首页 > 最新文献

IEEE Internet Things Mag.最新文献

英文 中文
Liability: When Things Go Wrong in an Increasingly Interconnected and Autonomous World: A European View 责任:在一个日益相互联系和自治的世界中,当事情出错时:欧洲人的观点
Pub Date : 2018-12-01 DOI: 10.1109/miot.2018.8717593
J. S. Marcus
The Internet of Things (IoT) potentially offers society not only economic advantage but also gains in product quality and safety. At the same time, IoT (in conjunction with related technologies such as artificial intelligence and machine learning, to which we collectively refer as IoT/AI/ML) may open new potential product safety and liability exposures. What problems might be anticipated? Are potential exposures dealt with adequately by existing legal and policy measures, or do they call for some re-thinking of existing law and regulation? The European Union (EU) has adopted a common approach to two key groups of policy instruments in order to facilitate trade of goods and services throughout the EU: (1) product safety regulation, which establishes standards to which goods must conform; and (2) liability regulation, which enables consumers to recover their costs if they are harmed or injured due to a malfunctioning product (or potentially a defective service). Both are important, but our focus here is on liability.
物联网(IoT)不仅可以为社会带来经济优势,还可以提高产品质量和安全性。与此同时,物联网(结合人工智能和机器学习等相关技术,我们统称为IoT/AI/ML)可能会带来新的潜在产品安全和责任风险。可能会出现哪些问题?现有的法律和政策措施是否充分处理了潜在的风险,或者是否需要对现有的法律和法规进行重新思考?为了促进整个欧盟的货物和服务贸易,欧洲联盟(EU)对两组关键政策工具采用了共同的方法:(1)产品安全法规,规定了货物必须符合的标准;(2)责任规定,如果消费者因产品故障(或可能有缺陷的服务)而受到伤害或伤害,消费者可以收回成本。两者都很重要,但我们这里的重点是责任。
{"title":"Liability: When Things Go Wrong in an Increasingly Interconnected and Autonomous World: A European View","authors":"J. S. Marcus","doi":"10.1109/miot.2018.8717593","DOIUrl":"https://doi.org/10.1109/miot.2018.8717593","url":null,"abstract":"The Internet of Things (IoT) potentially offers society not only economic advantage but also gains in product quality and safety. At the same time, IoT (in conjunction with related technologies such as artificial intelligence and machine learning, to which we collectively refer as IoT/AI/ML) may open new potential product safety and liability exposures. What problems might be anticipated? Are potential exposures dealt with adequately by existing legal and policy measures, or do they call for some re-thinking of existing law and regulation? The European Union (EU) has adopted a common approach to two key groups of policy instruments in order to facilitate trade of goods and services throughout the EU: (1) product safety regulation, which establishes standards to which goods must conform; and (2) liability regulation, which enables consumers to recover their costs if they are harmed or injured due to a malfunctioning product (or potentially a defective service). Both are important, but our focus here is on liability.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fostering Iot Solutions For Sustainable Development In Africa 推动物联网解决方案促进非洲可持续发展
Pub Date : 2018-12-01 DOI: 10.1109/MIOT.2018.8717600
R. Giaffreda, A. Biswas
{"title":"Fostering Iot Solutions For Sustainable Development In Africa","authors":"R. Giaffreda, A. Biswas","doi":"10.1109/MIOT.2018.8717600","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8717600","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123619111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standards Matters 标准很重要
Pub Date : 2018-12-01 DOI: 10.1109/miot.2018.8717594
M. Violette
{"title":"Standards Matters","authors":"M. Violette","doi":"10.1109/miot.2018.8717594","DOIUrl":"https://doi.org/10.1109/miot.2018.8717594","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technologies for IoT 物联网技术
Pub Date : 2018-12-01 DOI: 10.1109/MIOT.2018.8717591
K. Gremban
{"title":"Technologies for IoT","authors":"K. Gremban","doi":"10.1109/MIOT.2018.8717591","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8717591","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The TTPs of Privacy and Security of the IoT 物联网隐私和安全的https
Pub Date : 2018-12-01 DOI: 10.1109/MIOT.2018.8717595
Erin E. Kenneally
In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.
在首个专栏中,编辑探讨了物联网(IoT)的隐私风险。本版本转向战术、技术和实践(TTPs),使物联网的安全和隐私风险管理成为可能。在网络威胁情报和事件响应的背景下,安全专业人员可能对这个术语很熟悉,只有在这里,它才被用来帮助从业者为物联网构建网络安全和隐私风险响应。
{"title":"The TTPs of Privacy and Security of the IoT","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8717595","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8717595","url":null,"abstract":"In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Policy and Regulatory Issues
Pub Date : 2018-09-01 DOI: 10.1109/MIOT.2019.8950956
D. Sicker, D. Redl
Policymakers face a conundrum — promoting the adoption of IoT services to reap its many benefits, while safeguarding societal concerns. This will be a balancing act of oversight and regulation from policymakers to drive investment and consumer adoption while ensuring that safety, security, and privacy frameworks are in place. This column will explore critical national and international IoT policy and regulatory efforts as well as take a deeper dive into specific topics of interest.
