{"title":"Public Safety and Protection by Design: Opportunities and Challenges for IoT and Data Science","authors":"Alicia D. Johnson, Meredith M. Lee, Soody Tronson","doi":"10.1007/978-3-030-15705-0_9","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_9","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121469371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT: Privacy, Security, and Your Civil Rights","authors":"Cynthia D. Mares","doi":"10.1007/978-3-030-15705-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_2","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust, Identity, Privacy, and Security for a Smart Campus","authors":"K. Herrington","doi":"10.1007/978-3-030-15705-0_6","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_6","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security for Science: How One Thing Leads to Another","authors":"H. Short","doi":"10.1007/978-3-030-15705-0_7","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_7","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing IoT Data with Pervasive Encryption","authors":"Eysha Shirrine Powers","doi":"10.1007/978-3-030-15705-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_11","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profiles of Women Securing the Future with TIPPSS for IoT","authors":"F. Hudson","doi":"10.1007/978-3-030-15705-0_13","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_13","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy in the New Age of IoT","authors":"Qiuyue Pan","doi":"10.1007/978-3-030-15705-0_3","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_3","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Business Framework for Evaluating Trust in IoT Technology","authors":"Fen Zhao, Britt Danneman","doi":"10.1007/978-3-030-15705-0_4","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_4","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"271 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Distributed Storage for the Internet of Things","authors":"Sinjoni Mukhopadhyay","doi":"10.1007/978-3-030-15705-0_12","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_12","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT: Is It a Digital Highway to Security Attacks?","authors":"Edna Conway","doi":"10.1007/978-3-030-15705-0_1","DOIUrl":"https://doi.org/10.1007/978-3-030-15705-0_1","url":null,"abstract":"","PeriodicalId":170901,"journal":{"name":"Women Securing the Future with TIPPSS for IoT","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129306285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}