Dissertations / Theses on the topic 'Internet des objets social (IoT social)'

To see the other types of publications on this topic, follow the link: Internet des objets social (IoT social).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 32 dissertations / theses for your research on the topic 'Internet des objets social (IoT social).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social." Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'IoT social est un nouveau paradigme qui améliore la navigabilité des réseaux IoT et stimule la découverte de services en intégrant les contextes sociaux. Néanmoins, ce paradigme est confronté à plusieurs défis qui réduisent la qualité de ses performances. La confiance, en particulier les attaques de confiance, est l'un des défis les plus importants. Certains utilisateurs adoptent des comportements malveillants et lancent des attaques pour propager des services malveillants. Un mécanisme de gestion de la confiance est devenu une exigence majeure dans l'IoT social pour prévenir ces attaques en temps réel et garantir des expériences dignes de confiance pour les utilisateurs finaux. Cependant, peu de travaux ont abordé les questions de gestion de la confiance pour prévenir les attaques de confiance dans les environnements de l'IoT social. La plupart des études ont été menées pour détecter les attaques en mode hors ligne avec ou sans spécification du type d'attaque réalisée. En outre, elles n'ont pas pris en compte les propriétés de sécurité, telles que la cryptographie, la transparence et l'immutabilité, etc. A cet égard, nous devons traiter les transactions en continu pour prévenir ces attaques au niveau de la génération des transactions en temps réel tout en maintenant les propriétés de sécurité. Pour ce faire, nous avons comparé les techniques et technologies utilisées précédemment, dont le point commun est la prévention des attaques dans les contextes sociaux et l'IoT. Sur la base de ces comparaisons, nous avons indiqué que la technologie blockchain peut aider à développer un mécanisme de gestion de la confiance qui peut prévenir les attaques de confiance tout en maintenant la sécurité. Pour le temps réel, nous avons proposé de combiner un moteur de traitement de flux distribué, connu sous le nom d'Apache Spark, avec la technologie blockchain. Notre choix est basé sur une comparaison des moteurs de traitement de flux de données open source. En conséquence, nous proposons un nouveau mécanisme de gestion de la confiance, basé sur la blockchain et Apache Spark. Ce mécanisme permet de prévenir en temps réel tous les types d'attaques de confiance effectuées par des nœuds malveillants, afin d'obtenir un environnement fiable. L'expérimentation réalisée sur un jeu de données réelles nous permet de prouver la performance de notre proposition
The social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
2

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré
The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
3

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré
The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
4

Ciortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets." Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L’Internet des Objets (IoT) vise à créer un eco-système global et ubiquitaire composé d’un grand nombre d’objets hétérogènes. Afin d’atteindre cette vision, le World Wide Web apparaît comme un candidat adapté pour interconnecter objets et services à la couche applicative en un Web des Objets (WoT).Cependant l’évolution actuelle du WoT produit des silos d’objets et empêche ainsi la mise en place de cette vision. De plus, même si le Web facilite la composition d’objets et services hétérogènes, les approches existantes produisent des compositions statiques incapables de s’adapter à des environnements dynamiques et des exigences évolutives. Un autre défi est à relever: permettre aux personnes d’interagir avec le vaste, évolutif et hétérogène IoT.Afin de répondre à ces limitations, nous proposons une architecture pour IoT ouvert et autogouverné, constitué de personnes et d’objets situés, en interaction avec un environnement global via des plateformes hétérogènes. Notre approche consiste de rendre les objets autonomes et d’appliquer la métaphore des réseaux sociaux afin de créer des réseaux flexibles de personnes et d’objets. Nous fondons notre approche sur les résultats issus des domaines des multi-agents et du WoT afin de produit un WoT Social.Notre proposition prend en compte les besoins d’hétérogénéité, de découverte et d’interaction flexible dans l’IoT. Elle offre également un coût minimal pour les développeurs et les utilisateurs via différentes couches d’abstraction permettant de limité la complexité de cet éco-système. Nous démontrons ces caractéristiques par la mise en oeuvre de plus scénarios applicatifs
The Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
5

NITTI, MICHELE. "Managing the Internet of Things based on its Social Structure." Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Society is moving towards an “always connected” paradigm, where the Internet user is shifting from persons to things, leading to the so called Internet of Things (IoT) scenario. The IoT vision integrates a large number of technologies and foresees to embody a variety of smart objects around us (such as sensors, actuators, smartphones, RFID, etc.) that, through unique addressing schemes and standard communication protocols, are able to interact with each Others and cooperate with their neighbors to reach common goals [2, 3]. IoT is a hot research topic, as demonstrated by the increasing attention and the large worldwide investments devoted to it. It is believed that the IoT will be composed of trillions of elements interacting in an extremely heterogeneous way in terms of requirements, behavior and capabilities; according to [4], by 2015 the RIFD devices alone will reach hundreds of billions. Unquestionably, the IoT will pervade every aspect of our world and will have a huge impact in our everyday life: indeed, as stated by the US National Intelligence Council (NIC) [5], “by 2025 Internet nodes may reside in everyday things − food packages, furniture, paper documents, and more”. Then, communications will not only involve persons but also things thus bringing about the IoT environment in which objects will have virtual counterparts on the Internet. Such virtual entities will produce and consume services, collaborate toward common goals and should be integrated with all the other services. One of the biggest challenges that the research community is facing right now is to be able to organize such an ocean of devices so that the discovery of objects and services is performed efficiently and in a scalable way. Recently, several attempts have been made to apply concepts of social networking to the IoT. There are scientific evidences that a large number of individuals tied in a social network can provide far more accurate answers to complex problems than a single individual (or a small group of – even knowledgeable – individuals) [1]. The exploitation of such a principle, applied to smart objects, has been widely investigated in Internet-related researches. Indeed, several schemes have been proposed that use social networks to search Internet resources, to route traffic, or to select effective policies for content distribution. The idea that the convergence of the “Internet of Things” and the “Social Networks” worlds, which up to now were mostly kept separate by both scientific and industrial communities, is possible or even advisable is gaining momentum very quickly. This is due to the growing awareness that a “Social Internet of Things” (SIoT) paradigm carries with it many desirable implications in a future world populated by objects permeating the everyday life of human beings. Therefore, the goal of this thesis is to define a possible architecture for the SIoT, which includes the functionalities required to integrate things into a social network, and the needed strategies to help things to create their relationships in such a way that the resulting social network is navigable. Moreover, it focuses on the trustworthiness management, so that interaction among objects that are friends can be done in a more reliable way and proposes a possible implementation of a SIoT network. Since this thesis covers several aspects of the Social internet of Things, I will present the state of the art related to the specific research activities at the beginning of every Chapter. The rest of the thesis is structured as follows. In Chapter 1, I identify appropriate policies for the establishment and the management of social relationships between objects, describe a possible architecture for the IoT that includes the functionalities required to integrate things into a social network and analyze the characteristics of the SIoT network structure by means of simulations. Chapter 2 addresses the problem of the objects to manage a large number of friends, by analyzing possible strategies to drive the objects to select the appropriate links for the benefit of overall network navigability and to speed up the search of the services. In Chapter 3, I focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects and define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. Chapter 4 presents an implementation of a SIoT platform and its major functionalities: how to register a new social object to the platform, how the system manages the creation of new relationships, and how the devices create groups of members with similar characteristics. Finally, in Chapter 5, conclusions will be drawn regarding the effectiveness of the proposed Introduction 3 algorithms, and some possible future works will be sketched
6

Abdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'internet des Objets (IoT) est un paradigme qui a rendu les objets du quotidien, intelligents en leur offrant la possibilité de se connecter à Internet, de communiquer et d'interagir. L'intégration de la composante sociale dans l'IoT a donné naissance à l'Internet des Objets Social (SIoT), qui a permis de surmonter diverse problématiques telles que l'interopérabilité et la découverte de ressources. Dans ce type d'environnement, les participants rivalisent afin d'offrir une variété de services attrayants. Certains d'entre eux ont recours à des comportements malveillants afin de propager des services de mauvaise qualité. Ils lancent des attaques, dites de confiance, et brisent les fonctionnalités de base du système. Plusieurs travaux de la littérature ont abordé ce problème et ont proposé différents modèles de confiance. La majorité d'entre eux ont tenté de réappliquer des modèles de confiance conçus pour les réseaux sociaux ou les réseaux pair-à-pair. Malgré les similitudes entre ces types de réseaux, les réseaux SIoT présentent des particularités spécifiques. Dans les SIoT, nous avons différents types d'entités qui collaborent, à savoir des humains, des dispositifs et des services. Les dispositifs peuvent présenter des capacités de calcul et de stockage très limitées et leur nombre peut atteindre des millions. Le réseau qui en résulte est complexe et très dynamique et les répercussions des attaques de confiance peuvent être plus importantes. Nous proposons un nouveau modèle de confiance, multidimensionnel, dynamique et scalable, spécifiquement conçu pour les environnements SIoT. Nous proposons, en premier lieu, des facteurs permettant de décrire le comportement des trois types de nœuds impliqués dans les réseaux SIoT et de quantifier le degré de confiance selon les trois dimensions de confiance résultantes. Nous proposons, ensuite, une méthode d'agrégation basée sur l'apprentissage automatique et l'apprentissage profond qui permet d'une part d'agréger les facteurs proposés pour obtenir un score de confiance permettant de classer les nœuds, mais aussi de détecter les types d'attaques de confiance et de les contrer. Nous proposons, ensuite, une méthode de propagation hybride qui permet de diffuser les valeurs de confiance dans le réseau, tout en remédiant aux inconvénients des méthodes centralisée et distribuée. Cette méthode permet d'une part d'assurer la scalabilité et le dynamisme et d'autre part, de minimiser la consommation des ressources. Les expérimentations appliquées sur des de données synthétiques nous ont permis de valider le modèle proposé
The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
7

Ebrahiem, Waleed, and Naveed Arif. "Internet of Things : How vendors can use IoT to achieve value creation." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-144582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The IoT (Internet of Things) is developing rapidly, as a result of that, the number of connected devices in Sweden has doubled every year. According to big companies like Ericsson, the estimated number of connected devices worldwide will be 50 billion in 2020. IoT, by itself, may be a relatively simple concept of connected devices and machines, but its implications are profound. For companies in Sweden which offer a broad range of non-connected tools and products, it is becoming increasingly important to adapt their products to IoT; adherence to IoT will warrant new developments which offer value-added services such as monitoring and remote control, etc. The primary research method employed for this thesis is a case study at a vendor company who today offers their customers non-connected tools. To be able to demonstrate the concept of IoT enhanced tools we create a conceptual framework and a prototype, which we present to our interviewees and use as a starting point for qualitative interviews. In this thesis, we want to know how vendors could benefit themselves by the use of IoT in their businesses. We formulated some research questions, being, based on a vendor’s perspective: why do they (vendors) need connected products; how can such products be made marketable to the customer; and what are the predicted benefits of IoT-connected products for the customers? The case study brings to light some issues dealing with the business model, service providing, data display and data security which every company should take into consideration before implementing IoT.
8

Johansson, Fredrik, and Martin Göthe. "Internet of Things, bekvämt, men säkert? : En studie kring säkerhetsaspekter inom IoT." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-135063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The new technological phenomenon Internet of Things (IoT) is steadily growing and has become more incorporated into our daily lives. The technology can be found in a variety of applications in today's society and has helped to simplify and streamline tasks and processes. Analysts estimate that the market for IoT could potentially be worth 11 billion dollars by 2025. Large technology corporations are spending a vast amount of money to promote their IoT products, but we are also seeing companies which normally are not associated with IT making an entrance to make their products connected. During the fall of 2016 media reported about a big security breach within the IoT that affected security cameras and forced them to commit denial of service attacks. This event led us to take a closer look at the IoT and the security around the products. The aim of this study is to investigate how developers and security experts working with IoT perceive the current state of security and the possible threats and risks we face when using the technology. For this study we have used a qualitative approach with semi-structured interviews. A total of eight interviews were conducted equally divided between developers and security experts. Our results show that a common denominator between the respondents' answers was that the lack of standardization and platforms for IoT-applications is a problem. However, a unified security solution is currently unattainable due to the vast number of platforms present in IoT today. Therefore, the use of a standard or platform does not guarantee security. Also, with the increasing popularity of IoT, products from developers without the proper knowledge is becoming a serious security concern for the IoT.
9

Åkerlund, Mathilda. "IoT on Twitter : A Mixed Methods Study." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lundgren, Emil, and Markus Karmehag. "SAMBANDET MELLAN AUTONOMI OCH IoT-LÖSNINGAR I EN LINJEORGANISATION." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-173342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The 4th phase of the industrial revolution is focused on the relationship between the humans and the machines and how they can collaborate. We are going to look deeper into the relationship between autonomy and IoT-based solutions in a line organization with the help of a case study. In this case study, we discovered that the industry and their workers will benefit from using IoT-solutions to maintain more competitiveness to the market. With the use of IoT- based solutions such as a digital Dashboard, they get more reliable information and better ways of communication within the organization. Our study emphasizes the necessity of improving the autonomy within an industrial workplace. The personnel in an organization will be able to use IoTin a way to get more creative, gain more responsibility, keep a higher level of quality and make the work procedures more efficient.
11

Svensson, Jesper, Niclas Carlén, and August Forsman. "Innovating with sensors : A micro-level perspective investigating how IoT solutions affect work practices." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-147760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things is increasingly becoming an essential factor for organisational success. This study focuses on a micro level perspective how sensor-based IoT systems address process information requirements in organisations. The study encompasses three different cases were IoT-based systems were implemented and what the automational, informational and transformational effects have been on their processes. To gauge these effects, we have used a framework for assessing the business value of the IoT implementations. Moreover, we have used a framework for generating digital options to address the information requirements in processes. The purpose of the study is to measure the effects on business processes, how actors explore innovation opportunities enabled by IoT and how sensor-based system address information requirements. The results of the study identified several complex factors and contribute with practices on how to utilise sensor-systems as an enabling technology for continued process innovation.
12

