+44 203 318 3300 +61 2 9052 0853

Governance of iot with a small society Assignment Sample

Pages Pages: 15

Words Words: 3721

Governance of iot with a small society Assignment

Introduction

Get free samples written by our Top-Notch subject experts for taking assignment help UK services.

The IOT stands for the Internet of things based on the idea to connect multiple devices such as the wireless and wired device over the connection in which a person can connect with the digital world at any point of time as per the requirement of the user. The devices required to connect with other devices to establish the connection on which the user will access the digital platform. The IOT set of multiple devices is used to governance the services while connected with the servers. The IOT opens lots of opportunities to interact with digital platforms for users. The opportunities also raise the new question in the interaction between the users and their digital privacy. The IOT is used to interact between the users and the new business operation in the digital platforms. The development of the IOT in the market creates new technical frameworks which are used to control the large and complex environment for the development of the IOT market. The development of IOT markets also creates a new question on the access and effects on various aspects of the governance, security and privacy of the user as well. The IOT is also similar to the virtual machine, which has all the digitals features and also has enhanced the personality of the users in various aspects like building the character of the users. The IOT platform opens new opportunities regarding the digitals as well as the physical world too for the users, who can interact any time with these digital platforms. The government needs to frame the cyber laws to protect the digital privacy and the security of the users while using the IOT services, which the IOT devices while, connected on the IP servers.

Aim

This research aims to analyze the IOT governance practices. The Internet of things is the concept which is based on the increasing support of the various stakeholders and the market forces. The Internet of things is complicated to implement and provide a solution for the complex type of problems (Trautman et al. 2020). The research is going to define the possibilities to encounter the complexity of the problems of the Internet of things in governance. To produce the reports on the Internet of things in governance, the data is analyzed on the complexity of implementation. The challenges come while implementing and the solution for the complexity to overcome from the implementation of the Internet of things in governance. The IOT also provides the solution for the complexity, which involves the different technologies and also helps to develop the plan for the development of the complex solution. The IOT services have lots lack invisibility and which results in unsecure backup. The report states the function of the IOT devices, which are rarely found on the IP server, is difficult to define what device is connected to what they perform as their function on the IP server (Williams et al., 2019).

Problem Statement

The IOT services have some problems which are based on the threads regarding the security challenges and the security schemes associated with the IOT services. The IOT services consisted of the connection of multiple wireless as well as the wired devices across the server have the prices as per the personalized devices which are connected over the server (Sarwono et al. 2018). The IOT devices connect to the servers, and the programs such as unique key identifiers and the secret keys in the storage devices are used to authenticate before connecting to the server to communicate with the other connected devices on the server. The device fails to provide the keys which are stored on the memory. The system starts to malfunction and fails to connect the server or pass the message to the other devices, such as the printer connected with the server, which fails to print the given instruction from another device using the same server for the business operation in this modern digital world. In IOT, the network securities are required to set up for the safety and the privacy of the user devices. The server needs to be end to end encrypted for the transmission of data and information from one device to another device. The servers use the protocol for the transmission, such as the TCP/IP and OSI model, to transmit the data packets over the server (Klein, 2018). The wireless devices in the IOT use the wireless devices are the "WPA-secure" Wi-Fi connection to connect the local router.

Background

The IOT (Internet of thing) based on the digital platform has not been found for a very long time. The IOT services digital platforms were started in the early 1800s. The IOT services are started with the vision to connect multiple devices, both the wired and the wireless, together with the common web server to transmit the data packets from one device to another device within the connected servers across (Lindman and Saarikko, 2019). In the 1830s, the machines were used to send the telegraphs, and in the 1840s generation, the new telegraphs were used and referred to the new telegraph as the wireless telegraphs, which used direct communication. In 1962 a new technology internet was developed as part of the DARPA ("defense advanced research projects agency") and later evolved into the ARPANET in 1969. The commercial services for public use were started in the year of the 1980s by the use of ARPANET. The GPS, which stands for global position system, is developed for the defenses in which the devices are connected with the highest function satellite to locate the location of the device based on the latitude and the longitude of the devices located on the globe. The newest technology on the Internet is developed the protocol IPv6 on which the transmission of the data packets is done across the devices on the server. The oldest versions of the protocol which are used by the system in transmission are based on the Pv4 version. The Internet of things, as the concept in 2013 is developed a lot. The Internet of things uses the technology to connect the wired and wireless devices across the Internet and perform the business operation on digital platforms by the users (Carr and Lesniewska, 2020).

Figure 1: the history of IOT

(source:https://cdn.slidesharecdn.com/ss_thumbnails/abriefhistoryofhowinternetofthingsbecomeathing-180626042528-thumbnail-4.jpg?cb=1529987216)

Scope

IOT is the future of the digital platform. The concept of the IOT is to develop the system using the various types of technologies, starting from accessing the Internet from the supercomputer to embedded systems. The IOT consists of various devices which start by switching on and off and access and connect the system to the Internet (Närvä, 2020). The users of which follow the IOT platforms for business and social, operational use is about 3.6 billion. The IOS users in the next three years are expected to grow by about 4.41 million. IOT nowadays is creating new ideas to organize things for transport networks. The IOT services provide an unlimited supply of opportunities to the users of the interconnected devices across the server. The present situation of the IOT is the best, which is reviewed for the various uses such as banking, creative and defense activities as well. The user can have exciting and creative time as well with these IOT services, which help to innovate and enhance the skills of the users (Saleem et al., 2018).

