Conference Paper

Internet of Things (IoT) Security Risks: Challenges for Business

Authors:
  • Al Qasimia University
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Superior knowledge enables organizations to make critical choices about situations they face. As a result, is necessary to identify and understand the role of the major Industry 4.0 technologies in the KM process and recommending measures to help organizations benefit from digital transformation [9]. ...
... Systems based on the IoT make it possible to conduct analyses and share information and knowledge in real time. As a result, the IoT guarantees that enterprises have access to data of a high quality, which enables enhanced decision-making processes [9]. ...
Chapter
The purpose of this study is to discuss the role of Industry 4 (I4) technologies in Knowledge Management (KM). Industry 4 has the ability to enhance business processes and industrial operations. This study recognizes and discusses the opportunities for enterprises using I4 technology. Data was gathered from peer-reviewed academic publications found in databases like Scopus and Google Scholar. Moreover, the study highlights the roles of artificial intelligence, internet of things, cloud computing, and blockchain technology in KM. These technologies have the potential to enhance KM activities such as data collection and gathering, storage, knowledge exchange, and application. Third, this paper presents an overview of KMin the UAE and the potential use of industry 4 technology in this area. Future research should concentrate on different implementation issues and techniques to overcoming them. Evaluating case studies of Industry 4 technology can assist us in better understanding the problems.
... The scholarly study focuses on increasing the usage of VANET network services [3], which is important in developing public safety applications for sharing information between vehicles and RSUs [4,5]. Cloud computing services have also been employed for their ability to improve the use of real-time applications [6][7][8] by facilitating the interchange of data and shared resources across the Internet and intranet [9] (vehicles and RSUs located on the side of the road). It also includes a database and applications required to organize traffic and exchange valuable information and data in the network (for example, location, speed, vehicle data, and a simulation file of the vehicle's record within two years). ...
... The researcher discussed the importance of information transferred between cars regarding road safety and traffic conditions, as well as how trust is created between vehicles to maintain the integrity and trustworthiness of the reports received-the occasion [20]. The Internet of Things (IoT) has been utilized in VANETs to broadcast information about vehicles , such as their positions, speeds, and detailed data about them to improve the safety field [8,21]. The study discussed many communication techniques in VANETs, such as V2x Vehicle-to-Everything, V2I Vehicle-to-Infrastructure, and Vehicle-to-Infrastructure. ...
Article
Full-text available
This paper discusses the creation of an integrated worldwide system based on integrating and linking automobiles with VANET, IoT, and AI technologies, which will have a substantial impact on the smart, safe transportation system. This paper aims to apply a proposed project to a specific area in Jordan to examine the project's viability and its impact on reducing the accident rate by controlling traffic with special traffic rules in the study area using a cloud database that stores all the private information for each car and receives information about the car's speed as it travels. When a driver exceeds the speed established by the Traffic Department, he receives warning messages informing him that he has over the speed limit, and if he does not respond to the warning messages, he gets a fine. The research focuses on optimizing the utilization of VANET network services, which is crucial for enhancing public safety applications involving data exchange between automobiles and RSUs. The simulation was conducted using OMNeT++ version 5.7 on Debian 11, Linux 5, and GNOME 3 operating systems. As a network simulator, it is a scientifically approved open-source tool .
... The fast growth of technology and cyberspace has had a good influence on our lives and provided numerous conveniences; yet, due to the ever-changing nature of the internet, dangers and cyber-attacks are becoming more widespread. Hackers and crackers use malevolent and aggressive conduct to obtain access to computer systems or networks, which are according to [5] spear phising, Identifying vulnerabilties, and eavesdropping, and more [6], [7]. ...
... The terms related to IoT are M2M (Machine-to-Machine) and WSN (Wireless-Sensor-Network). Thanks to IoT, there will come a time when not only machines with humans but also machines with machines will share information and develop. IoT has ushered in a new era of wireless devices [7]. Smartphones, smart homes, smart worlds are all benefits of IoT technology [4]. ...
