2016
DOI: 10.1109/mce.2015.2484659
|View full text |Cite
|
Sign up to set email alerts
|

The Internet of Things: Why now, and what's next?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 55 publications
(18 citation statements)
references
References 14 publications
(9 reference statements)
0
16
0
1
Order By: Relevance
“…Both professional and personal environments are being enriched with connected devices, which support or perform many of our daily tasks-although maintenance and reconfiguration work still demand human expertise and intervention. The abundance of smartphones and the cloud infrastructure have laid much of the way for the IoT [26].…”
Section: The Quest For Calm Technologymentioning
confidence: 99%
“…Both professional and personal environments are being enriched with connected devices, which support or perform many of our daily tasks-although maintenance and reconfiguration work still demand human expertise and intervention. The abundance of smartphones and the cloud infrastructure have laid much of the way for the IoT [26].…”
Section: The Quest For Calm Technologymentioning
confidence: 99%
“…Internet of Things (IoT) is a popular topic that is actively discussed among academicians and technology professionals [1], [2]. This popular buzzword is even being introduced to non-IT environments [3]- [6] such as sales and marketing [7]. Research journals often reference Kevin Ashton as the founder of the IoT, who believed IoT can change the world, as for how the internet has changed the world [2], [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…To the authors’ best knowledge, this question has not been addressed in the extant research literature. This issue is growing in importance, as an increasing proportion of end‐consumer devices integrate internet of things (IoT) functionality [2], which means these electrical devices could potentially be hijacked by a malicious cyberattacker. While the idea of interfering with consumer‐scale electronic equipment to harm a nation‐spanning grid may seem implausible, there are reasons to believe that this is a credible attack vector.…”
Section: Introductionmentioning
confidence: 99%