the other hand, will drive smart applications that can decide and act once the AI entities are closely integrated with IoT devices. AI today is more robust and capable than ever, translating to IoT being more valuable in today's world than it has ever been. Thus, with breakthroughs apparent, investment in artificial intelligence is growing significantly; around 60% of businesses are now utilizing AI for data-processing. These datasets will inherently come from IoT sensor data due to the wide range of applications it perceives. Since AI thrives on data, the more extensive the information, the better the AI becomes, delivering enhanced quality insights. Early adopters in business are already beginning to take advantage of this as part of its digital transformation projects, underpinning real initiatives in various sectors, demonstrating the potential of integrating IoT and AI. (Wamba-Taguimdje et al.2020)(Bharadiya, 2023)(Kulkov, 2021)

4.3. Ethical Considerations and Regulations

The monumental rise of sensors and connected devices throughout the world has also insinuated a variety of vexing questions in terms of trust, security, responsibility, and transparency. A few years back, security and privacy in the context of IoT were considered as largely solvable through the adoption of competitive markets and the progressive development of technological solutions aimed to mitigate unauthorized data access and privacy breaches. There has been a moderate focus on the ethics of IoT and on the potential long-term consequences of these technologies. However, as the IoT rapidly continues to consolidate in modern life, even though traditional mechanical and hardware safeguards have been undertaken, many major technical and ethical issues still remain unsolved. Moreover, although some substantial efforts have been undergone to apply ethical principles to the societal changes caused by the IoT, a coherent view of these technologies from an ethics perspective is still lacking. The IoT has completely blurred the line between the physical and the digital world, raising several ethical questions, particularly in the form of privacy, freedom, and responsibility. (Atlam & Wills, 2020)(Dhirani et al., 2023)(Narasimhan & Mbero, 2022)

There have been several unwanted data leaks. The healthcare sector was an example of an IoT application that was intended to improve numerous issues with the traditional approach, but the issues turned out completely different than those predicted. Such cases are further deteriorating public trust. To address potential issues to which the IoT is prone, implementation of regulations is very crucial. A highly effective regulation approach needs to be very specific to the particular objectives of the regulations and tailor the regulation carefully to the realities on the ground. In the context of particularly against the Smart Cities, the European Commission recently is also being implemented. Some of the core uses of IoT are under investigation and regulation process, including transport and environment. However, even legal and ethical issues such as data ownership, privacy, security, and environmental impacts are still unclear. Authorities and technology developers are not very clear on how to tackle some of these issues due to the lack of understanding and knowledge of the IoT among the community. A general appropriate legal framework is necessary for the successful, reliable, secure, and manageable IoT. However, in addition to the usual need for regulations that fall within local and regional governance structures, the IoT domain presents three major constraints that are not held in some other ICT (Information and Communication Technology) forms. (Sivakumar et al.2024)(Wilner et al.2021)(Fahey & Hino, 2020)(Saheb et al., 2022)

References:

Jagarlamudi, K. S., Zaslavsky, A., Loke, S. W., Hassani, A., & Medvedev, A. (2022). Requirements, limitations and recommendations for enabling end-to-end quality of context-awareness in IoT middleware. Sensors, 22(4), 1632. mdpi.com

Pradeep, P., Krishnamoorthy, S., & Vasilakos, A. V. (2021). A holistic approach to a context-aware IoT ecosystem with adaptive ubiquitous middleware. Pervasive and Mobile Computing, 72, 101342. [HTML]

Pradeep, P., Krishnamoorthy, S., Pathinarupothi, R. K., & Vasilakos, A. V. (2021). Leveraging context-awareness for Internet of Things ecosystem: Representation, organization, and management of context. Computer Communications, 177, 33-50. [HTML]

Greengard, S. (2021). The internet of things. [HTML]

Tran-Dang, H., Krommenacker, N., Charpentier, P., & Kim, D. S. (2020). Toward the internet of things for physical internet: Perspectives and challenges. IEEE internet of things journal, 7(6), 4711-4736. [HTML]

Lombardi, M., Pascale, F., & Santaniello, D. (2021). Internet of things: A general overview between architectures, protocols and applications. Information. mdpi.com

Zikria, Y. B., Ali, R., Afzal, M. K., & Kim, S. W. (2021). Next-generation internet of things (iot): Opportunities, challenges, and solutions. Sensors. mdpi.com

Alvares, P., Silva, L., & Magaia, N. (2021). Blockchain-based solutions for uav-assisted connected vehicle networks in smart cities: A review, open issues, and future perspectives. Telecom. mdpi.com

Sadeeq, M. M., Abdulkareem, N. M., Zeebaree, S. R., Ahmed, D. M., Sami, A. S., & Zebari, R. R. (2021). IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Academic Journal, 1(2), 1-7. qubahan.com

