Professional Documents
Culture Documents
Ibrahim Group
Ibrahim Group
ON TOPIC
BY
GROUP 8
S/NO NAMES REG NO
1. IBRAHIM MARK 2107031047
2. MUSA FATIMAT ZAHARA 2107031043
3. SANI USMAN MUHAMMAD 2107031044
4. BULUS KENNETH SANI 2107031045
5. ABDULAZEEZ BELLO 2107031046
6. SHARHABILU AWALI 2107031048
OCTOBER , 2023
ABSTRACT
1
The Internet of Things (IoT) has had a considerable influence on our daily lives by
enabling enhanced connection of devices, systems, and services that extends beyond
machine-to-machine interactions and encompasses a wide range of protocols,
domains, and applications. However, despite privacy concerns shown by IoT users,
little has been done to reduce and protect individual information exposure. It is
extremely difficult to mitigate IoT devices from identification threats which is why it is still
a major challenge for IoT users to securely protect their information. The trust controls
how we regulate privacy in our IoT platforms in the same way that it governs personal
relationships. As IoT devices become increasingly linked, more data is shared across
individuals, businesses, governments, and ecosystems. Technologies, sensors,
machines, data, and cloud connections all rely largely on trust relationships that have
been formed. With the rapid growth of additional types of IoT devices that are being
introduced, it, therefore, expands privacy concerns and is difficult to develop trust with
an IoT system or device without the option to regulate information privacy settings.
Privacy has always been a barrier for many devices as they race for the early adoption
of IoT technologies. Several Internet of Things devices or systems will continue to pose
privacy threats. As a result, the main objective of this study was to examine the
individual understanding of privacy and to promote information privacy protection
awareness not only to IoT users but also to organizations that use IoT devices or
platforms to run their day-to-day business operations. Furthermore, the objective
extends to compare user knowledge and concerns about IoT privacy, as well as to
identify any common attitudes and variances. However, in terms of enhancing
individuals’ knowledge, an artifact was developed to educate and enhance information
privacy awareness among IoT users.
2
1.0 INTRODUCTION
The rapid rise of the Internet of Things (IoT) raises pressing privacy concerns despite its
possible benefits. IoT devices can collect vast quantities of granular data about
individuals’ daily habits and activities. The data that these devices can collect include
consumption rate data, location data, and health-related data, among other things. IoT
objects, such as smart rings and thermometers, have also been used in COVID-19
pandemic relief efforts (Eadicicco, 2020; Gardner, 2020). Companies’ traditional data
business models have historically enabled “surveillance capitalism”, the goal of which is
to “predict and modify human behavior as a means to produce revenue and market
control” (Zuboff, 2019). If left unchecked, the increasing volume and variety of IoT data
in conjunction with traditional and nascent business models, may lead to an expansion
of surveillance capitalism with even more far-reaching consequences. Zuboff, (2019)
3
1.2 DIFFERENCE BETWEEN PRIVACY AND SECURITY
Privacy and security are two different but connected concepts.
Privacy is concerned with the usage and control of personal data, such as establishing
policies to guarantee individuals’ personal information is gathered, shared, and utilized
in appropriate ways.
Security is primarily concerned with safeguarding data from malicious assaults
and profiteering from stolen data.
4
1.4 SIGNIFICANCE OF THE STUDY
Data protection is of paramount significance in the context of the Internet of Things (IoT) due to
several reasons:
1. Privacy Concerns: IoT devices collect and transmit a vast amount of data, often
including sensitive personal information. Protecting this data is essential to safeguard
the privacy of individuals using IoT devices.
2. Security: IoT devices are often vulnerable to cyberattacks due to their limited computing
power and the diversity of devices connected to the internet. Data protection measures
are crucial to prevent unauthorized access to and manipulation of data.
3. Legal Compliance: Many regions have enacted data protection regulations, such as the
General Data Protection Regulation (GDPR) in Europe and the California Consumer
Privacy Act (CCPA) in the United States. IoT deployments must comply with these
regulations to avoid legal consequences.
4. Trust and Adoption: Ensuring the security and privacy of IoT data is vital for building
trust among users and consumers. Without trust, the widespread adoption of IoT
technologies could be hindered.
5. Business Reputation: Data breaches or misuse can severely damage a company's
reputation. Protecting IoT data is necessary to maintain the trust of customers and
stakeholders.
5
2.0 LITERATURE REVIEW
In general terms, as heterogeneous devices become part ofthe IoT network, new
security threats will emerge. IoT device manufacturers should take these protective
measures into account and extend them to the entire network of devices, not just their
individual devices. A. Rayes, S. Salam, (2019)
Some recent examples come from the United States which is not a leading country
in developing the digital economy and investing into the smart home hardware. In
September 2018, the California legislature in the United States passed a law that
imposes new restrictions on the number of IoT devices sold in the country. Unite Stats
Congress also introduced a bill (H.R. 2222) and an amendment to the National Defense
Authorization Act (NDAA), which proposes that the Commerce Department conduct a
study of the IoT industry and make recommendations for the secure growth of IoT
devices . IoT security hacks happen but the extensive work was built in this industry and
it helps to draft a code of conduct for consumer IoT security.
