Sign In
Not register? Register Now!
You are here: HomeResearch PaperIT & Computer Science
Pages:
5 pages/≈2750 words
Sources:
16 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.K.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Security Concerns In Home Automation And The Internet Of Things (Research Paper Sample)

Instructions:

This is a research paper aimed at the areas of concern in the implementation of home automation and the internet of things.

source..
Content:


SECURITY CONCERNS IN HOME AUTOMATION AND THE INTERNET OF THINGS (IoT)
Name:
Class:
Instructor:
Institution:
Date:
SECURITY CONCERNS IN HOME AUTOMATION AND THE INTERNET OF THINGS
The Internet of Things
The first device to be connected to the World Wide Web was the Coke Machine by technicians at the Carnegie Mellon University back in the early 1980s. Anyone who desired a drink could, therefore, check the product availability and status of the machine before actually walking towards it (Kennedy, 2014). This is considered the start of the ‘Internet of Things’.
The term ‘Internet of Things’ (IoT) itself denotes a scenario where machines and gadgets have the ability to collect and process data and make it available on the internet, all without human intervention (Kennedy, 2014). The term itself was first used in the late 1990s to refer to the rather abstract idea of giving over computing power to lifeless machines and objects. (Hvistendahl, 2012).
All manners of ‘Things’ can be connected; from smartphones, coffee machines, cameras, thermostats, even to animals, virtually anything has the capacity to become part of the Internet of Things. This interconnection makes it possible to carry out tasks remotely, and it has the potential to make life much more convenient and easy. Consider, for instance, being able to arrive at your office to a hot cup of coffee because your coffee maker sensed your proximity and started the brewing process.
It is estimated that about 9 billion devices – more than the world human population – are currently connected to the internet (Costigan & Lindstrom, 2016) with 127 new connections being added every second. By the year 2025, approximately 1 trillion devices are projected to be connected to the internet (Costigan & Lindstrom, 2016).
Why the Internet of Things?
There are three fundamental reasons why policymakers and implementers should consider IoT. Firstly, IoT has the capacity to contribute significantly to the growth of the economy of any country. Energy efficiency, operations enhancement are just a few of the numerous ways through which IoT can be harnessed to boost the economy (Costigan & Lindstrom, 2016).
Secondly, IoT can and does indeed find application in multiple fields of the economy. Talk about healthcare, transport, public service, infrastructure, among several others. And since it achieves the connection of these sectors, it helps to spread the efficiencies across the board, meaning that service delivery will be greatly enhanced (Costigan & Lindstrom, 2016).

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Generic Trademark IT & Computer Science Research Paper
    Description: The generic trademark is a term used as words or symbols that communicate the type of product being offered (Johnson, 2019). The terms ‘cellophane’, ‘aspirin’ and ‘thermos’ generic fell into common usage to represent the type of products that oppose certain company’s products...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Survey Reseach on public opinions IT & Computer Science Research Paper
    Description: Survey research is known as a quantitative and qualitative technique with two appearances which are self-reports measurements done on variables of interest and sampling issues are considered (Schindler, 2020). Self-reports measurements are where survey researchers ask questions directly...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
  • Access controls models IT & Computer Science Research Paper
    Description: Access control topic is a wide chapter with useful information concerning information security and it and before looking at access control models, it has important concepts which are confidentiality, integrity, and availability of information (Conrad, Misenar & Feldman, 2016)....
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!