Booij, T. M., Chiscop, I., Meeuwissen, E., Moustafa, N., & Den Hartog, F. T. (2021). ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet of Things Journal, 9(1), 485-496. [HTML]

Firouzi, F., Farahani, B., & Marin?ek, A. (2022). The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT). Information Systems. [HTML]

Atitallah, S. B., Driss, M., Boulila, W., & Ghézala, H. B. (2020). Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions. Computer Science Review. [HTML]

Rejeb, A., Rejeb, K., Simske, S., Treiblmaier, H., & Zailani, S. (2022). The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet of Things. sciencedirect.com

Bellini, P., Nesi, P., & Pantaleo, G. (2022). IoT-enabled smart cities: A review of concepts, frameworks and key technologies. Applied Sciences. mdpi.com

Sarker, I. H. (2022). AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Computer Science. springer.com

Zavr?nik, A. (2020). Criminal justice, artificial intelligence systems, and human rights. ERA forum. springer.com

Yang, F. & Gu, S. (2021). Industry 4.0, a revolution that requires technology and national strategies. Complex & Intelligent Systems. springer.com

Javaid, M., Haleem, A., Singh, R. P., Rab, S., & Suman, R. (2021). Significance of sensors for industry 4.0: Roles, capabilities, and applications. Sensors International. sciencedirect.com

Shaheen, B. W. & Németh, I. (2022). Integration of maintenance management system functions with industry 4.0 technologies and features—A review. Processes. mdpi.com

Jamwal, A., Agrawal, R., Sharma, M., & Giallanza, A. (2021). Industry 4.0 technologies for manufacturing sustainability: A systematic review and future research directions. Applied Sciences. mdpi.com

Saabye, H., Kristensen, T. B., & W?hrens, B. V. (2020). Real-time data utilization barriers to improving production performance: an in-depth case study linking lean management and Industry 4.0 from a learning …. Sustainability. mdpi.com

Vermesan, O. & Friess, P. (2022). Digitising the Industry Internet of Things Connecting the Physical, Digital and VirtualWorlds. stisippb.ac.id

Behie, S. W., Pasman, H. J., Khan, F. I., Shell, K., Alarfaj, A., El-Kady, A. H., & Hernandez, M. (2023). Leadership 4.0: The changing landscape of industry management in the smart digital era. Process safety and environmental protection, 172, 317-328. [HTML]

Swamy, S. N. & Kota, S. R. (2020). An empirical study on system level aspects of Internet of Things (IoT). IEEE Access. ieee.org

Ayvaz, S. & Alpay, K. (2021). Predictive maintenance system for production lines in manufacturing: A machine learning approach using IoT data in real-time. Expert Systems with Applications. [HTML]

Sgarbossa, F., Grosse, E. H., Neumann, W. P., Battini, D., & Glock, C. H. (2020). Human factors in production and logistics systems of the future. Annual Reviews in Control, 49, 295-305. sciencedirect.com

Apsilyam, N. M., Shamsudinova, L. R., & Yakhshiboyev, R. E. (2024). THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN THE ECONOMIC SECTOR. CENTRAL ASIAN JOURNAL OF EDUCATION AND COMPUTER SCIENCES (CAJECS), 3(1), 1-12. cajecs.com

Ng, K. K., Chen, C. H., Lee, C. K., Jiao, J. R., & Yang, Z. X. (2021). A systematic literature review on intelligent automation: Aligning concepts from theory, practice, and future perspectives. Advanced Engineering Informatics, 47, 101246. ucf.edu

Tyagi, A. K., Fernandez, T. F., Mishra, S., & Kumari, S. (2020, December). Intelligent automation systems at the core of industry 4.0. In International conference on intelligent systems design and applications (pp. 1-18). Cham: Springer International Publishing. [HTML]

Malhotra, P., Singh, Y., Anand, P., Bangotra, D. K., Singh, P. K., & Hong, W. C. (2021). Internet of things: Evolution, concerns and security challenges. Sensors, 21(5), 1809. mdpi.com

Karale, A. (2021). The challenges of IoT addressing security, ethics, privacy, and laws. Internet of Things. [HTML]

Abiodun, O. I., Abiodun, E. O., Alawida, M., Alkhawaldeh, R. S., & Arshad, H. (2021). A review on the security of the internet of things: challenges and solutions. Wireless Personal Communications, 119, 2603-2637. [HTML]

Alabady, S. A., Al-Turjman, F., & Din, S. (2020). A novel security model for cooperative virtual networks in the IoT era. International Journal of Parallel Programming, 48(2), 280-295. [HTML]

VARZANEH, M. R., HABBAL, A., & DAKKAK, O. (2024). FIREWALLS AND INTERNET OF THINGS SECURITY: A SURVEY. Current Trends in Computing, 1(1), 22-43. dergipark.org.tr