Chapter
Full-text available
IoT is a thing that dispenses technically credible solutions to all the problems of our daily life. Due to IoT’s welfare, the present world has moved afar the scope of human ability. For good efficiency, the popularity of IoT is increasing much more than ever and its use in different sectors has increased. This has resulted in an unprecedented shift in investment in IoT and the total number of related IoT devices. The role of IoT is immense in this period of modern-day change and revolution. From the analysis of this paper, we can get the idea about the past, present, future of IoT, investment on IoT, and challenges that may be IoT face.
Article
The data collected by sensors in Internet of Things (IoT) plays a crucial role in achieving predictive analysis, resource optimization, and other related applications. However, it vulnerability to network attacks during transmission raises the issue of data authenticity, which hinders its utilization. Data authentication technology can be used to address this puzzle. Nevertheless, current solutions still need improvement in terms of security and efficiency. The centralized authentication schemes may suffer from single point of failure or center corruption. And existing decentralized solutions only achieved individual authentication, which is not efficient in distributed collection system. In this work, we present a new decentralized batch data authentication approach, named blockchain-assisted efficiency and secure data authentication scheme (BAESDA), to enable distributed authentication of multiple sensors’ data at once. BAESDA integrates a novel data authentication protocol and a smart contract based on homomorphic hash. The novel data authentication protocol based on hash chain is intended for sensors with limited computation, storage and communication to ensure the data authenticity and confidentiality, and enables the gateways to swiftly verify and aggregate the authentication messages. The data authentication contract is designed to efficiently achieve decentralized batch data authentication on the blockchain. Furthermore, the abnormal gateways can be identified by proposed abnormal data detection algorithm. Finally, we conduct a thorough security analysis for BAESDA, evaluate the proposed authentication protocol through simulation experiments, and deploy the proposed smart contracts on the Hyperledger Fabric 2.4.1 for testing. The results indicate that our solution is secure and efficient.
Article
Full-text available
In today's computer technology environment, the effect of IT plays a significant part in all real-time systems. Various management systems are in place to help the company organization achieve profit, standards, and future commercial growth. The VMS is important for monitoring how many visitors are there, what the objective of the facility visit will be, and who will be put in the block listed record due to rule violation. This technology also protects the building's overall security. The goal of this system is to synchronize the organization's business and visitors in order to achieve a wonderful connection among organizations globally. The background was compiled from many papers that discussed similar subjects and were connected to the system. In addition, the limitations and analyses of the present system have been addressed in order to demonstrate the organization's demands for a new system. In part three, we will go through the project planning, covering the feasibility study, Gantt chart, and software methodology in specific stages. Stepping on functional and non-functional requirements of the system, it is covered in the same chapter, as well as the system steps in the implementation part of section four, and finally with clear and direct conclusion and recommendations in section five with future work of the visitor management system, which will be added after the system is implanted in the organization and other related organizations.
Article
Full-text available
The purpose of this article is to explore the strategic value, resources, and capabilities of information systems, as well as their effect on financial performance in the Jordanian hotel business Design/methodology/approach-The research was carried out on a representative sample of Jordanian hotel establishments. It uses the framework developed by Bharadwaj as a guide to assist firms in addressing the management of information systems and developing a better competency in that area. Research limitations/implications-This study contributes to the establishment of a new framework of analysis in the literature on information systems management by introducing a perspective of analysis for the study of the strategic deployment of information systems attributes that is based on the resource-based view of the hospitality industry. This perspective of analysis is used in the study of the strategic deployment of information systems attributes. Practical implications-This paper provides a useful framework for beginning the diagnosis of the situation of each hotel in terms of its available information systems resources and capabilities, as well as for identifying and selecting the information systems resources and capabilities that make the greatest contributions to the profitability and quality of the hotel. Originality/value-In order to determine which information systems resources and competencies are most significant in the creation of unique hotel competences, this effort will assist in identifying those that are most important.
