Reference Hub3
Internet of Things and Security Perspectives: Current Issues and Trends

Internet of Things and Security Perspectives: Current Issues and Trends

ISBN13: 9781522522966|ISBN10: 1522522964|EISBN13: 9781522522973
DOI: 10.4018/978-1-5225-2296-6.ch002
Cite Chapter Cite Chapter

MLA

Kasemsap, Kijpokin. "Internet of Things and Security Perspectives: Current Issues and Trends." Security Breaches and Threat Prevention in the Internet of Things, edited by N. Jeyanthi and R. Thandeeswaran, IGI Global, 2017, pp. 19-45. https://doi.org/10.4018/978-1-5225-2296-6.ch002

APA

Kasemsap, K. (2017). Internet of Things and Security Perspectives: Current Issues and Trends. In N. Jeyanthi & R. Thandeeswaran (Eds.), Security Breaches and Threat Prevention in the Internet of Things (pp. 19-45). IGI Global. https://doi.org/10.4018/978-1-5225-2296-6.ch002

Chicago

Kasemsap, Kijpokin. "Internet of Things and Security Perspectives: Current Issues and Trends." In Security Breaches and Threat Prevention in the Internet of Things, edited by N. Jeyanthi and R. Thandeeswaran, 19-45. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2296-6.ch002

Export Reference

Mendeley
Favorite

Abstract

This chapter reveals the overview of the Internet of Things (IoT); the IoT, Wireless Sensor Networks (WSNs), and Radio Frequency Identification (RFID); the technology of the IoT; the IoT and security concerns; the information security aspects of the IoT; the applications of the IoT in modern health care; and the implications of the IoT in the digital age. Organizations can utilize the IoT to gain the considerable cost savings by improving asset utilization, enhancing process efficiency, and increasing productivity in global operations. However, the IoT has its own challenges, such as the privacy of personal data, the lack of compatibility, and security breach. The chapter argues that utilizing the IoT and security techniques has the potential to enhance organizational performance and meet security requirements toward threat prevention in global operations.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.