IoT Security Adoption into Business Processes: A Socio-Technical View

被引:0
|
作者
Kavyashree, G. C. [1 ]
Karimi-Alaghehband, Forough [2 ]
Ozgun, Desiree [1 ]
机构
[1] Univ Lancaster, Management Sch, Lancaster, England
[2] HEC Montreal, Montreal, PQ, Canada
来源
关键词
Internet of Things; IoT aware business process; Socio-Technical approach; IoT security; INTERNET; THINGS; PRIVACY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, the Internet of Things (IoT) has gained huge focus and has led to the generation of valuable data to create new value propositions for organisations. It is important to explore the impact these developments have on our society. IoT security is identified as the key issue amongst all the IoT applications and presents numerous social and technical challenges. We conducted interviews with IoT experts and the results illustrated how holistic security issues in IoT are undermined and to further emphasize the importance of addressing these issues by accommodating security into IoT business processes. This approach facilitated the assessment and identification of security threats from both social and technical perspectives. Our outcome highlights that IoT security must be implemented into IoT aware business processes to make the technology human centered, despite the challenges involved.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] An Ecosystemic and Socio-Technical View on Software Maintenance and Evolution
    Mens, Tom
    32ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2016), 2016, : 1 - 8
  • [22] Developing a Socio-technical framework for business-IT alignment
    Lee, Sang M.
    Kim, Kihyun
    Paulson, Patrick
    Park, Hyesung
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2008, 108 (09) : 1167 - 1181
  • [23] A Socio-Technical View on Policy Analysis: a Case Study
    Grau, Marc
    Inguez-Rueda, Lupicio
    Subirats, Joan
    POLITICA Y SOCIEDAD, 2008, 45 (03): : 199 - 217
  • [24] Holistic security requirements analysis for socio-technical systems
    Li, Tong
    Horkoff, Jennifer
    Mylopoulos, John
    SOFTWARE AND SYSTEMS MODELING, 2018, 17 (04): : 1253 - 1285
  • [25] A Socio-Technical Methodology for the Security and Privacy Analysis of Services
    Bella, Giampaolo
    Curzon, Paul
    Giustolisi, Rosario
    Lenzini, Gabriele
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 401 - 406
  • [26] Managing Security Requirements Conflicts in Socio-Technical Systems
    Paja, Elda
    Dalpiaz, Fabiano
    Giorgini, Paolo
    CONCEPTUAL MODELING, ER 2013, 2013, 8217 : 270 - +
  • [27] Holistic security requirements analysis for socio-technical systems
    Tong Li
    Jennifer Horkoff
    John Mylopoulos
    Software & Systems Modeling, 2018, 17 : 1253 - 1285
  • [28] Special issue on socio-technical aspects in security - editorial
    Gross, Thomas
    Vigano, Luca
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (03) : 325 - 326
  • [29] Preserving compliance with security requirements in socio-technical systems
    Salnitri, Mattia
    Paja, Elda
    Giorgini, Paolo
    Communications in Computer and Information Science, 2014, 470 : 49 - 61
  • [30] Modelling the Enemies of an IT Security System - A Socio-Technical System Security Model
    Kowalski, Stewart
    Mwakalinga, Jeffy
    IMCIC'11: THE 2ND INTERNATIONAL MULTI-CONFERENCE ON COMPLEXITY, INFORMATICS AND CYBERNETICS, VOL I, 2011, : 251 - 256