Byrskog, Michael. "Interoperabilitetinom eHälsa : Enkvalitativ studie om användningen av IoT för glukosdata." Thesis, Mittuniversitetet, Avdelningen för data- och systemvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study is about interoperability in the collection and transmission of glucose data and focuses on a new eHealth technology. This technology is part of the Internet of Things (IoT) and involves interoperability in systems with sensors applied to the human body. The purpose has been to investigate the interoperability of data collection and transmission of glucose data based on the interoperability issues, how interoperability is used, and the pros and cons of different types of interoperability. A case study with six semi-structured interviews has been conducted. The analysis of the interviews has been conducted using a theoretical framework dealing with IoT and interoperability as well as a two-part interoperability model. The first part of the model has been used to analyze the occurrence of basic, functional and semantic interoperability in the collection and transmission of glucose data. The second part of the model has been used to analyze the information systems based on different maturity levels for interoperability. When collecting glucose data, there are basic, functional and to some extent semantic interoperability. When transmitting glucose data, basic and functional interoperability occur. Basic interoperability dominates here, except for one case. When collecting glucose data, messages and notifications and the automatic adjustment of medication have been identified as benefits. In the case of transmitting glucose data, the fact that respondents do not need to bring their device to caregivers and, in one case, that several users can see the glucose data collected have been identified as benefits. Some clear disadvantages have not been identified.The second part of the interoperability model has resulted in twomaturation levels for the interoperability of transmitting glucose data,"distributed organization-bound" and "integrated national".
Denna studie handlar om interoperabilitet vid insamling och vidarebefordran av glukosdata och fokuserar på en ny teknik inom eHälsa. Denna teknik är en del av Internet of Things (IoT) och involverar interoperabilitet inom system med sensorer som appliceras på människokroppen. Syftet har varit att undersöka interoperabiliteten vid insamling och vidarebefordran av glukosdata utifrån frågeställningarna om vilka olika sorters interoperabilitet som förekommer, hur interoperabiliteten används och vilka för- och nackdelar som finns med olika sorters interoperabilitet. En fallstudie med sex semistrukturerade intervjuer har genomförts. Analysen av intervjuerna har utförts med hjälp av ett teoretiskt ramverk som behandlar IoT och interoperabilitet samt en tvådelad interoperabilitetsmodell. Första delen av modellen har använts för att analysera förekomsten av grundläggande, funktionell och semantisk interoperabilitet vid insamling och vidarebefordran av glukosdata. Andra delen av modellen har använts för att analysera informationssystemen utifrån olika mognadsnivåer för interoperabiliteten. Vid insamling av glukosdata förekommer grundläggande, funktionell och i viss mån semantisk interoperabilitet. Vid vidarebefordran av glukosdata förekommer grundläggande och funktionell interoperabilitet. Grundläggande interoperabilitet dominerar här med undantag för ett fall. Vid insamling av glukosdata har meddelanden och notifikationer och den automatiska justeringen av medicinering framkommit som fördelar. Vid vidarebefordran av glukosdata har det faktum att respondenterna inte behöver ta med sin anordning till vårdgivarna och, i ett fall, att flera användare kan se de insamlade glukosdata framkommit som fördelar. Några tydliga nackdelar har inte kunnat identifieras. Andra delen av interoperabilitetsmodellen har resulterat i två mognadsnivåer för interoperabiliteten vid vidarebefordran av glukosdata, ”distribuerad organisationsbunden” och ”integrerad nationell”.
13

Davids, Natheer. "The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa." Master's thesis, Faculty of Commerce, 2021. http://hdl.handle.net/11427/32636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) has been acknowledged as one of the most innovative forms of technology since the computer, because of the influence it can have on multiple sectors of physical and virtual environments. The growth of IoT is expected to continue, by 2020 the number of connected devices is estimated to reach 50 billion. Recent developments in IoT provide an unprecedented opportunity for personalised services and other benefits. To exploit these potential benefits as best as possible, individuals are willing to provide their personal information despite potential privacy breaches. Therefore, this paper examines factors that influence the willingness to disclose personal information in the use of IoT in South Africa (SA) with the use of the privacy calculus as the theoretical underpinnings of this research. The privacy calculus accentuates that a risk-benefit trade off occurs when an individual decides to disclose their personal information, however, it is assumed that there are more factors than perceived risks and perceived benefits that influence information disclosure. After analysing previous literature, this study identified the following factors; information sensitivity, privacy concerns, social influence, perceived benefits, (perceived) privacy risks and privacy knowledge as possible key tenants in relation to willingness to disclose personal information. This research took on an objective ontological view, with the underlying epistemological stance being positivistic. The research incorporated a deductive approach, employing the use of a conceptual model which was constructed from a combination of studies orientated around privacy, the privacy calculus and the privacy paradox. Data for this research was collected using the quantitative research approach, through the use of an anonymous online questionnaire, where the targeted population was narrowed down to the general public residing within SA that make use of IoT devices and/or services. Data was collected using Qualtrics and analysed using SmartPLS 3. SmartPLS 3 was used to test for correlations between the factors which influence information disclosure in the use of IoT by utilising the complete bootstrapping method. A key finding was that the privacy paradox is apparent within SA, where individuals pursue enjoyment and predominantly use IoT for leisure purposes, while individuals are more likely to adopt self-withdrawal tendencies when faced with heightened privacy concerns or potential risks.
14

Vergara, Rammsy Andrea, Karolina Ekbäck, and Marcus Viksten. "Smart Omedelbart? : En kvalitativ studie om IoT och dess bidrag till smarthet inom offentlig verksamhet." Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-183641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The use of the Internet of Things is increasing in our society and it brings value to the public sector, companies and individuals' personal lives. There is however a strong indication that many Swedish municipalities do not use IoT. The use of IoT can contribute to smartness, efficiency and effectiveness, decreased costs and increased public value. Therefore it is problematic that it is not used to a greater extent. In this study we conduct interviews with IT-staff involved in IoT initiatives within Swedish municipalities to find out how they are working with IoT. Using related research and a theoretical framework called Dimensions of smartness in government we analyze how the municipalities are working with IoT and how it contributes to smartness. The results of the study suggest that working with IoT within the municipalities does contribute to smartness even though a majority of the municipalities state that they are in an early stage. We also conclude that the municipalities work on an operative level rather than a strategic level in implementing IoT-solutions. Organisational integration was identified as a vital part for successful IoT usage. This study will help municipalities with their journey on using IoT and making their municipality smarter by highlighting the important measures to take while working with the Internet of Things.
15

