{"title":"与F(M)相关的物联网隐私、信任和安全泄露事件分类。公司","authors":"Joseph Squillace, May Bantan","doi":"10.1109/aiiot54504.2022.9817225","DOIUrl":null,"url":null,"abstract":"Advancements in technology have brought with it widespread use and utilization of the lnternet-of-Things (IoT); a catch-all moniker identifying the collection of eclectic hardware and software mediums connecting people with small electronic computing and monitoring devices, such as SMART products: television, thermostat, speaker, refrigerator, etc. As personal IoT adaptation has grown in parallel with IoT home integration, so too have IoT concerns related to Privacy, Trust, and the Security risks associated with individual end-user protection, especially from IoT devices linked to Facebook (Meta) (F), Apple (A), Amazon (A), Netflix (N), and Google (G); conversationally identifiable as F(M).A.A.N.G. corporations. As a result, the list of IoT threats, security weaknesses, and vulnerabilities has grown exponentially. Nefarious actors have taken advantage of this growing technology, reaching into homes and offices far beyond established limits set by end-users. This research will use a multiple case study approach to analyze IoT security breach events to identify current Privacy, Trust, and Security risks to end-users associated with IoT devices. Furthermore, this research will also utilize security behavioral research by Anderson and Agarwal to introduce a Safe Computing Practices Model (SCPM) that can be implemented by end-users when integrating IoT devices.","PeriodicalId":409264,"journal":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations\",\"authors\":\"Joseph Squillace, May Bantan\",\"doi\":\"10.1109/aiiot54504.2022.9817225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Advancements in technology have brought with it widespread use and utilization of the lnternet-of-Things (IoT); a catch-all moniker identifying the collection of eclectic hardware and software mediums connecting people with small electronic computing and monitoring devices, such as SMART products: television, thermostat, speaker, refrigerator, etc. As personal IoT adaptation has grown in parallel with IoT home integration, so too have IoT concerns related to Privacy, Trust, and the Security risks associated with individual end-user protection, especially from IoT devices linked to Facebook (Meta) (F), Apple (A), Amazon (A), Netflix (N), and Google (G); conversationally identifiable as F(M).A.A.N.G. corporations. As a result, the list of IoT threats, security weaknesses, and vulnerabilities has grown exponentially. Nefarious actors have taken advantage of this growing technology, reaching into homes and offices far beyond established limits set by end-users. This research will use a multiple case study approach to analyze IoT security breach events to identify current Privacy, Trust, and Security risks to end-users associated with IoT devices. Furthermore, this research will also utilize security behavioral research by Anderson and Agarwal to introduce a Safe Computing Practices Model (SCPM) that can be implemented by end-users when integrating IoT devices.\",\"PeriodicalId\":409264,\"journal\":{\"name\":\"2022 IEEE World AI IoT Congress (AIIoT)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE World AI IoT Congress (AIIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/aiiot54504.2022.9817225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE World AI IoT Congress (AIIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/aiiot54504.2022.9817225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Taxonomy of Privacy, Trust, and Security Breach Incidents of Internet-of-Things Linked to F(M).A.A.N.G. Corporations
Advancements in technology have brought with it widespread use and utilization of the lnternet-of-Things (IoT); a catch-all moniker identifying the collection of eclectic hardware and software mediums connecting people with small electronic computing and monitoring devices, such as SMART products: television, thermostat, speaker, refrigerator, etc. As personal IoT adaptation has grown in parallel with IoT home integration, so too have IoT concerns related to Privacy, Trust, and the Security risks associated with individual end-user protection, especially from IoT devices linked to Facebook (Meta) (F), Apple (A), Amazon (A), Netflix (N), and Google (G); conversationally identifiable as F(M).A.A.N.G. corporations. As a result, the list of IoT threats, security weaknesses, and vulnerabilities has grown exponentially. Nefarious actors have taken advantage of this growing technology, reaching into homes and offices far beyond established limits set by end-users. This research will use a multiple case study approach to analyze IoT security breach events to identify current Privacy, Trust, and Security risks to end-users associated with IoT devices. Furthermore, this research will also utilize security behavioral research by Anderson and Agarwal to introduce a Safe Computing Practices Model (SCPM) that can be implemented by end-users when integrating IoT devices.