Emerging "cyber hygiene" practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security.
Jo Ann OravecPublished in: ProComm (2017)
Keyphrases
- security problems
- security issues
- security and privacy issues
- location information
- cyber security
- personal data
- cloud computing
- security mechanisms
- big data
- data security
- rfid systems
- privacy concerns
- management system
- security risks
- information security
- smart objects
- privacy issues
- mobile computing
- statistical databases
- identity theft
- personal information
- security requirements
- security threats
- key management
- user privacy
- security concerns
- privacy preserving
- data privacy
- geospatial information
- access control
- security services
- physical world
- information leakage
- third party
- privacy policies
- sensitive data
- social media
- cyber crime
- ethical issues
- trusted third party
- electronic payment
- cyber defense
- rfid technology
- intrusion detection
- cyber attacks
- smart grid
- private information
- location based services
- preserving privacy
- ubiquitous computing
- mobile devices
- data mining
- authentication protocol
- critical infrastructure
- sensitive information
- key technologies
- data management
- web services