Article
Full-text available
The objectives of this study are multifold: to investigate the functionality of hotel websites through a content review and to gauge customer perceptions of the value of hotel website design. To conduct the study, hotel websites were combed for numerical and visual information. Providers of information are evaluated based on their unique and comprehensive expertise measurements. The research is based on two key components: a report on all 37 five-star hotels in Jordan that analyzes their website layout in terms of population, and a survey of 100 hotel guests to ascertain how they interpret hotel websites. This proposed study is the first of its kind, with the objective of establishing a methodology for evaluating all hotel measurements provided by hotel websites. The following are the findings: When the independent variable (marketing orientation) has a value of T = 7.519, the coefficient of simple linear regression has statistical significance (Customer Orientation). The fact that "Aqaba Zone Advertising and Customer Oriented Classified Hotels have a statistically significant effect on their categorization" is acknowledged, as "Aqaba Zone Advertising and Customer Oriented Classified Hotels have a significant effect on the coefficient of simple linear regression equation" (0.605). As a result, hotel management may employ a specific predictive evaluation model to analyze their hotels' websites from two perspectives: that of the management team and that of the consumers. For the first time, this analysis brings together claims from both perspectives (hotel managers and clients).
Article
Full-text available
The Internet of Things (IoT) is one of the most widely used technologies today, and it has a significant effect on our lives in a variety of ways, including social, commercial, and economic aspects. In terms of automation, productivity, and comfort for consumers across a wide range of application areas, from education to smart cities, the present and future IoT technologies hold great promise for improving the overall quality of human life. However, cyber-attacks and threats greatly affect smart applications in the environment of IoT. The traditional IoT security techniques are insufficient with the recent security challenges considering the advanced booming of different kinds of attacks and threats. Utilizing artificial intelligence (AI) expertise, especially machine and deep learning solutions, is the key to delivering a dynamically enhanced and up-to-date security system for the next-generation IoT system. Throughout this article, we present a comprehensive picture on IoT security intelligence, which is built on machine and deep learning technologies that extract insights from raw data to intelligently protect IoT devices against a variety of cyber-attacks. Finally, based on our study, we highlight the associated research issues and future directions within the scope of our study. Overall, this article aspires to serve as a reference point and guide, particularly from a technical standpoint, for cybersecurity experts and researchers working in the context of IoT.
Article
Full-text available
How to cite this paper: Alqaraleh, M. H., Almari, M. O. S., Ali, B. J. A., & Oudat, M. S. (2022). The mediating role of organizational culture on the relationship between information technology and internal audit effectiveness. Corporate Governance and Organizational Behavior Review, 6(1), 8-18. Internal audit effectiveness has become critical in helping businesses achieve their objectives. In today's business world, information technology (IT) is frequently used in internal audit activities. Internal auditing is an important part of an organization's control. Because internal audit and information technology play such important roles in each firm, this study looks at the function of organizational culture (OC) in mediating the link between the efficacy of information technology and internal audit in the Jordanian public sector. The study looks at this issue by gathering information from 153 internal auditors in Jordanian public enterprises. According to the findings of the study, information technology use and OC support are critical to increasing the efficacy of internal audits. The findings indicate that there is a considerable association between information technology and the efficacy of internal audits. Additionally, organizational culture has a key role in mediating the link between information technology and the success of internal audits. Future studies may examine managerial support and internal audit compliance. Authors' individual contribution: Conceptualization-M.H.A.; Formal Analysis-B.J.A.A.; Investigation-M.S.O.; Data Curation-M.H.A.; Writing-Review & Editing-M.O.S.A.; Funding Acquisition-M.
Article
Full-text available
Often businesses do not capitalize on any of the possible advantages of Management Information Systems (MIS). Today, the growing growth of IT and its significant impact on the competitiveness of public and private organizations around the world, as well as the global push to use various forms of information systems, namely Management Information System (MIS), has caused developed countries to follow suit. According to the results, most organizations are shifting toward a greater competitive value of MIS. As a result, MIS administrators take a holistic approach to MIS and prioritize issues impacting the whole company over those affecting only the MIS department. The current study clarified the position, goal, function, meaning, philosophy, dimensions, advantages, and classification of MIS, as well as the organizations' challenges and barriers.
