The Internet of Things: Review and theoretical framework

被引:232
作者
Nord, Jeretta Horn [1 ]
Koohang, Alex [2 ]
Paliszkiewicz, Joanna [3 ]
机构
[1] Oklahoma State Univ, Management Sci & Informat Syst Dept, Stillwater, OK 74078 USA
[2] Middle Georgia State Univ, Macon, GA 31206 USA
[3] Warsaw Univ Life Sci, Warsaw, Poland
关键词
Internet of Things; IoT; IoT literature review; IoT priorities; IoT challenges; IoT theoretical framework; TRUST MANAGEMENT; PRIVACY; SECURITY; CHALLENGES; IOT; TECHNOLOGY; ADOPTION; NETWORK; MODEL;
D O I
10.1016/j.eswa.2019.05.014
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IOT) global arena is massive and growing exponentially. Those in the emerging digital world have recently witnessed the proliferation and impact of IOT-enabled devices. The IOT has provided new opportunities in the technology arena while bringing several challenges to an increased level of concern. This research has both practical and theoretical impetus since IOT is still in its infancy, and yet it is considered by many as the most important technology initiative of today. This study includes a systematic review and synthesis of IOT related literature and the development of a theoretical framework and conceptual model. The review of the literature reveals that the number of applications that make use of the IOT has increased dramatically and spans areas from business and manufacturing to home, health care, and knowledge management. Although IOT can create invaluable data in every industry, it does not occur without its challenges. The theoretical framework developed identifies IOT priority areas and challenges, providing a guide for those leading IOT initiatives and revealing opportunities for future IOT research. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:97 / 108
页数:12
相关论文
共 72 条
[41]  
Liu Y, 2010, EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, P5632
[42]   A dynamic trust management system for wireless sensor networks [J].
Luo, Wei ;
Ma, Wenping ;
Gao, Qiang .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (07) :613-621
[43]  
Madakam Somayya., 2015, Journal of Computer and Communications, V3, P164
[44]   Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things [J].
Makinen, Jenna .
INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2015, 24 (03) :262-277
[45]   On perspective of security and privacy-preserving solutions in the internet of things [J].
Malina, Lukas ;
Hajny, Jan ;
Fujdiak, Radek ;
Hosek, Jiri .
COMPUTER NETWORKS, 2016, 102 :83-95
[46]   Security and privacy issues for the network of the future [J].
Marias, Giannis F. ;
Barros, Joao ;
Fiedler, Markus ;
Fischer, Andreas ;
Hauff, Harald ;
Herkenhoener, Ralph ;
Grillo, Antonio ;
Lentini, Alessandro ;
Lima, Luisa ;
Lorentzen, Charlott ;
Mazurczyk, Wojciech ;
de Meer, Hermann ;
Oliveira, Paulo F. ;
Polyzos, George C. ;
Pujol, Enric ;
Szczypiorski, Krzysztof ;
Vilela, Joao P. ;
Vinhoza, Tiago T. V. .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (09) :987-1005
[47]   Internet of things: Vision, applications and research challenges [J].
Miorandi, Daniele ;
Sicari, Sabrina ;
De Pellegrini, Francesco ;
Chlamtac, Imrich .
AD HOC NETWORKS, 2012, 10 (07) :1497-1516
[48]   Negotiation in Internet of Things [J].
Misura, Kresimir ;
Zagar, Mario .
AUTOMATIKA, 2016, 57 (02) :304-318
[49]   Mapping the values of IoT [J].
Nicolescu, Razvan ;
Huth, Michael ;
Radanliev, Petar ;
De Roure, David .
JOURNAL OF INFORMATION TECHNOLOGY, 2018, 33 (04) :345-360
[50]   Cyberentity Security in the Internet of Things [J].
Ning, Huansheng ;
Liu, Hong ;
Yang, Laurence T. .
COMPUTER, 2013, 46 (04) :46-53