Kumar, A., Abhishek, K., Ghalib, M. R., Shankar, A., & Cheng, X. (2022). Intrusion detection and prevention system for an IoT environment. Digital Communications and Networks, 8(4), 540-551. sciencedirect.com

Atlam, H. F. & Wills, G. B. (2020). IoT security, privacy, safety and ethics. Digital twin technologies and smart cities. researchgate.net

Chatterjee, S., Kar, A. K., & Mustafa, S. Z. (2021). Securing IoT devices in smart cities of India: from ethical and enterprise information system management perspective. Enterprise Information Systems. [HTML]

Munoko, I., Brown-Liburd, H. L., & Vasarhelyi, M. (2020). The ethical implications of using artificial intelligence in auditing. Journal of business ethics. academia.edu

Panda, P. K. & Chattopadhyay, S. (2020). A secure mutual authentication protocol for IoT environment. Journal of Reliable Intelligent Environments. researchgate.net

Sun, J., Khan, F., Li, J., Alshehri, M. D., Alturki, R., & Wedyan, M. (2021). Mutual authentication scheme for the device-to-server communication in the Internet of medical things. IEEE Internet of Things Journal, 8(21), 15663-15671. [HTML]

Zheng, Y., Liu, W., Gu, C., & Chang, C. H. (2022). PUF-based mutual authentication and key exchange protocol for peer-to-peer IoT applications. IEEE Transactions on Dependable and Secure Computing. ntu.edu.sg

Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., & Markakis, E. K. (2020). A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues. IEEE Communications Surveys & Tutorials, 22(2), 1191-1221. ieee.org

Veale, M., & Zuiderveen Borgesius, F. (2021). Demystifying the Draft EU Artificial Intelligence Act—Analysing the good, the bad, and the unclear elements of the proposed approach. Computer Law Review International, 22(4), 97-112. [PDF]

Brown, R., & Pressley, M. (2023). Self-regulated reading and getting meaning from text: The transactional strategies instruction model and its ongoing validation. In Self-regulation of learning and performance (pp. 155-179). Routledge. [HTML]

Magaia, N., Fonseca, R., Muhammad, K., Segundo, A. H. F. N., Neto, A. V. L., & de Albuquerque, V. H. C. (2020). Industrial internet-of-things security enhanced with deep learning approaches for smart cities. IEEE Internet of Things Journal, 8(8), 6393-6405. [HTML]

Syed, A. S., Sierra-Sosa, D., Kumar, A., & Elmaghraby, A. (2021). IoT in smart cities: A survey of technologies, practices and challenges. Smart Cities. mdpi.com

Javed, A. R., Shahzad, F., ur Rehman, S., Zikria, Y. B., Razzak, I., Jalil, Z., & Xu, G. (2022). Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects. Cities, 129, 103794. techrxiv.org

Martin, T., Geneiatakis, D., Kounelis, I., Kerckhof, S., & Nai Fovino, I. (2020). Towards a formal IoT security model. Symmetry, 12(8), 1305. mdpi.com

Cirne, A., Sousa, P. R., Resende, J. S., & Antunes, L. (2022). IoT security certifications: Challenges and potential approaches. Computers & Security. github.io

Iqbal, W., Abbas, H., Daneshmand, M., Rauf, B., & Bangash, Y. A. (2020). An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet of Things Journal, 7(10), 10250-10276. [HTML]

Chanal, P. M. & Kakkasageri, M. S. (2020). Security and privacy in IoT: a survey. Wireless Personal Communications. researchgate.net

Emami-Naeini, P., Dheenadhayalan, J., Agarwal, Y., & Cranor, L. F. (2021, May). Which privacy and security attributes most impact consumers’ risk perception and willingness to purchase IoT devices?. In 2021 IEEE Symposium on Security and Privacy (SP) (pp. 519-536). IEEE. nsf.gov

Chiara, P. G. (). The IoT and the new EU cybersecurity regulatory landscape. International Review of Law. tandfonline.com

Karie, N. M., Sahri, N. M., Yang, W., Valli, C., & Kebande, V. R. (2021). A review of security standards and frameworks for IoT-based smart environments. IEEE Access, 9, 121975-121995. ieee.org

Gupta, B. B., & Quamara, M. (2020). An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946. [HTML]

Derks, D., Bakker, A. B., & Gorgievski, M. (2021). Private smartphone use during worktime: A diary study on the unexplored costs of integrating the work and family domains. Computers in Human Behavior. sciencedirect.com

Thulin, E., & Vilhelmson, B. (2022). Pacesetters in contemporary telework: How smartphones and mediated presence reshape the time–space rhythms of daily work. New Technology, Work and Employment, 37(2), 250-269. wiley.com