政策制定者面临着一个难题——促进物联网服务的采用,以获得其诸多好处,同时保护社会关切。这将是政策制定者监督和监管的平衡行为,以推动投资和消费者采用,同时确保安全、保障和隐私框架到位。本专栏将探讨关键的国家和国际物联网政策和监管努力,并深入探讨感兴趣的具体主题。
{"title":"Policy and Regulatory Issues","authors":"D. Sicker, D. Redl","doi":"10.1109/MIOT.2019.8950956","DOIUrl":"https://doi.org/10.1109/MIOT.2019.8950956","url":null,"abstract":"Policymakers face a conundrum — promoting the adoption of IoT services to reap its many benefits, while safeguarding societal concerns. This will be a balancing act of oversight and regulation from policymakers to drive investment and consumer adoption while ensuring that safety, security, and privacy frameworks are in place. This column will explore critical national and international IoT policy and regulatory efforts as well as take a deeper dive into specific topics of interest.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"110 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy and Security 私隐及保安
Pub Date : 2018-09-01 DOI: 10.1109/MIOT.2018.8552484
Erin E. Kenneally
This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.
本专栏深入探讨物联网的隐私风险,使用安全领域原生的风险概念,以便在概念上弥合我们对物联网隐私问题的集体理解、表达和管理,否则现有的法律和技术控制可能无法充分考虑或预见这些问题。所谓的物联网(IoT)对不同的人意味着不同的东西,这几乎已经成为陈词滥调。当涉及到隐私和安全风险时,在物联网的无数概念中隐含的东西是揭示为什么物联网风险预示着与传统的离线和在线环境相比的差异的关键。对物联网风险的例外主义观点持批评态度的人可能会认为,物联网实际上只是打了预防针的分布式计算,也就是说,物联网只是对过去的技术(如客户端-服务器、web服务、SoA、移动、虚拟化和分布式计算)进行重新标签和重新包装,这意味着风险管理只是将几十年来对隐私和安全的理解从那些熟悉的环境嫁接到物联网上的一种练习。不涉及宗教辩论,与前几代技术相比,物联网技术在数据收集的质量和数量上都有进步,这是无可争议的,这些都是由现实和未来的社会经济价值主张驱动的。
{"title":"Privacy and Security","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8552484","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8552484","url":null,"abstract":"This column delves into privacy risks of the IoT using risk concepts that are more native to the security domain in order to conceptually bridge our collective understanding, articulation, and management of privacy concerns in the IoT which otherwise might not be sufficiently considered or foreseen by existing legal and technical controls. It has become almost cliche that the so called Internet of Things (IoT) means different things to different people. When it comes to privacy and security risks, what is implicit across the myriad conceptualizations of IoT lies the key to unearthing why IoT risk heralds a difference with a distinction compared to traditional offline and online contexts. Critics of an exceptionalist view of IoT risk might contend that the IoT is really just distributed computing on steroids, i.e., the IoT is merely a relabeling and repackaging of technologies past like client-server, web services, SoA, mobile, virtualization, and distributed computing, which means that risk management is merely an exercise in grafting the decades-long understanding of privacy and security from those familiar contexts onto the IoT. Without getting into a religious debate, it is incontrovertible that there are advances in the quality and quantity of data collection from IoT technologies as opposed to previous generations of technology, and these are driven by real and prospective socioeconomic value propositions.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT Standards 物联网标准
Pub Date : 2018-09-01 DOI: 10.1109/miot.2018.8552483
M. Violette
{"title":"IoT Standards","authors":"M. Violette","doi":"10.1109/miot.2018.8552483","DOIUrl":"https://doi.org/10.1109/miot.2018.8552483","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116176379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editorial and Introduction to the Issue: Risk and Rewards of the Internet of Things 本刊社论及导言:物联网的风险与回报
Pub Date : 2018-09-01 DOI: 10.1109/MIOT.2018.8552481
K. Gremban
{"title":"Editorial and Introduction to the Issue: Risk and Rewards of the Internet of Things","authors":"K. Gremban","doi":"10.1109/MIOT.2018.8552481","DOIUrl":"https://doi.org/10.1109/MIOT.2018.8552481","url":null,"abstract":"","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis 通过设计定义具有安全和隐私的物联网编排:差距分析
Pub Date : 1900-01-01 DOI: 10.1109/IOTM.0001.2000162
Manos Papoutsakis, Konstantinos Fysarakis, G. Spanoudakis, S. Ioannidis
Structured approaches to the definition of service orchestrations facilitate the composition of components and services and allow for more capable and powerful applications, while introducing many advantages such as service reusability, cost reduction, and simplification of organization alliances. A variety of such approaches exist in the literature, with more recent approcahes focusing on the IoT. Nevertheless, oftentimes security and privacy aspects are not adequately considered, which constitutes a significant barrier to the deployment of IoT applications and services with security and privacy built-in by design. The objective of this work is to provide an overview of service composition approaches, highlighting how the scientific community approaches the IoT service composition problem, while identifying the limitations of the current solutions in terms of catering to the security and privacy challenges. Furthermore, a novel approach for composing IoT systems with proven security and privacy properties is proposed.
{"title":"Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis","authors":"Manos Papoutsakis, Konstantinos Fysarakis, G. Spanoudakis, S. Ioannidis","doi":"10.1109/IOTM.0001.2000162","DOIUrl":"https://doi.org/10.1109/IOTM.0001.2000162","url":null,"abstract":"Structured approaches to the definition of service orchestrations facilitate the composition of components and services and allow for more capable and powerful applications, while introducing many advantages such as service reusability, cost reduction, and simplification of organization alliances. A variety of such approaches exist in the literature, with more recent approcahes focusing on the IoT. Nevertheless, oftentimes security and privacy aspects are not adequately considered, which constitutes a significant barrier to the deployment of IoT applications and services with security and privacy built-in by design. The objective of this work is to provide an overview of service composition approaches, highlighting how the scientific community approaches the IoT service composition problem, while identifying the limitations of the current solutions in terms of catering to the security and privacy challenges. Furthermore, a novel approach for composing IoT systems with proven security and privacy properties is proposed.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116081354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IEEE Internet Things Mag.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1