The research can be about anything. I will need some form of data included.Sections- Abstract, introduction, literature review, method, and conclusion. It doesn't have to follow this method but it...

1 answer below »
The research can be about anything. I will need some form of data included.Sections- Abstract, introduction, literature review, method, and conclusion. It doesn't have to follow this method but it should be something like this.
Answered 12 days AfterOct 29, 2021

Answer To: The research can be about anything. I will need some form of data included.Sections- Abstract,...

Shubham answered on Nov 01 2021
114 Votes
Running Head: HOW INTERNET OF THINGS IMPACTS DATA PROTECTION?    1
HOW INTERNET OF THINGS IMPACTS DATA PROTECTION?            20
HOW INTERNET OF THINGS IMPACTS DATA PROTECTION?
Abstract
The current research topic is on – “How internet of things impacts data protection? It aims to understand the Internet of Things and the potential risks associated with it. The research mainly concentrates on the wide usage of IoT in our daily life and the ways, in which it is going to affect our future. This will help to know what kind of threats humans are expose to and its influence on data protection on security. The research is derived from study of expert work due to restrictions on mobility amid pandemic. It is also found that being naïve topic this research has potential in extensive research.
Table of Contents
Abstract    2
Introduction    6
Introduction    6
Background of the Study    6
Problem Statement    6
Rationale of the Research    7
Research Objectives    7
Literature Review    8
Characteristics    8
Connectivity:    8
Intelligence and Identity:    8
Scalability:    8
Dynamics of Changes:    8
Desi
gn and Architecture:    9
Safety:    9
Trends in 2021 for IoT    9
Work-From-Home (WFH):    9
Retail Sector:    9
Healthcare:    10
Edge Computing:    10
5G:    11
Future of IoT    11
Privacy and Security Issues    12
Consumer Privacy:    12
Tracking:    13
Innovation:    13
Cybersecurity:    13
Emergence of Clod-of-Things:    14
Research Methodology    15
Types of Investigation    15
Data Collection Method    15
Reliability and Validity of the Data    15
Accessibility Issues    16
Ethical Considerations    16
Discussion and Findings    17
Conclusion    20
Conclusion    20
Recommendations    20
Confidentiality and Integrity    20
Compliances and Audit Control    20
Authentication and Authorization    21
Limitation of the Research    21
Future Scope of Study    21
References    22
Introduction
Introduction
The Coca-Cola vending machine was the first connected device situated at the Carnegie Melon University and operated by local programmers. John Romkey connected a toaster to the internet for the first time with a TCP/IP protocol in 1990. One year later, University of Cambridge scientists came up with the idea to use the first web camera prototype to monitor the amount of coffee available in their local computer lab’s coffee pot.
Later, Kevin Ashton is known for coining the term “the internet of things” in 1999. In 2010, IoT boom was noted with emerging technologies. Since then there is no looking back as interconnected devices became the trend.
Background of the Study
IoT stands for Internet of Things. It means everything is connected to the internet. Simple sensors, wearable, smartphones and other smart devices are connected with automated systems (Dai, Zheng and Zhang, 2019). Their purpose is to gather and collect information, which will be further used to create actions. Devices, networks and data will be communicating with others reducing silos and creating a connected world.
With this security and privacy risks, naturally come into existence access to personal and private information will be given by the end users. This will help companies to impersonate the user profile to associate the features such as buying behavior, interest, habit and location.    
Problem Statement
Everything which on the internet or connected to internet can be hacked. This indicates towards lesser user control over information they are sharing. User’s activities such as their search, operating personal account, pictures and contacts are being tracked by companies. No doubt, that this information can be traded with third parties for technology based research and understanding user’s profile (Nord, Koohang & Paliszkiewicz, 2019). They use to enhance user’s experience and the products by improving quality, efficiency and their performance. This data could be stolen also, which could give rise to other potential threats. The data can be reason why a false profile of user is floating on platform to lure others.
Rationale of the Research
Internet of things is a new age concept, which is gaining popularity among users. With this the amount of exposure to cyber threats, it is bringing with it cannot be denied. Companies are collecting data aggressively so that they communicate with the customers, transmit data to parties who are researching and creating big data as a future prospect for making money (Li, Da Xu & Zhao, 2018). This increased connectivity raises a myriad of consumer privacy and data security issues. Government agencies, such as the Federal Trade Commission, are concerned with issues such as data security, mobile privacy, and big data.
This shows that they are preserving privacy in their data centers so that it can be used in future without any legal complications. The reason is through smart devices they have already gained the consent of the user (Dai, Zheng and Zhang, 2019). With Pervasive Computing (PerC) the four basic design principles" including privacy, transparency, open access, and publicity said to be vulnerable exposed.
Research Objectives