Article
Full-text available
Web scraping or web crawling refers to the procedure of automatic extraction of data from websites using software. It is a process that is particularly important in fields such as Business Intelligence in the modern age. Web scrapping is a technology that allow us to extract structured data from text such as HTML. Web scrapping is extremely useful in situations where data isn’t provided in machine readable format such as JSON or XML. The use of web scrapping to gather data allows us to gather prices in near real time from retail store sites and provide further details, web scrapping can also be used to gather intelligence of illicit businesses such as drug marketplaces in the darknet to provide law enforcement and researchers valuable data such as drug prices and varieties that would be unavailable with conventional methods. It has been found that using a web scraping program would yield data that is far more thorough, accurate, and consistent than manual entry. Based on the result it has been concluded that Web scraping is a highly useful tool in the information age, and an essential one in the modern fields. Multiple technologies are required to implement web scrapping properly such as spidering and pattern matching which are discussed. This paper is looking into what web scraping is, how it works, web scraping stages, technologies, how it relates to Business Intelligence, artificial intelligence, data science, big data, cyber securityو how it can be done with the Python language, some of the main benefits of web scraping, and what the future of web scraping may look like, and a special degree of emphasis is placed on highlighting the ethical and legal issues. Keywords: Web Scraping, Web Crawling, Python Language, Business Intelligence, Data Science, Artificial Intelligence, Big Data, Cloud Computing, Cybersecurity, legal, ethical.
Article
Full-text available
Often businesses do not capitalize on any of the possible advantages of Management Information Systems (MIS). Today, the growing growth of IT and its significant impact on the competitiveness of public and private organizations around the world, as well as the global push to use various forms of information systems, namely Management Information System (MIS), has caused developed countries to follow suit. According to the results, most organizations are shifting toward a greater competitive value of MIS. As a result, MIS administrators take a holistic approach to MIS and prioritize issues impacting the whole company over those affecting only the MIS department. The current study clarified the position, goal, function, meaning, philosophy, dimensions, advantages, and classification of MIS, as well as the organizations' challenges and barriers. © 2021,Academy of Strategic Management Journal. All rights reserved.
Article
Full-text available
In the COVID-19 and post-pandemic business environment, leveraging robust Internet of Things (IoT) security risk management strategies becomes of particular importance to IoT adopters. Thus, given that no research study was found to exclusively focus on the current state of IoT security risk management strategies in organizations, this article aims to support IoT security practitioners to peer benchmark and enhance their IoT security risk management strategies. In a nutshell, this study relies on a mixed methods research methodology, and its main contribution is the determination of the current state of the IoT security risk management strategies in the surveyed organizations relative to our IoT Security Risk Management Strategy Reference Model (IoTSRM2). Hence, this study entails designing and conducting a survey, analyzing survey responses, and reporting survey results based on our IoTSRM2 and proposed three-phased survey methodology. Furthermore, before discussing the related work, this article provides our survey results for the surveyed large and small-medium organizations, the surveyed large organizations, and the surveyed large Technology, Media, and Telecom (TMT) organizations. For instance, our results reveal that while most surveyed organizations perform IoT risk assessments and focus on IoT infrastructure resilience, they fail in strategizing IoT governance and risk management, among others.
Article
Full-text available
Smart cities would depend on digital technologies that have the potential ahead where Blockchains would perform significantly. Blockchains has become popular because it offers adequate security than other solutions for a wide range of purpose. Blockchains can support the growth of smart cities due to their robust features like transparent, reliable, authenticate, and decentralized features. At present, big cities are utilizing sophisticated technologies with knowledge platforms to evaluate the quality of life of their residents. Society participation and dedication grow when humans are even more committed to responding with and being adaptable at some stage in their metropolis authorities and responding in an established way to personal problems. Big data, IoT, and Blockchain would accelerate and extend its government services, capacity, and even reduces costs and provides exciting opportunities like transportation services, exchanging services, healthcare services, etc. This study shows the reviews and importance of Blockchain in futuristic smart cities.
Article
Full-text available
Data science is a combination of several disciplines that aims to get accurate insights from a bunch of data, develop the technology, and algorithm to solve the complicated problems analytically. Today, data science plays a massive role in our life, and researchers realise how it is essential. Numerous research studies on data science have been published in recent years, but each focus on specific issues, such as data science and its impact on business, manufacturing, academia, and healthcare. This paper will present a roadmap of data science to benefit the readers to know about this field and realise how it is essential in several areas. In addition, it clarifies the mechanism of how data science work and what are the capabilities of the data scientist to be able to work in this field. It also shows the trends and future work of data science.