Objectives

  • To develop internet activities which are based on the interconnection of the devices to transmit the data packets over the Internet
  • To ensure the security of the users while connected with the Internet. The user performs online activities on the IOT platform which
  • To connect devices ranging from multiprocessing to embedded computers with the latest technologies to seamless connectivity of these devices.
  • To ensure customer privacy, the devices company regularly provides system updates in the device to enhance user privacy on the Internet.

Methodology

In every new report, the report is analyzed, and the methodologies help to understand the need and the working of the IOT in this project (Shahat et al. 2020). This report is going to discuss the working and needs of the IOT governances. The IOT servers provide support to the devices which is connect the Internet on the access the internet services. IOT methodology is based on the startup and thinks design. The aim and objective of the IOT are to make smart cities and develop the company, which leads them towards urbanizations. Concern of the IOT platform its services regarding privacy and the data securities while using the IOT platforms (Khan and Salah, 2018).

Project Plan:

Serial Number

Task

Effort

Start

End

Predecessors

Resources

1

Business objective

22 days

3/1/21 8:00 AM

3/30/21 5:00 PM

2

Research

Eight days

3/31/21 8:00 AM

4/9/21 5:00 PM

3

Correct Hardware selection

Ten days

4/10/21 8:00 AM

4/23/21 5:00 PM

4

Selection of Tools

15 days

4/24/21 8:00 AM

5/14/21 5:00 PM

5

Selection of IOT Platform

Ten days

5/15/21 8:00 AM

5/28/21 5:00 PM

6

Prototyping and implementation

25 days

5/29/21 8:00 AM

7/2/21 5:00 PM

7

Gather useful resource

Ten days

7/3/21 8:00 AM

7/16/21 5:00 PM

8

Apply Analytics

Five days

7/17/21 8:00 AM

7/23/21 5:00 PM

9

Implementation of Machine learning

45 days

7/24/21 8:00 AM

9/24/21 5:00 PM

10

Security testing

30 days

9/25/21 8:00 AM

11/5/21 5:00 PM

11

Delivery of the IOT Product

Five days

11/6/21 8:00 AM

11/12/21 5:00 PM

Table 1: Project tasks

(Source: self-created)

Figure 2: Project Gantt chart

(Sources: Self-created using Project libre)

Known Risks:

Risk

Risk event

likelihood

impact

Risk value

Risk monitoring

Management risk strategy

Review date Risk

1

Failure of implementation

2

9

77

Improve the design

11/12/2021

2

Internet failure

1

7

24

Manages the connection requirement take necessary to plan as per the speed required for the Hardware

29 April 2021

3

Security

9

9

80

Testing of the security

05 May 2021

4

Doing nothing

1

2

10

Do as per the need

30 April 2021

5

Hardware Failure

8

9

70

Select the best hardware

06 September 2021

Key:

  • Control Flags

o 75 High risk - Action required urgently

o 50 < 75 Medium risk - Action as soon as possible

o 25 < 50 Acceptable risk - Analyze issues on the project o raised to< 25 Low risk - No gain expected from mitigation of the project.

The risk is calculated and evaluated on the dates on which the reviews of the risk are found. The impact on the system and the likelihood can change during the execution of the program in the testing phase (Sousa et al., 2020). The risk of Failure of implementation is caused due to the selection of the wrong hardware as per the products. The product needs to be equipped with the latest hardware support on which the system is designed and implemented for the prototyping stage and implementation of the product, which is based on the IOT platform. The system implementation failure has high risk and shows 77% in the risk range. And the rating of the risk is 9 out of 10.

Internet failure is caused by the Failure of the links and sometimes the speed the service provider fails to provide the desired speed which is required for the implementation of the product which is based on the IOT platform (Carr et al. 2018). The range of Internet failure in risk management is 24 ranges. The rating in the risk rating of internet failure is about 7 out of 10.

Security is an important aspect of risk management. The system contains important personal information about the users. In order to provide a safe environment, security is an important aspect of the risk management system. The rating of the security in the range of the risk manager is about 9 out of 10 risk management ratings. The level of risk management is about 80% which is critical for risk management (Shimizu, 2017).

Doing nothing is considered as a very small risk in which the range 2 out of 10 impacted in the risk management profile. The doing nothing level is 10% of the risk management and can cut out the risk by making efforts on the production of the products as per the design and the implementation process are fixed for product strategy.

A hardware failure occurs for the wrong selection of the hardware selection of the production and the implementation process. The hardware failure can be fixed by choosing the correct hardware for product implementation and design. The hardware failure impacted level out of 10 is 7, which is the most critical risk in the risk management system. The range of the risk is about 7 out of 10 in the risk impact range.