· To critically evaluate the concept of Internet of Things and the trends in its domain
· To analyze its use and the way it is impact daily lives of humans
· To recognize the potential threats it is causing to data protection
· To identify the ways through which the impact of privacy and security concerns can be minimized
Literature Review
Characteristics
As per Vogel, Kajtazi, Bugeja and Varshney (2020), some characteristics of IoT have been identified. Various literature available on the topic support the following comprehensive list of characteristics, which describe different dimensions, related to usage and security.
Connectivity:
IoT is known as Internet of Things because all devices, which can access internet, can be connected on a single platform. This creates an infrastructure for global communication. In order to make sense it is important that all things be connected to the Internet irrespective what time of the day it is, what their location is and who is connecting to it.
Intelligence and Identity:
Data can be extracted for information interpretation but it will prove to be useful only if it is done in right manner. Therefore, the devices in IoT world are heterogeneous. They can connect to each other through different platforms and networks as well.
Scalability:
There is no minimum number for devices to be connected. As a result, this network is on expansion with each passing day. The data generation is on enormous side and required proper handling.
Dynamics of Changes:
The connected devices are changing their status on a regular basis such as available, no available, connected or disconnected, along with their location, speed and the number of users who use that particular device.
Design and Architecture:
IoT systems and infrastructure design is important to study as it is a hybrid system. Users, networks and devices also constitute its part. Therefore, it should have a support function from manufacturers.
Safety:
No doubt when systems are interconnected on a huge network it is obvious that sensitive personal information can be compromised. According to Wachter (2018), data security is a challenge, which the company is facing with time. It has also exposed the IoT networks and ecosystems to huge risk.
Trends in 2021 for IoT
Work-From-Home (WFH):
Amidst the pandemic, the culture of work from home has become the new normal. Companies and employees are leveraging these opportunities because safety concerns are of prime importance at the moment. With AI-powered personal assistants such as Alexa now installed in many of the homes, As per Tardia (2019), it can be expected that more applications designed to help people manage their day while working remotely. There are others sectors such as logistics, automobile, industrial and manufacturing, which require physical presence, are witnessing remote monitoring and can be alert employees when their intervention is required.
Retail Sector:
Supermarkets and stores are gaining efficiency through online management. The future of shopping groceries, clothes has been changed by e-commerce industry. Medicines and other daily utilities are new addition to it. Lee and Kim (2018), suggests that Amazon and other similar brands are expected to launch fully automated stores encouraging cashless mobility and society.
Non-essential and non-vital communication will be cut down and IoT enabled devices will take over the market dynamics. They will fulfill the requests by placing orders and scheduling dispatch. RFID tags are been introduced and their usage is guided detrimentally because they are tools track customer movements and goods.
Healthcare:
With IoT in practice, Healthcare is exposed to high investments. Smart wearable, dependency applications, automated home help, telemedicine are its new gifts to humanity. It is prove to be useful when due to contamination less contact is required. For example, the emergency wards of hospitals, which are more prone to infections due to cases.
The devices are interconnected with the technology so that health of the patients can be monitored even if they are discharged (Wang, Qiu, Sangaiah, Xu & Liu, 2019). This reduces the physical visits to hospital and virtual tracking of patient’s health have become possible. On the other hand, it has become a threat to protect the management of such devices as any mal practice any lead to death of the patient’s life.
Edge Computing:
The speed of adaptation to new technologies and striving continuously to develop new ones, which can be merged with IoT to increase its effectiveness, is on the go. Researchers such as Crabtree et al. (2018) believed that with edge computing it would be easy to do cloud analysis and extraction of information by the devices itself. This will save finances and carbon emission towards environment (Stoyanova, Nikoloudakis, Panagiotakis, Pallis & Markakis, 2020).
Privacy and steward stewardship have gained importance during this time because outbreak detection and contact tracing are high due to post-Covid precautions. New norms for processing information are rigorously worked upon and computing techniques are taking their place in regular practices.
5G:
The biggest support functions for IoT, which will suggest variety of connectivity options. While 5G is set for commercial availability sometime around 2020, the industry is already working to develop new global standards and pre 5G products to benefit industries everywhere (Tardia, 2019).
Its unique combination of high-speed connectivity, very low latency, and ubiquitous coverage will support smart vehicles and transport infrastructure such as connected cars, trucks, and buses, where a split second delay could mean the difference between a smooth...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here