2018
DOI: 10.17705/1jais.00484
|View full text |Cite
|
Sign up to set email alerts
|

Design and Validation of the Bright Internet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(27 citation statements)
references
References 0 publications
1
26
0
Order By: Relevance
“…The requirements, principles, and features constitute actionable guidelines, which highlights a core difference between our work and the extant research. Thereby, we reflect the various calls in the IS literature to support the development of implementable tools to increase security and privacy, especially in the IoT (Bélanger & Crossler, 2011;Lee et al, 2018;Medaglia & Serbanati, 2010;Pavlou, 2011).…”
Section: Sdps Design Theorymentioning
confidence: 95%
See 3 more Smart Citations
“…The requirements, principles, and features constitute actionable guidelines, which highlights a core difference between our work and the extant research. Thereby, we reflect the various calls in the IS literature to support the development of implementable tools to increase security and privacy, especially in the IoT (Bélanger & Crossler, 2011;Lee et al, 2018;Medaglia & Serbanati, 2010;Pavlou, 2011).…”
Section: Sdps Design Theorymentioning
confidence: 95%
“…The constantly growing pool of smart, connected IoT devices poses completely new challenges regarding security and privacy (Lee et al, 2018;Sicari et al, 2015;Weber, 2010). Companies are increasingly moving towards cloud solutions and sharing sensor data in multi-party ecosystems (Anderson et al, 2017;Lowry et al, 2017).…”
Section: Security and Privacy In The Internet Of Thingsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we investigate potential measures which can be effective in increasing firms' awareness of cyber security and internalizing the externalities to develop more secure cyber environments. This study also echoes the origin 3 responsibility principle of the research framework of the Bright ICT initiative [9,10] by proposing a new security vulnerability index to incentivize firms to behave as good citizens and take a proactive approach to prevent the widespread use of undesirable content over the Internet [11].…”
Section: Introductionmentioning
confidence: 67%