2020
DOI: 10.1007/s42452-019-1931-0
|View full text |Cite
|
Sign up to set email alerts
|

Future developments in standardisation of cyber risk in the Internet of Things (IoT)

Abstract: In this research article, we explore the use of a design process for adapting existing cyber risk assessment standards to allow the calculation of economic impact from IoT cyber risk. The paper presents a new model that includes a design process with new risk assessment vectors, specific for IoT cyber risk. To design new risk assessment vectors for IoT, the study applied a range of methodologies, including literature review, empirical study and comparative study, followed by theoretical analysis and grounded t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3
2

Relationship

4
4

Authors

Journals

citations
Cited by 70 publications
(61 citation statements)
references
References 112 publications
0
56
0
1
Order By: Relevance
“…Many similar models have been introduced and never used because reliable data could not be found. Furthermore, in terms of the (un)availability of data, lessons can be learned from previous research on data strategies [39]. The volume of data generated creates diverse challenges for developing data strategies in a variety of verticals (ex.…”
Section: Discussionmentioning
confidence: 99%
“…Many similar models have been introduced and never used because reliable data could not be found. Furthermore, in terms of the (un)availability of data, lessons can be learned from previous research on data strategies [39]. The volume of data generated creates diverse challenges for developing data strategies in a variety of verticals (ex.…”
Section: Discussionmentioning
confidence: 99%
“…Notable for this discussion, only FAIR 38 provides recommendations for quantitative risk estimation. To complete the risk assessment, the cyber risk from supply chains needs to be simplified 31,42,43 . To identify a current cyber risk state that includes supply chain cyber risks, the Exostar system 36 , can be used for complimenting the CVSS and covering the supply chain aspect of cyber risk.…”
Section: Empirical Analysis Of Gaps In Cyber Risk Impact Assessment Amentioning
confidence: 99%
“…To identify a current cyber risk state that includes supply chain cyber risks, the Exostar system 36 , can be used for complimenting the CVSS and covering the supply chain aspect of cyber risk. Further analysis, including SWAT and GAP analysis are considered beyond the scope of this conference paper, but can be found in other articles [43][44][45][46][47] .…”
Section: Empirical Analysis Of Gaps In Cyber Risk Impact Assessment Amentioning
confidence: 99%
See 1 more Smart Citation
“…Further research is required into the topic of addressing strategy absence, because in such scenarios, the formulation would be difficult to implement. A series of publications follows this research 1,2,[11][12][13][14][15][16][17][18][19][20]3,[21][22][23][24][25][26][27][28][29][30]32…”
Section: Future Research Avenuesmentioning
confidence: 99%