Final published version, 579 KB, PDF document
Available under license: CC BY: Creative Commons Attribution 4.0 International License
Final published version
Licence: CC BY: Creative Commons Attribution 4.0 International License
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Designing trustworthy IoT systems : Critical challenges and approaches for generating value. / Lee, Boyeun; Gradinar, Adrian; Cooper, Rachel et al.
Human Interaction and Emerging Technologies: IHIET 2022. Vol. 68 2022. ed. AHFE International, 2022. p. 605-611.Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Designing trustworthy IoT systems
T2 - Critical challenges and approaches for generating value
AU - Lee, Boyeun
AU - Gradinar, Adrian
AU - Cooper, Rachel
AU - Coulton, Paul
PY - 2022/8/22
Y1 - 2022/8/22
N2 - At the end of the 20th century, the Internet of Things term was first introduced. Since then, the phenomenon behind this technological development is still fast-growing with estimates of more than 75 billion IoT devices readily connected to the Internet by 2025. During use, each of these devices generates valuable data for the end-user whilst negotiating the cybersecurity challenges low secured IoT devices employ. Whilst these security challenges have presented businesses with extensive opportunities for value creation, there are only a handful of studies exploring the challenges and opportunities related to security, privacy, and trust in IoT platforms and systems from a business perspective. Through a series of semi-structured interviews with top-level managers of different organisations across various industries in the UK, a methodological approach was developed to capture and address IoT value creation from the business’ perspective in which trust factors are at the core of the value creation process. This research identifies four critical challenges and approaches to value creation namely: continuous scaling-up, co-creation, data-driven value creation, and user-centric design. These approaches provide comprehensive understanding on how value creation activities are critically related to cyber security and how they affect trust factors. This study is timely for an academic audience since it contributes to initiating the body of literature regards cybersecurity and business application whilst from a managerial perspective it enables industry practitioners to generate value from IoT whilst better understanding the relations between the value creation activities and cybersecurity concerns.
AB - At the end of the 20th century, the Internet of Things term was first introduced. Since then, the phenomenon behind this technological development is still fast-growing with estimates of more than 75 billion IoT devices readily connected to the Internet by 2025. During use, each of these devices generates valuable data for the end-user whilst negotiating the cybersecurity challenges low secured IoT devices employ. Whilst these security challenges have presented businesses with extensive opportunities for value creation, there are only a handful of studies exploring the challenges and opportunities related to security, privacy, and trust in IoT platforms and systems from a business perspective. Through a series of semi-structured interviews with top-level managers of different organisations across various industries in the UK, a methodological approach was developed to capture and address IoT value creation from the business’ perspective in which trust factors are at the core of the value creation process. This research identifies four critical challenges and approaches to value creation namely: continuous scaling-up, co-creation, data-driven value creation, and user-centric design. These approaches provide comprehensive understanding on how value creation activities are critically related to cyber security and how they affect trust factors. This study is timely for an academic audience since it contributes to initiating the body of literature regards cybersecurity and business application whilst from a managerial perspective it enables industry practitioners to generate value from IoT whilst better understanding the relations between the value creation activities and cybersecurity concerns.
KW - Value creation for IoT
KW - IoT trust
KW - Design Challenges
KW - Design Strategies
U2 - 10.54941/ahfe1002783
DO - 10.54941/ahfe1002783
M3 - Conference contribution/Paper
VL - 68
SP - 605
EP - 611
BT - Human Interaction and Emerging Technologies
PB - AHFE International
ER -