The Lasting Damages of a Data Breach

The Lasting Damages of a Data Breach

Data Breach Damages Data breaches make an organization’s representatives painfully aware of the common phrase, “Time is money.” They scramble to recover lost information and limit the reach hackers have. It’s undoubtedly important to take those immediate actions, but affected parties must also come to
What’s the Difference Between Data Integration and Data Engineering?

What’s the Difference Between Data Integration and Data Engineering?

Sometimes I write a blog because I’ve learned something new that I’m eager to share.  And sometimes I write a blog because we’ve just done something enlightening in one of my classes or client exercises.  But sometimes I write a blog because I don’t know anything about

What Are Industrial Robots 

One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT) and industrial robots. According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies”. Based on this definition, IOT refers to networkable things. Things can be Physical things which exist in the physical world (e.g. sensors of surrounding environments, industrial robots, goods, and electrical equipment), or Virtual things which exist in the information world (e.g. multimedia contents, application software and service representations of physical things). They are able to be integrated into communication networks and can offer services to various kinds of applications such as intelligent transportation systems, e-health, and smart environmental monitoring.

According to Lee et al. (2013), the Internet of things will include: “ubiquitous connectivity allowing for whenever, whoever, wherever, and whatever types of communications; a pervasive reality for effective interfaces to provide connectable real world environments; and ambient intelligence allowing for innovative communications and providing increased value creation”. The vision of the IOT suggests that devices can communicate with other devices through a worldwide network with or without the involvement of human. Humans can also communicate with a device in order to get or transfer specific information. In this way, everything from individuals, groups, communities, objects, products, data, services, and processes will be connected by the IOT. It is estimated that approximately 50 billion things will be connected to each other through the communication network by 2020. A massive set of data will be created. It would seem that management of the data generated and its interpretation for application purposes are important issues that should be considered.

Connected Communities

The IOT will create new services based on real-time physical world data and will transform businesses, industries, and the daily life of people. Smart cities (connected communities), smart planet (green environment), smart building (building, smart homes), smart industry (industrial environment), smart energy (electric grid), smart transport (intelligent transport system), smart living (entertainment, leisure), smart health (health care system) are examples of the Internet of things.

The major characteristics of the IOT are: interconnectivity of physical and virtual things; ability of providing thing-related services within the constraints of things; heterogeneity of IOT devices; dynamic changes of devices, and enormous scale. Various technologies such as M2M, microcontrollers, wireless communication, RFID, energy harvesting technologies, location technology, and various software will contribute to the development of the IOT.

Many scholars believe that security, privacy, and trust are important issues and should be considered as fundamental design parameters of sensor systems. In a world where everything is connected by the internet, confidentiality, authenticity, and integrity of data and services are critical particularly for public services, enterprises, and citizens. Furthermore, privacy protection of data during transmission, aggregation, storage, mining and processing is important. Therefore, dynamic trust models need to be designed to provide security and privacy features.

By Mojgan Afshari

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial ...
Why should SMEs embrace Cloud ERP solutions?

Why should SMEs embrace Cloud ERP solutions?

SMEs & ERP Solutions Remaining competitive in the market is the primary goal of every business. For SMEs, moving to ...
Part 2 - Identity Assurance by Our Own Volition and Memory

Part 2 – Identity Assurance by Our Own Volition and Memory

Identity Assurance We believe that the reliable identity assurance (See part 1) must be built on three prerequisite principles as ...
4 Examples When AI And Robotics Work Better Than Humans

4 Examples When AI And Robotics Work Better Than Humans

Robotics and AI Science fiction’s portrayal of robotics and AI tends to be pessimistic when it comes to machines developing ...
Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare ...
Qualcomm settlement with Apple paves way for Huawei dispute: analysts

Qualcomm settlement with Apple paves way for Huawei dispute: analysts

(Reuters) - Qualcomm Inc’s surprise settlement of a prolonged legal fight with Apple Inc paves the way for the chipmaker to resolve a similar dispute with China’s Huawei Technologies Co Ltd, ahead of the launch ...
Notre-Dame de Paris: Capgemini contributes to the national effort

Notre-Dame de Paris: Capgemini contributes to the national effort

Paris, April 16, 2019 – The Capgemini Group has decided to pay the sum of one million euros to help rebuild Notre-Dame Cathedral.  Paul Hermelin, Chairman and CEO of the Capgemini Group: “Our emotion is strong ...
EU approves tougher EU copyright rules in blow to Google, Facebook

EU approves tougher EU copyright rules in blow to Google, Facebook

BRUSSELS (Reuters) - Google will have to pay publishers for news snippets and Facebook filter out protected content under new copyright rules aimed at ensuring fair compensation for the European Union’s $1 trillion creative industries ...