Show simple item record

dc.contributor.authorVidalis, Stilianos
dc.contributor.authorAngelopoulou, Olga
dc.date.accessioned2017-09-14T16:44:08Z
dc.date.available2017-09-14T16:44:08Z
dc.date.issued2014-03-01
dc.identifier.citationVidalis , S & Angelopoulou , O 2014 , ' Assessing Identity Theft in the Internet of Things ' , Journal of IT Convergence Practice , vol. 2 , no. 1 , pp. 15-21 . < http://inpra.yolasite.com/vol2no1.php >
dc.identifier.issn2288-0860
dc.identifier.urihttp://hdl.handle.net/2299/19400
dc.descriptionPublished by Innovative Information Science & Technology Research Group (ISYOU)
dc.description.abstractIn the Internet of Things everything is interconnected. In the same context that “man-made fire” got the party started for human civilisation, “man-made TCP” enabled computing devices to participate in our lives. Today we live in a socially-driven knowledge centred computing era and we are happy in living our lives based on what an Internet alias have said or done. We are prepared to accept any reality as long as it is presented to us in a digitised manner. The Internet of Things is an emerging technology introduced in Smart Devices that will need to be intergrated with the current Information Technology infrastructure in terms of its application and security considerations. In this paper we explore the identity cyberattacks that can be related to Internet of Things and we raise our concerns. We also present a vulnerability assessment model that attempts to predict how an environment can be influenced by this type of attacks.en
dc.format.extent7
dc.format.extent832755
dc.language.isoeng
dc.relation.ispartofJournal of IT Convergence Practice
dc.subjectInternet of Things
dc.subjectVulnerability
dc.subjectInformation Security
dc.subjectIdentity theft
dc.titleAssessing Identity Theft in the Internet of Thingsen
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.description.statusPeer reviewed
dc.identifier.urlhttp://inpra.yolasite.com/vol2no1.php
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record