Internet of Things (IoT) devices are operating in various domains like healthcare environment, smart cities, smart homes, transportation, and smart grid system. These devices transmit a bulk of data through various sensors, actuators, transceivers, or other wearable devices. Data in the IoT environment is susceptible to many threats, attacks, and risks. Therefore, a robust security mechanism is indispensable to cope with attacks, vulnerabilities, security, and privacy challenges related to IoT. In this research, a systematic literature review has been conducted to analyze the security of IoT devices and to provide the countermeasures in response to security problems and challenges by using mobile computing. A comprehensive and in-depth security analysis of IoT devices has been made in light of mobile computing, which is a novel approach. Mobile computing's technological infrastructures such as smartphones, services, policies, strategies, and applications are employed to tackle and mitigate these potential security threats. In this paper, the security challenges and problems of IoT devices are identified by a systematic literature review. Then, mobile computing has been used to address these challenges by providing potential security measures and solutions. Hardware and software-based solutions furnished by mobile computing towards the IoT security challenges have been elaborated. To the best of our knowledge, this is the first attempt to analyze the security issues and challenges of IoT in light of mobile computing and it will open a gateway towards future research. INDEX TERMS Internet of Things devices, Security, Mobile Computing, Mobile applications, Smartphone. I. Research Questions Keywords What are the security problems and challenges faced by IoT devices in the network? Inclusion Criteria Research papers published in English language were included Primary studies i.e. original research papers were selected Research papers, book chapters or magazines relevant to our main topic were selected Research papers ranges in years from 2011 to 2019 were included for the studies Exclusion Criteria Papers written other than English language are not included Papers did not answer research questions or did not define the topic properly were excluded Gray papers were excluded Elimination of duplicated papers Research papers with less than three pages were removed
Background The emerging trends in recent years are "Big Data" and "Big Data Analytics" which have become popular globally. They facilitate the analysis of the entire data in real time by developing and using machine-to-machine algorithms for predictive modelling and to arrive at decisions based on such models [1]. According to McKinsey [2] "Big Data" is considered as the datasets that challenge the ability of typical applications and technologies in managing and analysing the data. Big data also challenges the human imagination. For example, while some might consider a few dozen terabytes as big data, in reality it is not. Surely, it is a large dataset but can still be managed and stored in a local network attached storage (NAS) or storage area network (SAN) using array of disks. By and large, it can be perceived that big data is petabytes in size requiring a complex distributed
Application maintenance consumes a considerable amount of an organization's time and resources each year. Almost 60% of IT budget is spent alone on application maintenance. The reason of offshore outsourcing of application maintenance is not only the reduction of maintenance cost but to free up the resources and to keep the focus on core products. Offshore outsourcing is a common business strategy that is used by companies to achieve cost savings about 20-50%. However, the decision making process of application maintenance is a complex phenomenon. It is based on a set of influencing factors, clients' requirements and nature of the project. Hence, the current study is aimed at the in-depth investigation of the complex sourcing decision process of application maintenance. Accordingly, a systematic literature review is performed to determine the influencing factors and critical success factors that will be used by the decision makers for the evaluation of projects before making the outsourcing decisions. A total of 15 influencing factors out of 52 selected papers were identified. Based on the defined criteria, amongst the identified factors, only 10 factors were ranked as critical success factors, which are employees' skills, cost, legal requirements, infrastructure, communication, knowledge transfer, maturity level, project management, language barrier and frequent requirements changes. Consequently, a sourcing model was proposed based on the identified critical success factors that help the IT managers and domain experts in making appropriate outsourcing decisions. INDEX TERMS Application maintenance, critical success factors, influencing factors, offshoring, outsourcing, outsourcing decisions.
Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach – A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings – The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft. Research limitations/implications – Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future. Practical implications – Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement. Social implications – Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk. Originality/value – The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.
Purpose – The purpose of this paper is to identify and develop a hierarchical model for the barriers affecting the growth of mobile commerce (M-commerce). Based on the model developed, the authors’ objective is to identify those variables that are of strategic nature and are the root cause of the issue. Design/methodology/approach – Variables considered as barriers are identified, and utilizing the interpretive structural model approach, a relationship model is developed. Further, the impact matrix cross-reference multiplication applied to a classification approach is used to analyze the effect and dependence among these factors. Findings – The research in the area of M-commerce in the Arab world and related to the strategic aspect is limited in the extant literature. The present study tries to fill this gap by investigating the variables that inhibit the growth of M-commerce in Qatar. The research shows that there exists a group of barriers having a high driving power and low dependence requiring maximum attention and of strategic importance, while another group consists of those variables that have high dependence and are the resultant actions. Practical implications – There is a growing concern that although the numbers of mobile subscribers are increasing at a very fast pace in Qatar, actual M-commerce activities in the country remain low. The findings of this study can be used to understand the differences between the independent and dependent variables and their mutual relationships. The study would also help the policy makers to develop suitable strategies to facilitate growth of M-commerce in the country. Originality/value – This research was the first attempt to investigate the relationships among the variables inhibiting the growth of M-commerce in a fast-growing economy in a Gulf Cooperation Council (GCC) region. Given that there is limited research on M-commerce in the GCC context, the study can be viewed as an investigation that provides a good understanding of the variables and their interrelationships affecting M-commerce proliferation.
As the expenses of medical care administrations rise and medical services experts are becoming rare, it is up to medical services organizations and institutes to consider the implementation of medical Health Information Technology (HIT) innovation frameworks. HIT permits health associations to smooth out their considerable cycles and offer types of assistance in a more productive and financially savvy way. With the rise of Cloud Storage Computing (CSC), an enormous number of associations and undertakings have moved their healthcare data sources to distributed storage. As the information can be mentioned whenever universally, the accessibility of information becomes an urgent need. Nonetheless, outages in cloud storage essentially influence the accessibility level. Like the other basic variables of cloud storage (e.g., reliability quality, performance, security, and protection), availability also directly impacts the data in cloud storage for e-Healthcare systems. In this paper, we systematically review cloud storage mechanisms concerning the healthcare environment. Additionally, in this paper, the state-of-the-art cloud storage mechanisms are critically reviewed for e-Healthcare systems based on their characteristics. In short, this paper summarizes existing literature based on cloud storage and its impact on healthcare, and it likewise helps researchers, medical specialists, and organizations with a solid foundation for future studies in the healthcare environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.