Article
Full-text available
This study aimed to identify the impact of administrative empowerment on applying continuous improvement in the Aqaba Special Economic Zone Authority. To achieve this, the researcher developed and evaluated a questionnaire and distributed it to a sample of 400 employees. A set of (321) copies of the questionnaire was retrieved, while (9) copies were rejected due to lack of information. The researcher used statistical methods (descriptive and analytical) to answer the study questions, test, and analyze its hypotheses. The results of the study showed that the application of administrative empowerment represented by its dimensions (Sharing Information, Autonomy and Freedom of Action, Reinforcement, work teams) impacted continuous improvement in the dimensions of PDCA in terms of dimensions (Plan, Do, Check, Act) In Aqaba Special Economic Zone Authority. This indicates that the administrative practices, instructions, and guidelines of the researched organization aim to achieve an increase in continuous improvement with a "high" positive degree. The study recommended establishing a center to train the employees to use the system. In addition to the need to make the required changes in the organizational structure by selecting experienced 1682 employees' work teams to execute jobs more. Finally, the study concluded that there must be a long-term commitment to continuous improvement and applying more administration tools.
Article
Full-text available
Aim/Purpose: The study aims at investigating to know the effect of artificial intelligence (AI) on the quality and interpretation of financial statements in the hotels classified in the Aqaba Special Economic Zone (ASEZA) in Aqaba, Jordan. Methodology: To achieve this aim a questionnaire was distributed to a sample consisted of 172 employees. The researchers used the questionnaire to find out the opinions of the sample of the study, after having viewed the theoretical literature related to the subject of the study, whether it was provided in references or in scientific journals and theses. This study is an exploratory, analytical study and follows the approach of collecting and analysing data to draw conclusions. The researchers used the arithmetic mean, standard deviation, T-test and ANOVA test to measure the level of importance for the study questions. Findings: the results of a simple linear regression analysis of the effect of artificial intelligence applied in Jordanian hotels on the integration of accounting information systems, and that the correlation between artificial intelligence and integration of accounting information systems is R=0.596%, and that the percentage is explained by the application of applied artificial intelligence in Jordanian hotels where (R2) reached 0.355% of the variance of the dependent variable (accounting information systems integration). It also shows that the fixed limit value amounted to 2.060, and that the value of (Beta) for the independent variable "artificial intelligence" applied in the accounting systems in Jordanian hotels reached 0.596. Implications & Recommendations: This study offers a deeper understanding of the role of clarifies how artificial intelligence works creatively with accounting systems to help managers in hotel establishments produce high-quality accounting information through reduce information risks. Contribution & Value Added: This research leads to a comprehensive and systemic exploration of the degree to which hospitality and tourism scholars are aware of business intelligence It is the first comprehensive literature analysis of business intelligence and artificial intelligence (AI) in hospitality and tourism study on the consistency and perception of financial statements classified in the Aqaba Special Economic Zone (ASEZA) in Aqaba.
Article
Full-text available
The need for AIS adoption for enhancing financial sustainability among the commercial banks is yet to be directly explored in view of investigating its effect on these listed organisational constructs. This review investigates the impact of accounting information systems on Banks financial sustainability. The primary goal is to review the conceptual and theoretical foundations, as well as the empirical literature, relating to accounting information systems and firm financial performance. The review's findings reveal that previous research into the impact of financial performance accounting information have limited their work to the cost implications of the accounting information system as they relate to the financial performance of companies. However, in spite of the significance emergence of AIS, there is still inconsistent result that evaluates the effects of AIS on financial sustainability. This review also found that most studies used the survey research design to investigate this relationship, and the majority of studies in advanced economies were carried out in large measure with computerized accounting systems methods. Therefore, this review encourages further studies to address the literature gap.