Winnberg, Lise-Lott, and Mimmi Jackléus. "IoT användning inom kommunal verksamhet : – i Östergötland." Thesis, Linköpings universitet, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things blir allt mer vanligt och inkluderas redan på vissa ställen i till exempel stadsplaner förnybyggnationer men finns även i smarta kontor och infrastruktur. Det finns en uppsjö med privatägdaföretag som specialiserat sig på IoT-lösningar och tillämpningar av detta på olika delar i samhället. Det ärredan på tal att installera IoT sensorer i vattenledningar till exempel så att underhåll kan förutses och därmedminska avvikelser av tillförsel samt minska eventuella förlust.I den här kvalitativa undersökning har vi studerat hur IoT används i kommuner, vad de tror IoT har förframtid i Sveriges kommuner samt hur de ser att IoT kan användas för att skapa nytta i kommunalaverksamheter, men också vad som kan tänkas vara ett hinder som står i vägen för att realisera detta.Efter att ha intervjuat ett antal kommuner över hela Östergötlands län har vi funnit att det i nuläget intefinns så mycket IoT i kommunerna och att det beror på flera orsaker. En av dem är att det råder brist påregelverk som behandlar IoT men även standardisering av IoT och vad införande av IoT lösningar faktisktinnebär i kommun eller stadssammanhang. Vad ska man satsa på? Om detta råder det osäkerhet, däremotom det fanns konkreta exempel med direkt verksamhetsnytta skulle det nog vara skillnad. Detta kanDigitaliseringsmyndigheten som kommer till hösten eventuellt råda bot på, men det verkar som att derasroll inte är så väldefinierad, och det märktes när vi pratade med respondenterna. De hade olikaförhoppningar av vad myndigheten kan bistå med eller vad deras arbete kommer att mynna ut i.Vi har även upptäckt att det inte finns några krav på statens sida på att kommunerna tar fram en strategisom behandlar IoT men även digitaliseringsstrategi. Trots detta har ett par respondenter redan endigitaliseringsstrategi eller jobbade på det.En annan orsak är att de finansiella medel kommunerna har i nuläget inte räcker till för en digital satsning,medlen behövs för att underhålla verksamheten. En kommuns fokus är alltid verksamheten ochmedborgarna. Om begränsade medel tvingar till ett val mellan investering i tekniska möjligheter, även omde kan generera större vinst i längden, och verksamhetsutveckling av annan form eller underhåll, kommeralltid verksamheten först. Som en av respondenterna förklarade, att om valet står mellan att bygga en nyförskola eller att investera i ett nytt teknikprojekt är det ganska självklart vart pengarna slutligen går.
The Internet of Things is becoming more common and more common and is already included in someplaces such as city plans for new buildings, in smart offices and infrastructure. There is a wealth ofprivately-owned companies specializing in IoT solutions and application of this to different parts of society.A great example is installing IoT sensors in water pipes so that maintenance can be foreseen, thus reducingsupply deviations and reducing any losses.In this qualitative bachelor thesis, we have investigated how IoT is used in municipalities, what they thinkIoT has to offer the future of Sweden's municipalities and how they see IoT can be used to create utility inmunicipal activities, but also what may be an obstacle in the process of realizing this.After interviewing a few of the municipalities across Östergötland County we have found that currentlythere are few IoT solutions in the municipalities and that it is due to several reasons. One of them is thelack of regulations that deal with IoT, but also the lack of standardisation of IoT, and what the introductionof IoT solutions would entail in municipalities or towns. What to invest in? There is some uncertainty there.If there were concrete examples of direct municipial operation benefit that would probably be a difference.This might possibly be resolved by the Digitaliseringsmyndigheten which will be established in the autumnhowever it seems that their role is not so well-defined, which we noticed when we spoke to respondents.They had different hopes of what the government can assist with or what their work would result in.We have discovered that there is no requirement for the state to provide municipalities with a strategy thataddresses the IoT or a digitization strategy. Nevertheless, a couple of respondents already have a digitizationstrategy or were working on it.Another reason is that the funds the municipalities currently have is not enough for such a venture, thosefunds are necessary to maintain and keep the municipal operation running. A municipality's focus is alwaysthe business and the citizens. If limited funds force a choice between investment in technical capabilities,although they can generate greater profit in the long run, and operational development of other forms ormaintenance, the operation will always come first. As one of the respondents explained, if the choice isbetween building a new preschool or investing in a new technology project, it is obvious where the moneyends up.
16

Terrab, Imane. "Dispositifs de Social Software et nouveaux régimes de collaboration : nature technique des outils, discours et modalités collaboratives." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLED050/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Depuis près d'une décennie, les outils issus du Web 2.0 s'insèrent dans la sphère de l'entreprise et sont présentés comme participant d'un changement technologique et managérial majeur. Pour autant, on constate des lacunes théoriques dans la caractérisation des régimes collaboratifs proposés par ces nouveaux objets, réunis sous la bannière du Social Software. Nous proposons ici d'explorer les dimensions à travers lesquelles les objets de Social Software proposent un renouvellement des régimes collaboratifs. Ce projet nous amène d'abord à présenter les évolutions techniques et paradigmatiques entre Groupware et Social Software. Dans un deuxième temps, nous réalisons une exploration empirique du champ via l'analyse des discours commerciaux d'éditeurs de Social Software et la présentation de quatre dispositifs que nous qualifions au regard des taxonomies issues des champs du Computer Supported Cooperative Work et de l'Entreprise 2.0. Nous enrichissons cette analyse par la modélisation des trajectoires d'évolution des quatre dispositifs faisant l'objet de nos études de cas, au travers d'un cadre conceptuel centré sur l'objet technique. Enfin, nous proposons un cadre inédit pour la caractérisation des régimes de collaboration proposés par les dispositifs de Social Software. Cette recherche nous amène à rediscuter des liens entre les technologies et les modalités de pilotage de l'action collective dans les organisations
For the last decade, Web 2.0 tools have entered the corporate sphere and are considered as part of a major technical and managerial shift. However, there is still a lack of theoretical framework to define the collaborative regimes that the new objects of Social Software carry. In this dissertation, we explore the dimensions through which Social Software objects offer a renewal of collaborative regimes. First, we highlight the technical and paradigmatic evolutions between Groupware and Social Software. Then we carry an empirical exploration of the field of Social Software, by analyzing publishers' commercial discourse and presenting four devices that we describe through the taxonomical frameworks of Computer Supported Cooperative Work and Enterprise 2.0. This analysis is supplemented by the modelization of the four devices' evolution paths, relying on a conceptual framework that focuses on the technical object. Finally, we suggest a novel framework to define the collaboration regimes proposed by Social Software devices. This research leads us to further discuss the links between technology and the management of collaboration
17

Henriksson, Joar, and Daniel Gustavsson. "Vårdplaceringsproblematik på Norrlands Universitetssjukhus : En fallstudie gällande vårdplaceringsprocessen och hur IoT kan användas inom den." Thesis, Umeå universitet, Institutionen för informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-159182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The complex process of patient placement within a hospital is a big challenge. The main focus in the process is how to coordinate clinics to make sure that the patients get the best possible care. The rise of digital health has led to a greater use of technologies to facilitate the activities within the hospitals’ processes. This study has been focusing on how Internet of Things can be used in the patient placement process. Respondents to participate in the interviews were chosen with help from a coordinator based on their experience within the study area of interest. Observations were done in meetings where the staff discussed patient placements. From a perspective of problem based coordination, a thematic analysis was done on the collected data and from the themes that were created a solution was presented. The object of this study is to map the process of patient placement and to present an analytic approach on how to facilitate the patient placement process with the use of Internet of Things. Our proposed approach will contribute to a greater understanding of the patient placement process and how Internet of Things can be used within it.
18