Lutz, S., Schneider, F. M., & Vorderer, P. (2020). On the downside of mobile communication: An experimental study about the influence of setting-inconsistent pressure on employees' emotional well-being. Computers in Human Behavior. [HTML]

Laroui, M., Nour, B., Moungla, H., Cherif, M. A., Afifi, H., & Guizani, M. (2021). Edge and fog computing for IoT: A survey on current research activities & future directions. Computer Communications, 180, 210-231. sciencedirect.com

Mijuskovic, A., Chiumento, A., Bemthuis, R., Aldea, A., & Havinga, P. (2021). Resource management techniques for cloud/fog and edge computing: An evaluation framework and classification. Sensors, 21(5), 1832. mdpi.com

Salaht, F. A., Desprez, F., & Lebre, A. (2020). An overview of service placement problem in fog and edge computing. ACM Computing Surveys (CSUR). hal.science

Cai, X., Geng, S., Wu, D., Cai, J., & Chen, J. (2020). A multicloud-model-based many-objective intelligent algorithm for efficient task scheduling in internet of things. IEEE Internet of Things Journal, 8(12), 9645-9653. [HTML]

Serhani, M. A., El-Kassabi, H. T., Shuaib, K., Navaz, A. N., Benatallah, B., & Beheshti, A. (2020). Self-adapting cloud services orchestration for fulfilling intensive sensory data-driven IoT workflows. Future Generation Computer Systems, 108, 583-597. [HTML]

Kurt Peker, Y., Rodriguez, X., Ericsson, J., Lee, S. J., & Perez, A. J. (2020). A cost analysis of internet of things sensor data storage on blockchain via smart contracts. Electronics, 9(2), 244. mdpi.com

Savazzi, S., Nicoli, M., & Rampa, V. (2020). Federated learning with cooperating devices: A consensus approach for massive IoT networks. IEEE Internet of Things Journal. [PDF]

Alifah, Q., & Kusumawati, N. (2022, March). Determining Determinants and Barriers that Influence Smart Home Appliances Adoption Intention Using the Behavioral Reasoning Theory Method. In Proceedings of the 4th International Conference on Economics, Business and Economic Education Science, ICE-BEES 2021, 27-28 July 2021, Semarang, Indonesia. eudl.eu

Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences. mdpi.com

Younan, M., Houssein, E. H., Elhoseny, M., & Ali, A. A. (2020). Challenges and recommended technologies for the industrial internet of things: A comprehensive review. Measurement. researchgate.net

Hamad, S. A., Sheng, Q. Z., Zhang, W. E., & Nepal, S. (2020). Realizing an internet of secure things: A survey on issues and enabling technologies. IEEE Communications Surveys & Tutorials, 22(2), 1372-1391. mq.edu.au

Qiu, T., Chi, J., Zhou, X., Ning, Z., Atiquzzaman, M., & Wu, D. O. (2020). Edge computing in industrial internet of things: Architecture, advances and challenges. IEEE Communications Surveys & Tutorials, 22(4), 2462-2488. google.com

Wamba-Taguimdje, S. L., Fosso Wamba, S., Kala Kamdjoug, J. R., & Tchatchouang Wanko, C. E. (2020). Influence of artificial intelligence (AI) on firm performance: the business value of AI-based transformation projects. Business Process Management Journal, 26(7), 1893-1924. researchgate.net

Bharadiya, J. P. (2023). A comparative study of business intelligence and artificial intelligence with big data analytics. American Journal of Artificial Intelligence. researchgate.net

Kulkov, I. (2021). The role of artificial intelligence in business transformation: A case of pharmaceutical companies. Technology in Society. sciencedirect.com

Dhirani, L. L., Mukhtiar, N., Chowdhry, B. S., & Newe, T. (2023). Ethical dilemmas and privacy issues in emerging technologies: a review. Sensors. mdpi.com

Narasimhan, V. L. & Mbero, Z. A. (2022). Internet of Things (IoT): Their Ethics and Privacy Concerns. ICT and Data Sciences. [HTML]

Sivakumar, C. L. V., Mone, V., & Abdumukhtor, R. (2024). Addressing privacy concerns with wearable health monitoring technology. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1535. [HTML]

Wilner, A. S., Luce, H., Ouellet, E., Williams, O., & Costa, N. (2021). From public health to cyber hygiene: Cybersecurity and Canada’s healthcare sector. International Journal, 76(4), 522-543. sagepub.com

Fahey, R. A. & Hino, A. (2020). COVID-19, digital privacy, and the social limits on data-focused public health responses. International Journal of Information Management. nih.gov

Saheb, T., Sabour, E., Qanbary, F., & Saheb, T. (2022). Delineating privacy aspects of COVID tracing applications embedded with proximity measurement technologies & digital technologies. Technology in Society. nih.gov

要查看或添加评论,请登录

社区洞察