Article
Full-text available
Recently, mobile commerce started to attract the interest of workers in the commercial sector for ease of application, where people can buy and sell items using the internet on a mobile phone. Therefore, this research aims to investigate the extent of citizens' confidence and trust in m-commerce. The study reveals how m-commerce process over time changes the role of trading from the traditional way to the electronic one. The objective of this study is to determine the impact of trust, ease of use on satisfaction in m-commerce among citizens. Data of this research was collected from teaching staff, employees, and students and they numbered 216, the result indicates that there is a positive relationship between research model variables and that all antecedents affected citizens toward the satisfaction of m-commerce.
Article
Full-text available
The Internet of Things (IoT) is a key technological trend for the digital transformation of organizations, boosting existing information and communication technologies or the deployment of new IoT solutions to improve their business models. Decision-making IoT adoption in small and medium enterprises is a complex task led by the Chief Information Officer (CIO). The deployment of IoT solutions is affected by permanent technological change in the ICT sector. That implies high investment costs by organizations due to the acquisition of technology, maintenance of technology, training of employees for the appropriate use of each technology, and expensive contracts with the Internet of Things providers for the execution of IoT projects. This paper presents four technological variables that affect decision-making IoT adoption in small and medium enterprises based on the Technology-Organization-Environment Model (TOE). The role of the CIO in supporting the digital transformation of SMEs and the complexity of IoT adoption are highlighted.
Article
Full-text available
Clustering is a promising technique to manage network resources efficiently and, in vehicular communications it is used to group vehicles with similar characteristics managed by a selected vehicle called a Cluster Head (CH). Due to the highly dynamic topology in vehicular networks, a CH selection process becomes a challenging task. Thus, this paper presents a new clustering scheme, namely, Efficient Cluster Head Selection (ECHS) scheme to select the most suitable CHs. The proposed ECHS scheme introduces important conditions pertaining to the methods deployed in constructing clusters before starting the CH selection. For instance, based on the ECHS rules the ideal CH is the one that centralizes the cluster. This is because it will remain connected as long as possible with its neighbors. The ECHS scheme also guarantees proper clustering distribution in the network, so that the distance between two consecutive clusters are adjusted carefully. Such conditions are guaranteed to effectively cluster vehicles in the road and make the ECHS scheme works better than its counterpart. Simulation experiments are conducted to examine the performance of the ECHS and the results demonstrate that the ECHS scheme achieves the design objectives in terms of CH lifetime, Cluster Member Lifetime (CML), Packet Loss Ratio(PLR), Overhead for Clustering(OC), Average Packet Delay (APD), and Cluster Number (CN).
Article
Full-text available
The IoT (Internet of Things) can transform businesses by automating processes ranging from inventory management to robotics to automation, saving time, and money. However, can small businesses benefit from the IoT? This article explores the emerging role of the IoT in small businesses, the impact on their ability to compete in a rapidly changing digital environment, and their awareness, attitudes, perceptions, and willingness to adopt it. The research utilizes an initial exploratory approach based on a review of case studies in the literature, interviews with several economic development personnel and a few small and medium-size business managers. Benefits from the use of the IoT include increased efficiency in operations and reduced costs in businesses. The medium-size businesses interviewed have verified these benefits. However, the majority of economic development personnel and small businesses interviewed did not have much or any awareness of what IoT technologies were or their potential benefits.
Article
Full-text available
The Internet of Things (IoT) paradigm refers to the network of physical objects or "things" embedded with electronics, software, sensors, and connectivity to enable objects to exchange data with servers, centralized systems, and/or other connected devices based on a variety of communication infrastructures. IoT data collected from different sensors, nodes and collectors are transferred to the cloud over the internet. IoT devices are used by consumers, healthcare, businesses as well as by the governments. It is being forecast that 31 billion IoT devices will be deployed all over the world by the year 2020. As the use of IoT devices is increasing every moment several IoT vulnerabilities are introduced. The results and analysis indicate that massive deployment of IoT with an integration of new technologies are introducing new security challenges in IoT paradigm. In this paper, IoT security challenges and open issues are discussed which provides a ground for future research.
