Abstract
The concept and applications of the Internet of Things or IoT are well-known to those dealing with the technicalities and complexities of IoT. However, for most users, the understanding seems to be limited to the benefits and usability of the devices. In particular, grasping the privacy, security and other relevant issues, especially social issues, remains out of reach for most users. This paper addresses the problem of privacy, security and other relevant issues from users’ perspective and suggests three areas needing greater attention in resolving the issues. First, this paper highlights social issues and emphasizes the role of business leaders in dealing with the issues surrounding IoT devices. This paper argues that the onus and obligation lie with the business leaders as social architects to perform their duty of care in a socially responsible manner. Second, IoT is simply an IS product in which people and their views are one of the key elements for achieving the common goal, in this case, of networking of things and people. Ignoring the role of end-users as a critical part of IoT does not help achieve the common purpose. Lastly, given the transnational nature of the issue, governments worldwide are essential stakeholders and hence need to have a proactive and positive approach in the fight against the use of IoT for cybercrimes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aldahiri, A., Alrashed, B., Hussain, W.: Trends in using IoT with machine learning in health prediction system. Forecasting 3(1), 181–206 (2021)
Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., Salah, K.: A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th international conference on computer systems and applications (AICCSA), pp. 1–8. IEEE, October 2018
Atlam, H., Wills, G.: IoT security, privacy, safety and ethics. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital Twin Technologies and Smart Cities. IT, pp. 123–149. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-18732-3_8
Brown, D.: Cybercrime is Dangerous, But a New UN Treaty Could Be Worse for Rights (2021). https://www.hrw.org/news/2021/08/13/cybercrime-dangerous-new-un-treaty-could-be-worse-rights
Chacko, A., Hayajneh, T.: Security and privacy issues with IoT in healthcare. EAI Endorsed Trans. Pervasive Health Technol. 4(14) (2018)
Coetzee, L., Eksteen, J.: The Internet of Things - promise for the future? An introduction. In: 2011 IST-Africa Conference Proceedings, pp. 1–9. IEEE, May 2011
Davenport, T.H., Barth, P., Bean, R.: How big data is different (2012)
Electronic Privacy Information Centre (n.d.). Equifax Data Breach https://epic.org/privacy/data-breach/equifax/
Escamilla-Ambrosio, P.J., Rodríguez-Mota, A., Aguirre-Anaya, E., Acosta-Bermejo, R., Salinas-Rosales, M.: Distributing computing in the internet of things: cloud, fog and edge computing overview. In: Maldonado, Y., Trujillo, L., Schütze, O., Riccardi, A., Vasile, M. (eds.) NEO 2016. SCI, vol. 731, pp. 87–115. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-64063-1_4
Gao, H., Qin, X., Barroso, R.J.D., Hussain, W., Xu, Y., Yin, Y.: Collaborative learning-based industrial IoT API recommendation for software-defined devices: the implicit knowledge discovery perspective. IEEE Trans. Emerging Top. Comput. Intell. 6, 667–6 (2020)
Hussain, W., Merigo, J.M., Gao, H., Alkalbani, A.M., Rabhi, F.A.: Integrated AHP-IOWA, POWA framework for ideal cloud provider selection and optimum resource management. IEEE Trans. Serv. Comput. (2021a)
Hussain, W., Merigó, J.M., Raza, M.R.: Predictive intelligence using ANFIS‐induced OWAWA for complex stock market prediction. Int. J. Intell. Syst. (2021b)
Hussain, W., Merigó, J.M., Raza, M.R., Gao, H.: A new QoS prediction model using hybrid IOWA-ANFIS with fuzzy c-means, subtractive clustering and grid partitioning. Inf. Sci. 584, 280–300 (2021c)
Hussain, W., Sohaib, O., Naderpour, M., Gao, H.: Cloud marginal resource allocation: a decision support model. Mob. Networks Appl. 25(4), 1418–1433 (2020)
Kwak, B.I., Han, M.R., Kang, A.R., Kim, H.K.: A study on detection methodology of threat on cars from the viewpoint of IoT. J. Korea Inst. Inf. Secur. Cryptol. 25(2), 411–421 (2015)
Labong, R.C.: Identity theft protection strategies: a literature review. J. Acad. Res. 4(2), 1–12 (2019)
Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A.: IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182–8201 (2019)
Muralidharan, E., Pathak, S.: Sustainability, transformational leadership, and social entrepreneurship. Sustainability 10(2), 567 (2018)
New Zealand’s Exchange: Independent reports on NZX IT and cybersecurity completed (2020). https://www.nzx.com/announcements/364459
Nicholson, J., Kurucz, E.: Relational leadership for sustainability: building an ethical framework from the moral theory of ‘ethics of care.’ J. Bus. Ethics 156(1), 25–43 (2019)
Papavasiliou, S.J.: A digital transformation governance framework for eGovernment: a systemic approach. Doctoral dissertation (2020)
Petrakis, E.G., Sotiriadis, S., Soultanopoulos, T., Renta, P.T., Buyya, R., Bessis, N.: Internet of things as a service (ITAAS): challenges and solutions for management of sensor data on the cloud and the fog. Internet Things 3, 156–174 (2018)
Rathore, M.M., Ahmad, A., Paul, A., Rho, S.: Urban planning and building smart cities based on the Internet of things using big data analytics. Comput. Netw. 101, 63–80 (2016)
Raza, M.R., Varol, A., Hussain, W.: Blockchain-based IoT: an overview. Paper presented at the 2021 9th International Symposium on Digital Forensics and Security (ISDFS) (2021)
Showkat, D., Som, S., Khatri, S.K., Ahluwalia, A.S.: Security implications in IoT using authentication and access control. In: 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 689–694. IEEE, August 2018
Siddique, J., Joseph, P.: The social architect: a new framework for effective activism and social leadership. Cadmus 4(4) (2021)
Tambunan, S.B., Lores, L., Muda, I.: Factors influencing the establishment of ISO 17799 standards. In: Proceedings of the International Conference of Science, Technology, Engineering, Environmental and Ramification Researches (ICOSTEERR 2018)-Research in Industry 4.0, pp. 1290–1295 (2020)
Tanford, S., Baloglu, S., Erdem, M.: Travel packaging on the internet: the impact of pricing information and perceived value on consumer choice. J. Travel Res. 51(1), 68–80 (2012)
Weber, R.H.: Internet of things: privacy issues revisited. Comput. Law Secur. Rev. 31(5), 618–627 (2015)
Wright, D., Meadows, D.H.: Thinking in systems. Earthscan (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ali, A., Hussian, W. (2022). Challenges and Issues of the Internet of Things: Factoring Elements from the Social, Political and Information Systems. In: Hussain, W., Jan, M.A. (eds) IoT as a Service. IoTaaS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 421. Springer, Cham. https://doi.org/10.1007/978-3-030-95987-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-95987-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-95986-9
Online ISBN: 978-3-030-95987-6
eBook Packages: Computer ScienceComputer Science (R0)