Source and Use of Knowledge

The IOT (Internet of thing) is the emerging concept of technology in the sectors of the Internet (Thangaraj and Sangam, 2018). The IOT platform helps the users to connect to the Internet using the IOT devices to work on different sectors such as Social and economical operations. The industry now uses these IOT platforms for sale, buying and advertisement. All the commercial activities are performed on these IOT platforms. The impact of IOT on the economy is massive and impressive too. The presence of billions of users on the IOT platform makes the IOT platform a new digital hub for commercial and economic activities. The IOT devices range from sensors to embedded computers like smart watches, which are capable of connecting with internet services (Janssen et al. 2019). The search shows the importance of the IOT has evolved a lot for the service of the Internet from the two decades. The IOT services in the late 19s are only used by computer devices, and nowadays, wireless and wired devices are the latest devices which are used for IOT services. The new IOT devices examples are Super Computers, laptops, IPods, tablets, and the most important used device is mobiles devices. The information technologies are based on the Internet, and its interconnecting devices such as the laptop and the mobile devices which use to transmit the data across the server which are used for connecting each other. The device uses the URL (uniform resource locator) for transmitting and receives the data packets on the web platform. The IOT platforms are using the latest 4g technologies for the faster transmission of the data packets across the Internet for other connected devices. The current generation 4g technologies allow the average speed up to the 1mbps data transmission for the source device to the destination address on the Internet on which it uses the wireless transmission medium to download and upload the data on the server.

Ethical, Legal, Social, Security and Professional Concerns

The scope of the data is important to clearly identify the working and evolved internet services of IOT. The data collected must be used only for the aim and objective decision in the report. 

Research is based on the analysis of the data on the IOT services and the development of the market of IOT devices. The devices are available in wide ranges, from supercomputers to the embedded watches, which are used for the connection to the other devices using various sensors used in the devices. The data imported from the environment is analyzed and summarized as per the research aims and the objective.

The ethics of the construction of the report IOT based on the collection of the data related to the IOT platform and the services and rebuilding and construction of the real world entities for the compilation of the project report data. The report is generated by collecting the data from secondary methods of data collection that are self-generated and are not outsources from any sources. The efforts which are made to generate the act as the limit simulations. The data which are used in the reports are not taken away from any other reports, and the report is self-generated.

References List

Journal

Carr, M. and Lesniewska, F., 2020. Internet of Things, cybersecurity and governing wicked problems: learning from climate change governance. International Relations34(3), pp.391-412.

Carr, M.M., Lesniewska, F., Brass, I. and Tanczer, L., 2018. Governance and Policy Cooperation on the Cyber Security of the Internet of Things.

Janssen, M., Luthra, S., Mangla, S., Rana, N.P. and Dwivedi, Y.K., 2019. Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach. Internet Research.

Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems82, pp.395-411.

Klein, P., 2018. Contract definition and governance for IoT (Doctoral dissertation, Wien).

Lindman, J. and Saarikko, T., 2019, January. Towards an Internet of Things society: Perspectives from government agencies in Sweden. In Proceedings of the 52nd Hawaii international conference on system sciences.

Närvä, J., 2020. Governance models for an IoT-based energy internet using a multi-agent approach.

Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B. and Ande, R., 2018, June. IoT standardisation: Challenges, perspectives and solution. In Proceedings of the 2nd international conference on future networks and distributed systems (pp. 1-9).

Sarwono, R., Pratama, B. and Gunawan, A.B., IT GOVERNANCE OF THE BUSINESS INCUBATOR SERVICE: STARTUP READINESS LEVEL.

Shahat, E., Hyun, C.T. and Yeom, C., 2020. Conceptualizing Smart Disaster Governance: An Integrative Conceptual Framework. Sustainability12(22), p.9536.

Shimizu, K., 2017. Technological development in automotive industry and transformation in corporate governance system. Journal of governance & regulation, (6, Iss. 3), pp.46-54.

Sousa, M.J., Melé, P.M. and Gomez, J.M., 2020. Technology, governance, and a sustainability model for small and medium-sized towns in Europe. Sustainability12(3), p.884.

Thangaraj, M. and Sangam, R.S., 2018. Role and Challenges of IoT in e-Government. The Stances of e-Government: Policies, Processes and Technologies, p.101.

Trautman, L.J., Hussein, M.T., Ngamassi, L. and Molesky, M.J., 2020. Governance of the Internet of Things (IoT). arXiv preprint arXiv:2004.03765.

Williams, S., Hardy, C. and Nitschke, P., 2019, January. Configuring the Internet of things (IoT): a review and implications for big data analytics. In Proceedings of the 52nd Hawaii international conference on system sciences.

Free Download Full Sample
Recently Download Samples by Customers
Our Exceptional Advantages
Complete your order here
16000+ Project Delivered
Get best price for your work

Ph.D. Writers For Best Assistance

Plagiarism Free

offer valid for limited time only*