Conference Paper
Full-text available
Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new computing developments, development of the technology is usually much faster than consideration for, and development of, solutions for security and privacy. In a previous paper, we proposed that a unikernel solution could be used to improve security and privacy in a cloud scenario. In this paper, we outline how we might apply this approach to the Internet of Things, which can demonstrate an improvement over existing approaches.
Conference Paper
Full-text available
The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved. Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT.
Article
Full-text available
Internet of Things (IoT) has provided a promising opportunity to build powerful industrial systems and applications by leveraging the growing ubiquity of radio-frequency identification (RFID), and wireless, mobile, and sensor devices. A wide range of industrial IoT applications have been developed and deployed in recent years. In an effort to understand the development of IoT in industries, this paper reviews the current research of IoT, key enabling technologies, major IoT applications in industries, and identifies research trends and challenges. A main contribution of this review paper is that it summarizes the current state-of-the-art IoT in industries systematically.
Article
Full-text available
Design and operation of a manufacturing enterprise involve numerous types of decision-making at various levels and domains. A complex system has a large number of design variables and decision-making requires real-time data collected from machines, processes, and business environments. Enterprise systems (ESs) are used to support data acquisition, communication, and all decision-making activities. Therefore, information technology (IT) infrastructure for data acquisition and sharing affects the performance of an ES greatly. Our objective is to investigate the impact of emerging Internet of Things (IoT) on ESs in modern manufacturing. To achieve this objective, the evolution of manufacturing system paradigms is discussed to identify the requirements of decision support systems in dynamic and distributed environments; recent advances in IT are overviewed and associated with next-generation manufacturing paradigms; and the relation of IT infrastructure and ESs is explored to identify the technological gaps in adopting IoT as an IT infrastructure of ESs. The future research directions in this area are discussed.
Article
Full-text available
The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers,potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.
Chapter
Industry is a leading application domain for the Internet of Things. The promise of the technology is expected to revolutionize manufacturing as we know it and influence application domains like transport, health, and energy with the models that are emerging. In this chapter, we present the evolution of the Industrial Internet of Things (IIoT) through efforts in Europe and the USA, we review the related reference architectures, and we describe applications and challenges.
The Ultimate List of Internet of Things Statistics for 2022
  • J Steward
Steward, J., The Ultimate List of Internet of Things Statistics for 2022. 2022: https://findstack.com/internet-of-things-statistics/.
The IoT trend has already presented opportunities for network operators … Yet
  • frost
The 2018 SANS industrial IoT security survey: shaping IIoT security concerns
  • filkins
Filkins, B. and D. Wylie, The 2018 SANS industrial IoT security survey: shaping IIoT security concerns. Corpus ID, 2018. 51842821.
Industry 4.0: Security imperatives for IoT-Converging networks, increasing risks
  • bligh-wall
Bligh-Wall, S., Industry 4.0: Security imperatives for IoT-Converging networks, increasing risks. Cyber security: a peerreviewed journal, 2017. 1(1): p. 61-68.
Internet of Things (IoT) Security Vulnerabilities: A Review
  • ramadan
Ramadan, R., Internet of Things (IoT) Security Vulnerabilities: A Review. PLOMS AI, 2022. 2(1).
The Mediating Role of Organizational Culture On the Relationship Between Information Technology and Internal Audit Effectiveness. Corporate Governance and Organizational Behavior Review
  • M H Alqaraleh
Alqaraleh, M.H., et al., The Mediating Role of Organizational Culture On the Relationship Between Information Technology and Internal Audit Effectiveness. Corporate Governance and Organizational Behavior Review, 2022. 6(1).
The IoT trend has already presented opportunities for network operators …Yet, telecommunications companies are increasingly expected to deliver IoT connectivity that is secure
  • Sullivan Frost
Frost and Sullivan, The IoT trend has already presented opportunities for network operators …Yet, telecommunications companies are increasingly expected to deliver IoT connectivity that is secure. 2018.
Accounting Information System And Financial Sustainability Of Commercial And Islamic Banks: A Review Of The Literature
  • ali
The Strategic Deployment of Information Systems Attributes and Financial Performance in The Hospitality Industry
  • O Jawabreh