User values and the development of a cybersecurity public policy for the IoT

被引:8
|
作者
Smith, Kane J. [1 ]
Dhillon, Gurpreet [1 ]
Carter, Lemuria [2 ]
机构
[1] Univ N Carolina, Informat Syst & Supply Chain Management Dept, 516 Stirling St, Greensboro, NC 27412 USA
[2] Univ New South Wales, Sch Informat Syst Technol & Management, Sydney, NSW, Australia
关键词
IoT; Cyber security; Policy planning; Public values; Strategic objectives; Qualitative research; INTERNET; SECURITY; SCIENCE; THINGS;
D O I
10.1016/j.ijinfomgt.2020.102123
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Public administrators, entrusted to develop public policy to manage the growing complexities of the IoT, face significant challenges. The challenges exist because of three reasons; First, there is a lack of policy direction. Second, user values related to cybersecurity are not well understood. Third, there is a lack of clarity as to how IoT public policy should be developed. In this paper we argue that new IoT policy should be guided by key stakeholder values (i.e. what users think to be important). We utilize the Public Value Forum to elicit public values to inform decision-making surrounding IoT policy by public administrators, conceptually informed by Rational choice theory. We use a five-phase process to introduce the decision context (i.e. the policy problem), define fundamental objectives, rank these objectives, identify value-based trade-offs between them and construct a multi-attribute utility model. The findings indicate several key themes for IoT security from the citizens themselves and decision-making administrators in diverse public agencies developing IoT cybersecurity public policy.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] The cybersecurity in development of IoT embedded technologies
    Usmonov, Botir
    Evsutin, Oleg
    Iskhakov, Andrei
    Shelupanov, Alexander
    Iskhakova, Anastasia
    Meshcheryakov, Roman
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND COMMUNICATIONS TECHNOLOGIES (ICISCT) - APPLICATIONS, TRENDS AND OPPORTUNITIES, 2017,
  • [2] Public values and public policy
    Keeney, RL
    [J]. DECISION SCIENCE AND TECHNOLOGY: REFLECTIONS ON THE CONTRIBUTIONS OF WARD EDWARDS, 1999, : 291 - 312
  • [3] Cultural values and public policy: The case of international development aid
    Ball, Richard
    [J]. QUARTERLY REVIEW OF ECONOMICS AND FINANCE, 2010, 50 (01): : 3 - 16
  • [4] CORRECTIONAL POLICY AND PUBLIC VALUES
    DUFFEE, D
    RITTI, RR
    [J]. CRIMINOLOGY, 1977, 14 (04) : 449 - 460
  • [5] Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior
    AlQadheeb, Arwa
    Bhattacharyya, Siddhartha
    Perl, Samuel
    [J]. ARRAY, 2022, 14
  • [6] Development of a South African Cybersecurity Policy Implementation Framework
    van Vuuren, Joey Jansen
    Leenen, Louise
    Phahlamohlaka, Jackie
    Zaaiman, Jannie
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY (ICIW-2013), 2013, : 106 - 115
  • [7] Cybersecurity Analysis of IoT Networks
    Horalek, Josef
    Sobeslav, Vladimir
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT II, 2019, 11684 : 488 - 499
  • [8] Tides of Blockchain in IoT Cybersecurity
    Ahakonye, Love Allen Chijioke
    Nwakanma, Cosmas Ifeanyi
    Kim, Dong-Seong
    [J]. SENSORS, 2024, 24 (10)
  • [9] NIST Cybersecurity for IoT Program
    Megas, Katerina
    Cuthill, Barbara
    Fagan, Michael
    Watrobski, Paul
    Defranco, Joanna F.
    [J]. Computer, 2024, 57 (12) : 144 - 148
  • [10] End User Development in the IoT: a Semantic Approach
    Roffarello, Alberto Monge
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENVIRONMENTS (IE 2018), 2018, : 107 - 110