Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 41

2.5 Research Methodology

Оглавление

We use the value-focused reasoning approach suggested by Keeney [19] to define IoT protection objectives. Keeney [20] applies this method to IoT business-associated consumer personality principles. He claims the only approach to figure out what the interest of the consumer is to question them. It is important to ask other prospective consumers since many individuals have specific beliefs and they convey various beliefs.

As values are produced, they are not automatically grouped into well-integrated classes with a good comprehension of which values are linked to the others and why. Within this analysis, the value-focused mindset methodology is used to produce IoT protection principles, goals and behavior of IT practitioners who rely on optimizing IoT protection (Figure 2.3).

According to Keeney [19], creative reasoning techniques are seen as the foundation for certain decision-making processes. In the research, the number of people to be questioned differs. Nonetheless, Hunter [16] questioned 53 people in two organisations and generated participant inceptions by performing a content review. Keeney [20] holds conversations and debates with more than 100 people about their principles for IoT transactions. In this report, we performed 40–50 min of interviews with 58 IT practitioners with different backgrounds and experience. Both participants have extensive day-today interaction with the IoT. Respondents covered the following sectors: transport and distribution, education, hospitality, finance and banking. We used a three-step method to define and coordinate the values and protection measures that a person has in relation to IoT protection (Figure 2.4).


Figure 2.3 IoT access control.


Figure 2.4 Concept of firewall.

Includes these steps:

 Developing a value list of consumers, involving asking the people concerned what they value for IoT safety?

 Management of priorities to identify ways to accomplish end-of-life (fundamental) objectives;

 Safety mechanisms to be chosen for the firewall to ensure better protection as electronic transactions are ongoing.

Integration of Cloud Computing with Internet of Things

Подняться наверх