Filip, Tomas, and Kobets Kirill. "Internet of Things inom integrerad vård för äldre : En kvalitativ studie ur ett säkerhetsperspektiv." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-98143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
I samma takt som den äldre populationen i de flesta länder fortsatt växer så ökar efterfrågan för äldrevård. Samtidigt har Internet of Things (IoT) snabbt blivit ett av det mest välkända och omtalade begreppet kring företag och teknologi. Ett tillämpningsområde som IoT idag riktar sig mot är hälso- och sjukvården. IoT förväntas inom detta område kunna förse äldre med integrerad vård som i framtiden kan minska sjukvård och kostnader. Teknologins alla fördelar har dock även medfört nackdelar i form av nya säkerhetsattacker och sårbarheter i hälso- och sjukvårdssystemen. Problemet med IoT teknologin är att den i dagsläget inte stöds av adekvata åtgärder för sekretess och säkerhet. Syftet med studien var att undersöka hur frågor kring säkerhet påverkar utvecklingen av IoT lösningar riktade mot integrerad vård för äldre. Via semi-strukturerade intervjuer med fem informanter med erfarenhet och kompetens inom området för integrerad vård för äldre, IoT och säkerhet kunde empirin för studien samlas in. Vidare analyserades det empiriska resultatet tillsammans med litteraturen vilket resulterade i att ett antal faktorer som påverkar utvecklingen av IoT lösningar riktade mot integrerad vård för äldre identifierades. Resultatet för studien visar att faktorerna tid, ekonomi och användarvänlighet påverkar aktörers val av att prioritera funktionalitet före säkerhet under utveckling. Aktörer tvingas istället göra ett antal avvägningar och arbeta på olika sätt för att implementera tillräcklig säkerhet i sina IoT lösningar. Vidare visar resultatet att bristen på tydliga riktlinjer och standarder är en faktor som påverkar aktörers förenlighet med lagar och regler som ställer hårda krav på säkerheten. Utöver detta visar resultatet att det är viktigt att definiera ägandefrågan under utvecklingsstadiet eftersom frågan i dagsläget är otydlig och diffus.
As the elderly population in most countries continues to grow, the demand for elderly care is increasing. At the same time, the Internet of Things (IoT) has quickly become one of the most well-known and widely spoken concept of business and technology. One area of use that IoT is currently addressing is healthcare. In this area, IoT is expected to be able to provide the elderly with integrated care that in the future can reduce healthcare and costs. All the advantages of IoT have also brought disadvantages in the form of new security attacks and vulnerabilities in the health care systems. The problem with the IoT technology is that it is not currently supported by adequate privacy and security measures. The purpose of the study was to investigate how security issues affect the development of IoT solutions aimed at integrated care for the elderly. Through semi-structured interviews with five informants with experience and competence in the field of integrated care for elderly, IoT and security, the empirical data for the study could be collected. Furthermore, the empirical result was analyzed together with the literature, and a number of factors were identified that have influence on the development of IoT solutions aimed at integrated care for the elderly. The results of the study show that the factors of time, economy and user friendliness affect the actors' choice of prioritizing functionality before security during development. Instead, actors are forced to make a number of tradeoffs and work in different ways to implement adequate security in their IoT solutions. Furthermore, the results show that the lack of clear guidelines and standards is a factor that influences actors' compliance with laws and regulations that impose strict safety requirements. In addition, the results show that it is important to define the ownership issue during the development stage, as the issue is currently unclear and diffuse.
19

Rosell, Mathias. "Hur bör manipulation av IoT-enheter i det smarta hemmet hanteras och åtgärdas av användare och utvecklare : En systematisk litteraturstudie för att kartlägga åtgärder för smarta hem." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
IoT-enheter är för många människor idag en del av vardagen och fler och fler enheter ansluts till människors hushåll. Smarta hem har allt från kylskåp och övervakningskameror som är anslutna till ett nätverk och internet. Problematiken med det är att många av dessa enheter har inte tillräcklig kapacitet eller en avsaknad av tillräckliga säkerhetsåtgärder för att skydda sig mot potentiella attackvektorer. Bristande säkerheten för enheter i det smarta hemmet kan leda till att enheterna blir hackade och manipulerade av angripare. Den som kan skydda det smarta hemmet mot manipulation av dess IoT-enheter är både användare i det smarta hemmet och utvecklare av enheterna. Men det är inte alltid tydligt för vem åtgärden gäller, vilket är något den här studien vill klargöra. Den här litteraturstudien utgår från befintliga åtgärder identifierade av tidigare forskning. Den skiljer sig från den tidigare forskningen genom att kartlägga vilka åtgärder som är applicerbara för användare och utvecklare för att skydda det smarta hemmet mot manipulation. Med hjälp av en systematisk litteratursökning valdes 22 studier ut för att besvara studiens frågeställning. För att besvara studiens forskningsfråga används en kartläggande granskningsmetod. Metoden används för att kartlägga och identifiera vilka åtgärder som rekommenderas för både användare och utvecklare. Med hjälp av den tidigare forskningen framställs ett ramverk för att förtydliga vad användaren i det smarta hemmet själv utföra och vilka åtgärder utvecklare kan och bör utföra. Ramverket demonstrerar dessutom en rekommenderad ordning från författaren som åtgärderna bör utföras i.
Users of IoT devices are for many people today part of everyday life and more and more devices are connected to people's households. Smart homes have everything from refrigerators and surveillance cameras connected to a network and the internet. The problem with this is that many of these units do not have sufficient capacity or lack adequate security measures to protect themselves against potential attack vectors. Lack of security for devices in the smart home can cause the devices to be hacked and manipulated by attackers. Those who can protect the smart home from tampering with its IoT devices are the users in the smart home and the developers of the IoT devices. Although it is not always clear for whom the security measures apply to, which is something that this study aims to clarify. This literature study is based on existing security measures identified by previous research. It differs from previous research by mapping out which security measures and best practices that are applicable to users and developers to protect the smart home from being manipulated. Using a systematic literature search, 22 studies were selected to answer the study's question. To answer the study's research question, a mapping method is used. The method is used to map and identify which actions are recommended for both users and developers. Using the previous research, a framework is created to clarify what the user in the smart home can do and what actions developers can and should take. The framework also demonstrates a recommended order from the author in which the measures should be carried out.
20

Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters.  This bachelor’s thesis aims to discover how a IT-company can work with security management within the Internet of Things, this is done by looking into how a IT-company can work with updating, monitoring and responding within the Internet of Things, as well what challenges there are with working with this.  A qualitative research approach was used for this case study along with an interpretative perspective, as well as abductive reasoning. Interviews were performed with employees of a large IT-company based in Sweden, along with extensive document analysis.  Our bachelor’s thesis results in challenges with Security Management within the areas updating, monitoring and responding along with how our Case Company works with these security challenges. Largely these challenges can be summarized that everything is harder with the number of devices there are within the Internet of Things
Internet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera.  En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys.  Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
21

Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
22

Ben, Saied Yosra. "Collaborative security for the internet of things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cette thèse aborde des nouveaux défis de sécurité dans l'Internet des Objets (IdO). La transition actuelle de l'Internet classique vers l'Internet des Objets conduit à de nombreux changements dans les modèles de communications sous-jacents. La nature hétérogène des communications de l’IdO et le déséquilibre entre les capacités des entités communicantes qui le constituent rendent difficile l'établissement de connexions sécurisées de bout en bout. Contrairement aux nœuds de l’Internet traditionnel, la plupart des composants de l'Internet des Objets sont en effet caractérisés par de faibles capacités en termes d'énergie et de puissance calcul. Par conséquent, ils ne sont pas en mesure de supporter des systèmes de sécurité complexes. En particulier, la mise en place d'un canal de communication sécurisé de bout en bout nécessite l’établissement d'une clé secrète commune entre les deux nœuds souhaitant communiquer, qui sera négociée en s'appuyant sur un protocole d'échange de clés tels que le Transport Layer Security (TLS) Handshake ou l’Internet Key Exchange (IKE). Or, une utilisation directe de ces protocoles pour établir des connexions sécurisées entre deux entités de l’IdO peut être difficile en raison de l'écart technologique entre celles-ci et des incohérences qui en résultent sur le plan des primitives cryptographiques supportées. Le sujet de l'adaptation des protocoles de sécurité existants pour répondre à ces nouveaux défis a récemment été soulevé dans la communauté scientifique. Cependant, les premières solutions proposées n'ont pas réussi à répondre aux besoins des nœuds à ressources limitées. Dans cette thèse, nous proposons de nouvelles approches collaboratives pour l'établissement de clés, dans le but de réduire les exigences des protocoles de sécurité existants, afin que ceux-ci puissent être mis en œuvre par des nœuds à ressources limitées. Nous avons particulièrement retenu les protocoles TLS Handshake, IKE et HIP BEX comme les meilleurs candidats correspondant aux exigences de sécurité de bout en bout pour l'IdO. Puis nous les avons modifiés de sorte que le nœud contraint en énergie puisse déléguer les opérations cryptographiques couteuses à un ensemble de nœuds au voisinage, tirant ainsi avantage de l'hétérogénéité spatiale qui caractérise l’IdO. Nous avons entrepris des vérifications formelles de sécurité et des analyses de performance qui prouvent la sureté et l'efficacité énergétique des protocoles collaboratifs proposés. Dans une deuxième partie, nous avons porté notre attention sur une classe d’attaques internes que la collaboration entre les nœuds peut induire et que les mécanismes cryptographiques classiques, tels que la signature et le chiffrement, s'avèrent impuissants à contrer. Cela nous a amené à introduire la notion de confiance au sein d'un groupe collaboratif. Le niveau de fiabilité d'un nœud est évalué par un mécanisme de sécurité dédié, connu sous le nom de système de gestion de confiance. Ce système est lui aussi instancié sur une base collaborative, dans laquelle plusieurs nœuds partagent leurs témoignages respectifs au sujet de la fiabilité des autres nœuds. En nous appuyant sur une analyse approfondie des systèmes de gestion de confiance existants et des contraintes de l’IoD, nous avons conçu un système de gestion de confiance efficace pour nos protocoles collaboratifs. Cette efficacité a été évaluée en tenant compte de la façon dont le système de gestion de la confiance répond aux exigences spécifiques à nos approches proposées pour l'établissement de clés dans le contexte de l'IdO. Les résultats des analyses de performance que nous avons menées démontrent le bon fonctionnement du système proposé et une efficacité accrue par rapport à la littérature
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
23

Attié, Elodie. "The connected consumer : A theoretical framework of consumer adoption/consequences of the Internet of Things and smart connected objects." Thesis, Toulouse 1, 2019. http://www.theses.fr/2019TOU10048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le résumé en français n'a pas été communiqué par l'auteur
Over the last decade, technological and Internet innovations have increasingly invaded the consumer market (N’Goala, 2016). The Internet of Things (IoT) is becoming a common platform, and disrupts relationships between consumers and companies (Bohli et al., 2009); in essence, this is a timely research. The major goal of this thesis is to deepen the understanding of the acceptance and the adoption processes of the IoT and smart connected technologies, as well as the related consequences on perceived well-being. To do this, four contexts of study have been explored: smart connected objects, smart sleep applications, smart homes, and smart stores. First, we performed qualitative exploratory studies, and secondly we conducted quantitative studies to build conceptual models according to our qualitative findings and the literature. The results show that technology benefits are the first factors that enable technology acceptance through perceived usefulness and perceived ease of use; subsequently, self-improvement, through perceived social image and well-being benefits, are the main reasons to continue using the IoT and smart connected technologies. The acceptance and the adoption of these technologies also depend on users’ personality traits while perceived risks and fears on the use of the personal data are the main barriers. In turn, the IoT and smart connected technologies influence perceived well-being according to the experience of use, personality traits, and the technology
24

Masséus, Jonatan. "Where Did The Car Go? : Smart cities, calm technology and the future of autonomous cars." Thesis, Internationella Handelshögskolan, Jönköping University, IHH, Informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Urbanization has been a growing trend in the past fifty years. Cities are now transforming into smart cities, spaces whose infrastructure comprises an embedded digital layer. Hardware collects real-time data in the urban environment and software elaborates it to improve all types of services, from traffic to waste management to well-being. One technology that is expected to use this digital layer to further change the urban environment is the autonomous car. The purpose of this dissertation is to explore what key design attributes future autonomous cars should possess if they have not only to co-exist with and be accepted by people in the landscape of tomorrow’s smart cities, but also what they should not possess in order not to cause any harm. In this sense, the dissertation recognizes calm technology to be necessary in the design of a future autonomous car to support a human-centered, as opposed to a car- or technology-centered, environment. A socio-technical and systemic lens is applied to the phenomenological investigation of nine companies carried out by means of twelve in-depth semi-structured interviews with experts working within the automotive sector, the smart city industry, and calm technology. Eight attributes (safety, on-demand, geo-tracking, sharing, multiple purposes, communication through smart devices, electrical care and IoT/connectedness) are identified as necessary for future autonomous cars to implement in order to take advantage of the smart city infrastructure and provide a human-centered experience. Additionally, six out of the eight calm technology principles recognized in literature are considered necessary when designing future autonomous cars.
25

Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le paradigme de l'Internet des choses établit l'interaction et la communication avec une énorme quantité d'acteurs. Le concept combine un grand nombre de technologies et de protocoles et des adaptations des éléments préexistants pour offrir de nouveaux services et applications. Une des technologies clés de l'Internet des objets est l'identification par radiofréquence abrégée en anglais RFID («Radio Frequency Identification»). Elle propose un ensemble de solutions qui permettent le suivi et la traçabilité des personnes, des animaux et pratiquement n'importe quel objet en utilisant des liaisons sans fil. En considérant le concept de l'Internet des choses, plusieurs technologies doivent être liées afin de fournir des interactions qui conduisent à la mise en œuvre de services et d'applications. Le défi est que ces technologies ne sont pas nécessairement compatibles et conçues pour fonctionner ensemble. Dans ce contexte, l'objectif principal de cette thèse est de concevoir un « framework » hétérogène qui permettra l'interaction de divers dispositifs tels que la RFID, des capteurs et des actionneurs afin de fournir de nouvelles applications et de services. À cet effet, notre première contribution est la conception et l'analyse d'une architecture d'intégration pour les dispositifs hétérogènes. Dans la seconde contribution, nous proposons un modèle d'évaluation de la topologie RFID et un outil d'optimisation pour la planification de réseaux de cette technologie. Enfin, nous avons implémenté une version simplifiée du framework en utilisant du matériel embarqué et indicateurs de performance sont fournis ainsi que la configuration détaillée de la plateforme de test
The Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
26

Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
27

Oliveira, Ellis Bezerra de Mendonça. "Internet das coisas (IoT) e a Proteção dos dados." Master's thesis, 2021. https://hdl.handle.net/10216/138486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chih-HsiangShao and 邵致翔. "A Group Handoff Scheme for Proximate Data Sharing Using the Social Internet of Thing (S-IOT) Mechanism." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71930925312618906682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
國立成功大學
資訊工程學系
105
Internet of Things (IOT) emerge in large numbers surrounding us and it has already been along with us everywhere. The things not only communicate with each other without human intervention but also own some relationships called Social IOT (S-IOT), which is the same as social relationships of human beings. In this work, architecture and scheme for a group handoff from a mobile AP to a fixed AP and vice versa, for which the group is for downloading and sharing of geo touring information, e.g., Point Of Interest’s (POI’s), using the proposed S-IOT mechanism. Using the proposed mechanism, all handheld devices in a touring group can communicate with each other and then have the group handoff from a mobile AP to a fixed AP and vice versa automatically and transparently to provide the required POI’s content in a more efficient way. This work (1) defines an S-IOT architecture and two functional scenarios called m-AP mode and f-AP mode for group touring, (2) proposes two control schemes called conservative mode and aggressive mode to handle the handoff from m-AP mode to f-AP mode, and (3) provides control schemes for handoff from m-AP mode to f-AP mode and vice versa. A real system is developed using the Android system and the performance analysis is evaluated from the perspective of power consuming, service time, etc.
29

Pastor, Liliana Luísa Dória. "A nova era do comércio digital: criação de valor na realidade portuguesa: pequenas e médias empresas portuguesas." Master's thesis, 2018. http://hdl.handle.net/10773/26770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
O IOT (Internet Of Things) é o meio mais utilizado para compartilhar, coletar e pesquisar informações. Milhões de usuários utilizam a Internet diariamente para uma variedade de recursos, incluindo um novo modelo de negócios que é cada vez mais sentido com maior influência no mercado: e-commerce. Segundo Nisar & Prabhakar (2017), “o e-commerce é um dos fenómenos mais importantes em crescimento”. “Os custos do comércio interno reduzem o bem-estar agregado e resultam num pior acesso a bens de consumo em cidades pequenas e remotas. Como uma nova tecnologia comercial, o comércio eletrónico pode aumentar o comércio entre cidades e aliviar a desigualdade de consumo espacial porque (1) elimina o custo fixo de entrada no mercado e (2) reduz os efeitos da distância sobre os custos do comércio.” (Fan, Tang, Zhu, & Zou, 2018) Segundo a AICEP, em Portugal, as vendas aumentaram de 1,7 mil milhões de euros para 4,6 mil milhões de 2009 para 2017. Prevê-se que o crescimento bruto duplique até 2025. Apesar do crescimento exponencial das vendas online, Portugal continua a estar nos lugares mais baixos do ranking mundial. Em seguida, surgiram questões relativas à posição de Portugal no comércio eletrónico que são interessantes de analisar do ponto de vista académico e profissional. Quais estratégias precisamos implementar para garantir o sucesso do comércio eletrónico? Para responder à questão central do trabalho de pesquisa, foi feita uma análise dos dados primários e secundários, além de entrevistas em profundidade com algumas empresas que investiram no comércio eletrónico. Para uma análise quantitativa, realizamos pesquisas por questionário, a fim de ter uma visão genérica do funcionamento de algumas empresas. As conclusões deste estudo apontam para a tendência das empresas em apostar no ecommerce para obter mais rentabilidade do modelo de negócio. Este estudo permitiu definir sugestões práticas para empresas portuguesas de forma a contribuir para o seu modelo de negócio.
The IOT (Internet Of Things) is the most used means for sharing, collecting and searching information. Millions of users use the Internet on a daily basis for a variety of features, including a new business model that is increasingly being felt with greater influence in the market: e-commerce. "The costs of domestic trade reduce aggregate welfare and result in poorer access to consumer goods in small and remote cities. As a new commercial technology, e-commerce can increase trade between cities and alleviate spatial consumption inequality by (1) eliminating the fixed cost of entry into the market and (2) reducing the effects of distance on the costs of trade. " (Fan, Tang, Zhu, & Zou, 2018) According to AICEP, in Portugal, sales increased from 1.7 billion euros to 4.6 billion euros from 2009 to 2017. Gross growth is forecast to double by 2025. Despite the exponential growth of online sales, Portugal still remains in the lowest places in the world ranking. Then there were questions regarding Portugal's position in e-commerce that are interesting to analyze from an academic and professional point of view. What strategies do we need to implement to ensure the success of e-commerce? To answer the central question of the research work, an analysis of primary and secondary data was done, as well as in-depth interviews with some companies that invested in ecommerce. For a quantitative analysis, we conducted surveys by questionnaire, in order to have a generic view of the way some companies operate. The conclusions drawn from this study point to the tendency of companies to bet on ecommerce in order to obtain more profitability from the business model. This study made it possible to define practical suggestions for Portuguese companies in order to make a contribution to their business model.
Mestrado em Marketing
30

