In this digital world, internet networks and emerging technologies are proliferating, enabling companies to interconnect multiple systems easily and manage business problems. IoT is an abbreviation for the internet of things an emerging technology that helps business communities to propose significant communication platforms and link various devices, networks and servers through a single system (Xiao, Sidhu, and Christianson, 2015). The prominent feature of IoT technology is that it provides communication networks and the ecosystem to exchange data without requiring human assistance so that remote access controls can be developed within businesses. Using IoT-enabled devices, it is easy for the users to exchange data and receive real-time information by which complexity and difficulties can be managed. Business processes, devices, networks and systems can be connected with the IoT technology and remote accessibility can be provided that can enable the companies to perform business operations remotely (Abdullayeva, 2016). In terms of speed, IoT is capable to provide a faster data transmission speed that enables users to exchange data in less time and receive proper updates from companies.
However, IoT is connected with computing networks and communication channels that can increase security threats and hacking problems. The larger datasets can be shared over internet networks and hackers can target IoT networks easily to produce data breach incidents (Tormo, Mármol, and Pérez, 2015). Due to security concerns, it is challenging for the companies and users to build trust regarding the implementation of IoT which negatively reduces the reputation of the IoT networks. The existence of security risks and any vulnerabilities in the IoT systems will always affect the privacy of sensitive data. Companies can suffer from data breaches and ethical problems and influence the trust of the users this is based on what happened to AT&T when they were slammed with a fine of $25million by FCC due to a data breach.
It is a challenging task for evaluating the trustworthiness of the entities on the internet network and also increases hacking and cyber-attacks (Ahmed, et al., 2019). The primary motivation behind this research is that companies are moving toward IoT networks for which it is essential to review and manage the security and trust-related problems. The companies need to focus on security and confidentiality and follow proper configuration processes so that malicious codes and unauthorized activities can be minimized and trust levels can be improved. Kokoris, et al., (2016) defined trust management as a process of managing security risks and issues from IoT networks to protect personal details and computing systems. Therefore these models are highly recommended to the cyber security area for enhancing the various approaches which are beneficiary for users.
This research will provide more information on network sharing and methods for evaluating trust and reputation in IoT devices. Also, it enhances the security of those addresses that have concerns relating to both security and privacy. In this research, the concept of IoT technology will be reviewed and the implication of security on trust and reputation in IoT will be analyzed (Yan, Zhang, and Vasilakos, 2014). There are many works which have been done in this instance to gain in-depth insight into trust and reputation methods used for IoT networks. Previous findings will be reviewed to manage research gaps so that we can provide better results for the IoT environment for many organisations. The presence of cyber threats and insider vulnerabilities in the IoT networks can affect communication channels and the security of the transmitted data can be reduced. According to Kravari and Bassiliades (2019), more than 70% of the companies collect customer data using IoT-based communication networks and store it in databases that can be targeted by hackers easily. Kowshalya and Valarmathi, (2017) presented a trust management program that shows that building security and data protection programs can increase complexity in businesses. It is difficult for the companies to deal with the security and privacy concerns due to which trust and reputation can be influenced and data breaches or ethical issues can be posed easily.
MPOM7103 Assignment: Strategic Decision-Making and Operational Resilience in Petronas Amid Energy Transition
Read MoreMPIB7103 Assignment: Critical Perspectives on International Business Strategies and Regional Integration
Read MoreMPHR7113 Assignment: Strategic HR Analysis of Golden Heritage Café (HRM)
Read MoreTHEA1013 assignment: Theatrical Storytelling: Exploring the Unique Power of the Stage
Read MoreBusiness Strategy Assignment: Strategic Expansion: A Business Outlook
Read MoreGSGM7324 Assignment: Organisational Development and Change Management
Read MorePHY098 LOD 2, C4 Assignment: Mitigating Damage to Electrical Appliances from Lightning Strikes
Read MoreBM070 Business Research Assignment: Business Report Framework for Corporate Development
Read MoreHBET1203 Assignment: Comparing Pronunciation of Selected Words in Text and Reading to Standard British English
Read MoreIdentify key technological challenges affecting e-invoicing adoption in Malaysia.
Read More