Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review.
Lucas PfannenbergFlorian SchützSarah GronemannEylert Spils ad WilkenKristin MasuchSimon TrangPublished in: WEB (2022)
Keyphrases
- literature review
- case study
- security problems
- service providers
- key management
- security services
- location information
- current issues
- fuzzy theory
- mobile payment
- context aware
- information systems development
- security issues
- business opportunities
- service management
- information security
- ubiquitous computing
- management system
- web services
- access control
- security requirements
- security policies
- service oriented
- intrusion detection
- cloud computing
- end users
- security mechanisms
- service composition
- design science
- product information
- knowledge management
- smart objects
- service quality
- business models
- big data
- data management
- public libraries
- public key infrastructure