Singar, Arjun V. "A Relational Study of Personality Traits, Learning Styles, Learning Competencies, Learning Methods, and Assessment Methods for Engineering and Management Students Studying the Internet of Things Related Knowledge Areas." Thesis, 2022. https://etd.iisc.ac.in/handle/2005/5771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
According to India's Human Resource Development Ministry, as of 2019, 6000 plus engineering institutions across India enrolled 2.9 million students every year. They also mentioned that nearly 1.5 million students graduated and entered the job market every year. Of these, 30% were employable, and only 7% were skilled. In this era of technology-intensive organizations and automation, the expectations set by the industries on the higher educational institutions have been to have the students quite well-skilled and partially industry-ready. Hence, the government of India suggested that higher educational institutions consider the academic requirements of the workforce developing intelligent technologies and thereby facilitate such required knowledge areas using appropriate learning methodologies. As per Gartner's Hype Cycle, one such intelligent technology in this industry 4.0 era, considered for my study, is the Internet of Things (IoT). Courses revolving around the IoT are currently offered to engineering and management students as there is a demand for technology developers and managers in the industries. Further, given the learning process, students exhibit different ways of learning with regards to their learning styles and learning methods. It is observed that personality traits play an essential role in the preferred learning styles, and the learning methods are significantly related to the assessment methods of the students. It is also observed that the learning styles are significantly related to the learning methods, and the learning competencies have a significant impact on the learning methods in an educational setting. Hence, a clear understanding of the associations mentioned above is pivotal. By examining these relationships for those students studying the Internet of Things related knowledge areas, the current study is a step forward in engineering and management education as it could potentially lead to better learning outcomes. Subsequently, the following four objectives are framed to address the research study: 1. To assess and relate the personality traits with the learning styles 2. To assess and relate the learning methods with the assessment methods 3. To relate the learning styles and the learning competencies with the learning methods 4. To provide recommendations in the process of learning and assessment methodologies The objective of the study is to understand the relationship between constructs. The hypotheses are then postulated wherein their validity is accepted or rejected based on the statistical tests. This study has adopted the primary data collection method by using a 5-point Likert scale-based questionnaire as the primary research instrument. The sample respondents selected were final year engineering students pursuing their studies in programs such as computer science, information science, electronics and communications, and final year management students pursuing their studies in programs such as industrial engineering management, data sciences, information systems, and business management. Students for the study were selected from those colleges that offered the IoT related knowledge areas as core courses in their respective engineering and management programs. A total of 2315 respondents studying the IoT related knowledge areas were sampled, of which 1588 were from the engineering program, and 727 were from the management program. Those students selected for the study were from colleges across the state of Karnataka in the southern part of India. Descriptive statistics facilitate the summarization of the recorded data by describing the association between variables within the sample. The application of the descriptive statistics method assisted in analyzing the constructs items-wise and dimension-wise for engineering and management students. After descriptive statistics, an independent t-test was applied for testing the proposed hypotheses. The t-test for this study assisted in understanding the significant difference in the path of the constructs among engineering and management students. Further, a correlation matrix was developed between the constructs for both engineering and management students. This test in the study assisted in understanding the degree of association between the independent and the dependent variables among engineering and management students. In the end, the application of PLS-SEM was performed to evaluate the relationship frameworks with the constructs under the study. This test for the study assisted in establishing the reliability and the validity of the constructs, outer model loadings of the reflective constructs, explanatory power between the constructs, and the significance of the relationship between the constructs through bootstrapping analysis. The study shows a significant relationship between the constructs for all the above associations for engineering and management students. The study also shows the impact of learning competencies over learning styles on the learning methods for students. However, the study shows no significant difference in the path of the relationship between the constructs among engineering and management students. Understanding the linkages between personality traits and learning styles, learning methods and assessment methods, and learning styles and learning competencies with learning methods assist the students in their learning process. This research in the future could help educators grasp the complex nature of student diversity and relate them to different kinds of assessments that could potentially enhance the students' learning outcomes. Instructors who recognize the importance of personality traits, learning styles, and learning competencies and consider them vital for effective learning may design courses, assignments, and other teaching and learning approaches that encourage students to adopt required learning methods. Later, a forced-choice questionnaire was given to all the students in the sample. The forced-choice questionnaire consisted of preferences that were opted by the students. One set of preferences consisted of existing practices in the process of learning and assessment methodologies, and the other set of preferences consisted of possible changes to the existing practices suggested by the literature and the faculties. Based on the students' preferences and the faculties' feedback, possible changes to the learning and assessment methodologies framework are recommended. With the implementation of this framework, the potential impact on the students towards enabling their learning effectiveness and the possible institutional outcomes towards enhancing the research output are highlighted. Further, universities in India could use this proposed learning and assessment methodologies framework for further validation and studies for other programs. They could have a control group and a test group to see which one of the two, i.e., existing practices or proposed framework for learning and assessment, enables better learning and research outcomes.
31

Thiffault-Chouinard, Nicolas. "La preuve civile et les interactions avec les assistants vocaux, un point de vue comparé." Thesis, 2019. http://hdl.handle.net/1866/24457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les récents développements de l’intelligence artificielle, de l’Internet des objets et des outils de reconnaissance vocale, couplés à la démocratisation des appareils électroniques de grande consommation et à la couverture Internet étendue maintenant disponible dans plusieurs pays industrialisés, ont permis la mise en marché à grande échelle d’assistants vocaux personnels, qui consistent en des logiciels installés sur différents appareils tels que des téléphones cellulaires et des haut-parleurs connectés permettant aux utilisateurs de ces appareils d’interagir avec ceux-ci au moyen de commandes vocales. L’adoption de technologies permettant aux utilisateurs d’interagir avec des objets connectés à l’Internet au moyen de leur voix connaît une forte croissance, et celles-ci constitueront bientôt l’un des modes d’interaction privilégiés pour utiliser l’Internet. Considérant la vaste nature des opérations réalisées au moyen de l’Internet en général et de l’Internet des objets en particulier, il convient de se questionner sur la manière de documenter les interactions entre un utilisateur et un assistant vocal. Le présent mémoire adopte une approche comparant le cadre juridique québécois à différents cadres juridiques avec l’objectif de procéder à une qualification technique et juridique des assistants vocaux et des éléments de preuve en découlant. Dans un second temps, ce mémoire s’intéresse à la recevabilité et à la force probante de ces éléments de preuve dans le contexte du droit civil québécois. L’auteur se penche sur les conditions de recevabilité, discutant de la qualification du document technologique et de ses attributs, nommément ainsi qu’en premier lieu son authenticité et son intégrité et de la proportionnalité. L’auteur discute des exceptions à la recevabilité, soit spécifiquement l’atteinte aux droits fondamentaux et le respect du secret professionnel. Ensuite, l’auteur discute de la force probante de la preuve technologique en avançant que la compréhension de la technologie sous-jacente est l’élément clef dans l’évaluation de la force probante de tout élément de preuve technologique. L’auteur propose que l’intelligence artificielle relève d’une nouvelle catégorie de preuve qui commande peut-être des changements à la procédure et aux principes judiciaires québécois.
Recent developments in the fields of artificial intelligence, of the Internet of Things and of voice recognition, together with the accessibility to electronic devices and wide Internet connection in the industrialized countries, led to the introduction of virtual personal assistants. This software, installed on various devices such as mobile phones and smart speakers, allow their users to interact with these devices using their voice. As these technologies allow their users to interact with connected devices through the Internet, they will most likely become the main gateway to the Internet in a near future. Considering the great variety of tasks performed with connected devices, the legal questions regarding evidence generated by and collected from their use must now be asked. First, this master’s thesis will compare the normative frameworks of both Quebec and other jurisdictions in order to define, technologically and legally, the virtual personal assistants and the evidence they generate. In a second time, this thesis will focus on the admissibility and the probative value of the evidence garnered from virtual personal assistants, in the context of Quebec’s civilist tradition. The author focuses on the conditions of admissibility and on the designation of technological documents and of their characteristics, analyzing first and foremost the criteria of authenticity and integrity and the questions of proportionality. The author discusses exceptions to admissibility, especially the violation of a fundamental right and privilege considerations. Furthermore, the author discusses the probative value of technological evidence, proposing that the understanding of the underlying technology is a key factor in the determination of the probative value of any technological evidence. Finally, the author suggests that artificial intelligence creates a new category of technological evidence that might be calling for changes in the judicial principles and procedures of the province of Quebec.
32

Fournier-Gendron, Hugo. "Sécurité informationnelle des systèmes cyberphysiques et risques à la santé et sécurité : quelle responsabilité pour le fabricant ?" Thèse, 2017. http://hdl.handle.net/1866/21353.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography