‘They’re all about pushing the products and shiny things rather than fundamental security’:Mapping socio-technical challenges in securing the smart home
{"title":"‘They’re all about pushing the products and shiny things rather than fundamental security’:Mapping socio-technical challenges in securing the smart home","authors":"Jiahong Chen, Lachlan D. Urquhart","doi":"10.1080/13600834.2021.1957193","DOIUrl":null,"url":null,"abstract":"ABSTRACT Insecure connected devices can cause serious threats not just to smart home-owners, but also the underlying infrastructural network. There has been increasing academic and regulatory interest in addressing cybersecurity risks from both the standpoint of IoT vendors and that of end-users. In addition to the current data protection and network security legal frameworks, for example, the UK government has initiated the ‘Secure by Design’ campaign. While there has been work on how organisations and individuals manage their own cybersecurity risks, it remains unclear to what extent IoT vendors are supporting end-users to perform day-to-day management of such risks, and what is stopping the vendors from improving such support. We interviewed 13 experts in the field of IoT and identified three main categories of barriers to making IoT products useably secure: technical, legal and organisational. In this paper we further discuss the policymaking implications of these findings and make some recommendations.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":null,"pages":null},"PeriodicalIF":1.8000,"publicationDate":"2021-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2021.1957193","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Communications Technology Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/13600834.2021.1957193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 3
Abstract
ABSTRACT Insecure connected devices can cause serious threats not just to smart home-owners, but also the underlying infrastructural network. There has been increasing academic and regulatory interest in addressing cybersecurity risks from both the standpoint of IoT vendors and that of end-users. In addition to the current data protection and network security legal frameworks, for example, the UK government has initiated the ‘Secure by Design’ campaign. While there has been work on how organisations and individuals manage their own cybersecurity risks, it remains unclear to what extent IoT vendors are supporting end-users to perform day-to-day management of such risks, and what is stopping the vendors from improving such support. We interviewed 13 experts in the field of IoT and identified three main categories of barriers to making IoT products useably secure: technical, legal and organisational. In this paper we further discuss the policymaking implications of these findings and make some recommendations.
期刊介绍:
The last decade has seen the introduction of computers and information technology at many levels of human transaction. Information technology (IT) is now used for data collation, in daily commercial transactions like transfer of funds, conclusion of contract, and complex diagnostic purposes in fields such as law, medicine and transport. The use of IT has expanded rapidly with the introduction of multimedia and the Internet. Any new technology inevitably raises a number of questions ranging from the legal to the ethical and the social. Information & Communications Technology Law covers topics such as: the implications of IT for legal processes and legal decision-making and related ethical and social issues.