User values and the development of a cybersecurity public policy for the IoT

作者:

Highlights:

• IoT user values are elicited and converted into objectives, showing key security concerns for IoT use.

• IoT user implementation preferences are elicited for the objectives using implementation scenarios.

• Individual and Group-based utility functions are calculated demonstrating IoT user policy development preference.

• Provides policy-makers with critical information needed for decision-making, incorporating user stakeholders in the process.

• Develops key theoretically-based objectives for understanding the IoT stakeholder.

摘要

•IoT user values are elicited and converted into objectives, showing key security concerns for IoT use.•IoT user implementation preferences are elicited for the objectives using implementation scenarios.•Individual and Group-based utility functions are calculated demonstrating IoT user policy development preference.•Provides policy-makers with critical information needed for decision-making, incorporating user stakeholders in the process.•Develops key theoretically-based objectives for understanding the IoT stakeholder.

论文关键词:IoT,Cyber security,Policy planning,Public values,Strategic objectives,Qualitative research

论文评审过程:Received 3 October 2019, Revised 26 February 2020, Accepted 26 March 2020, Available online 5 October 2020, Version of Record 5 October 2020.

论文官网地址:https://doi.org/10.1016/j.ijinfomgt.2020.102123