burger menu
Internet of Things

Internet of Things

    Add to bookmarks

Realising the potential of a trusted smart world

SUMMARY

This report recommends a broad range of Internet of Things (IoT) security, risk and policy agendas to harness the economic potential of IoT.

IoT technologies include all digital and physical systems that remain interconnected to the internet, including smart cities, autonomous vehicles, and smart speakers. There is a large expectation that IoT will positively impact global challenges. However, there are numerous risk management issues associated with privacy, ethics, trust, reliability, acceptability, safety and security. These complex and interdependent factors influence the ability of IoT to accomplish policy objectives. To easily define policy objectives, IoT applications can be structured into three broad systems: i) industrial, ii) public space and iii) consumers.

The report identifies strategies to harness the economic potential of IoT. IoT businesses should identify IoT devices that complement existing services. Further, consumers, suppliers, and manufacturers should collectively provide various applications that broker and share data between end-users and one another. Policymaking should reflect the unique and interconnected needs of each system. However, privacy, security and risk regulations are core concerns of each system.

 The effective economization of IoT is interdependent on the implementation and application of robust risk management regulations and standards. Policymakers should cultivate a culture of trust to overcome the public opinion’s perceived risks to privacy. As IoT devices and systems grow, security is crucial to IoT designs. Security and privacy are paramount as IoT converges with artificial intelligence technologies that organize information from a vast volume of data.  To overcome this barrier, policymakers and IoT designers should cultivate a greater security awareness and willingness to create compatible systems. However, the vast amount of data that is generated from start-to-finish pose problems to regulators and data centers. These suggestions will help determine the safety and resilience of interconnected physical and digital systems.

OUTLINE

Foreword 

Executive summary 

Introduction 

Policy 

Applications of the Internet of Things (IoT) 

Exploit economic opportunities

Security and risk management 

Usage and deployment

Conclusions 

Annexes

References and endnotes 

DETAILS

Overview

Researchfinder Rating
4 out of 5 stars
Title
Internet of Things
Sub-Title
Realising the potential of a trusted smart world
Region
Global
Published
March 15, 2018
Publisher
Royal Academy of Engineering
Author(s)
Paul Taylor, Dr.Steve Allpress F., Dr. Madeline Carr, Professor Emil Lupu, Professor Jim Norton, Dr. Liane Smith
Price
FREE
Language
ENGLISH

Content

Number of Pages
56
Number of Tables
1
Number of Exhibits
1
Topics
ai, cloud, iot
Tags
AI, cloud computing, cyber security, global, Industrial IoT, iot, regulation, Royal Academy of Engineering
Author(s)
Paul Taylor, Dr.Steve Allpress F., Dr. Madeline Carr, Professor Emil Lupu, Professor Jim Norton, Dr. Liane Smith
Methodology
A working group of business leaders, CEOs and policy analysts explore various complex and interdependent Internet of Things (IoT) security issues.
EVALUATION

This comprehensive analysis of IoT regulatory concerns will help readers pinpoint areas of economic opportunity and practical policymaking.

The regulatory themes are well connected and the conclusions explore practical strategies. Although the paper is well organized and broad, the writing may challenge some readers.

Positives:

  • Broad analysis of policy challenges
  • Well organized and well-connected themes
  • God use of sources

Negatives:

  • Complex writing

Similiar Reports

Smart Mobility

FREE

The 2019 State of IOT Report

FREE

The Internet of Things

FREE