Reference Hub1
Internet of Things, Security of Data, and Cyber Security

Internet of Things, Security of Data, and Cyber Security

ISBN13: 9781799893127|ISBN10: 179989312X|ISBN13 Softcover: 9781668448915|EISBN13: 9781799893134
DOI: 10.4018/978-1-7998-9312-7.ch007
Cite Chapter Cite Chapter

MLA

Rosário, Albérico Travassos. "Internet of Things, Security of Data, and Cyber Security." Achieving Full Realization and Mitigating the Challenges of the Internet of Things, edited by Marcel Ohanga Odhiambo and Weston Mwashita, IGI Global, 2022, pp. 148-185. https://doi.org/10.4018/978-1-7998-9312-7.ch007

APA

Rosário, A. T. (2022). Internet of Things, Security of Data, and Cyber Security. In M. Odhiambo & W. Mwashita (Eds.), Achieving Full Realization and Mitigating the Challenges of the Internet of Things (pp. 148-185). IGI Global. https://doi.org/10.4018/978-1-7998-9312-7.ch007

Chicago

Rosário, Albérico Travassos. "Internet of Things, Security of Data, and Cyber Security." In Achieving Full Realization and Mitigating the Challenges of the Internet of Things, edited by Marcel Ohanga Odhiambo and Weston Mwashita, 148-185. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-9312-7.ch007

Export Reference

Mendeley
Favorite

Abstract

Diverse forms of cyber security techniques are at the forefront of triggering digital security innovations, whereas cybersecurity has become one of the key areas of the internet of things (IoT). The IoT cybersecurity mitigates cybersecurity risk for organizations and users through tools such as blockchain, intelligent logistics, and smart home management. Literature has not provided the main streams of IoT cyber risk management trends, to cross referencing the diverse sectors involved of health, education, business, and energy, for example. This study aims to understanding the interplay between IoT cyber security and those distinct sector issues. It aims at identifying research trends in the field through a systematic bibliometric literature review (LRSB) of research on IoT cyber and security. The results were synthesized across current research subthemes. The results were synthesized across subthemes. The originality of the paper relies on its LRSB method, together with extant review of articles that have not been categorized so far. Implications for future research are suggested.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.