2.1 DATA PROTECTION IN THE INTERNET OF THINGS
For government agencies such as the Federal Trade Commission, the European
Union's General Data Protection Regulation (GDPR) protects privacy and data security
This includes, inter alia, adopting best practices in the areas of data protection and
security, collecting consumer information only with the explicit consent of consumers
and providing access to their data only after their consent. B. Di Martino, M. Rak, M.
Ficco, (2020)
There are various cloud-based mobility platforms that make it easy for companies to
securely manage and optimize IoT deployment. IoT needs security, which is why we
have developed tools and expertise to reduce risks through responsible development of
IoT applications. In addition, it is committed to collecting personal information that is
consistent with the privacy and security of its customers’ personal information. IoT
devices and the data processing activities associated with the operation of IoT are the
responsibility of the United States Department of Homeland Security (DHS), as they
tend to process personal data. It is clear that solutions and privacy are built into the
design of their products, and the ability to incorporate data subject to these rights into
their design. Bozorgi X. Gao, (2019)
6
2.2 PRIVACY IN THE INTERNET OF THINGS
IoT provides users with a strong technical background and management over how to
carry out ordinary duties by blanketing the environment with smart items [27]. Smart
objects are slightly different computer devices such as embedded systems, sensor
systems, and actuators which can disseminate and share data to facilitate positive
interactions and rational choice creation in the Internet of Things [28]. Things are
embedded in consumer devices and industrial machinery to collect and transmit
environmental data. Smart objects can also cause physical changes in their
environment and be controlled locally or remotely via the Internet. The privacy concerns
addressed in the study which are applied to every IoT user are illustrated with examples
that are related to smart appliances which are connected to devices. Further, the rate at
which the users of smart devices are developed is out spaced by the rate that is
protective for obtaining solutions that protect the information with the help of
technologies. Despite the abundance of the Internet of Things and its impact on our
daily lives, we must fully understand the threats and challenges they pose to our
privacy. M. Cohen, (2019)
Data gathering technologies in the IoT ecosystem have resulted in new privacy
problems. Obtaining consent for data collection is one of these problems, as allowing
users to manage, personalize, and choose the data they provide, and ensuring that the
use of such data is confined to the stated purpose. These issues are exacerbated by
the increasing risk of personal information misuse in the IoT sphere. This is due to the
widespread tracking of habits, actions, and whereabouts throughout time. IoT
technologies bring new dangers to personal safety. The development of the digital
computer has allowed the advance of some fields like statistics, while IoT has enhanced
communication, information exchange, and collecting. P. Tabesh, E. Mousavidin, S.
Hasani, (2019)
7
3.0 METHODOLOGY
This section indicates the methods used to discourse the focal research question and
achieve the objectives indicated in the preceding sections. The research onion in Figure
2 illustrates the study methodological approach that leads to the development of a
concrete research theory by addressing each critical stage involved in the process.
The research onion contains other two essential elements which are deductive and
inductive. Within positivism methods, data is evaluated first, important patterns are
accustomed to inform the generation of findings, and the inductive approach may be
employed successfully. In contrast to the deductive approach, the inductive strategy
allows one to create their own theory rather than employing one that already exists. The
8
inductive approach is characterized by a move from the precise to the broad, which is
why this study opted for it.
4.0 DISCUSSION
9
5.0 CONCLUSION
10
11
REFERENCES
A. Rayes, S. Salam, (2019)Internet of Things from hype to reality, Springer,328 p.
awareness for network threats in fog/edge computing: Emerging paradigms beyond the
security perimeter model.
B. Di Martino, M. Rak, M. Ficco, (2020)A. Esposito, Future Generation Computer
Systems 85 (235-249. DOI: https://doi.Org/l 0.1016/j.fii- ture.2018.04.007
Bozorgi X. Gao, (2019)A review of building information modeling (BIM) and the internet
of things (IoT) devices integration: Present status and future trends, Automation in
Construction 101 127-139. DOI:
Eadicicco, (2020); A review of building information modeling (BIM) and the internet of
things (IoT) devices integration: Present status and future trends, Automation in
Construction 101 127-139. DOI:
Gardner, (2020) Big data and service operations, Production and Operations
Management 27(9) 1709- 1723. DOI: https://dolorg/l0.1111/poms.l2832
M. Cohen, (2019) Big data and service operations, Production and Operations
Management 27(9) 1709- 1723. DOI: https://dolorg/l0.1111/poms.l2832
P. Tabesh, E. Mousavidin, S. Hasani, (2019) Implementing big data strategies: A
managerial perspective. Business Horizons 62(3) 347-358 DOI:
https://doi.Org/10.1016/j.bushor.2019.02.001
S. Maisto, S. Nacchia, (2018) Internet of things reference architectures, security and
interoperability: A survey, Internet of Things 1 99-112. DOI:
W. Strielkowski, D. Streimikiene, A. Fomina, E. Semenova, Internet of energy (IoE) and
high-renewa- bles electricity system market design. Energies 12(24) (2019)
4790. DOI: https://doi.org/10.3390/enl2244790
Zuboff, (2019) Internet of Things from hype to reality, Springer,328 p.
12