{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T23:03:48Z","timestamp":1776899028014,"version":"3.51.2"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030763459","type":"print"},{"value":"9783030763466","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76346-6_57","type":"book-chapter","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T11:08:18Z","timestamp":1622200098000},"page":"643-655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Internet of Things Impact on the Future of Cyber Crime in 2050"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4898-9888","authenticated-orcid":false,"given":"Afrah","family":"Almansoori","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cornelius","family":"Ncube","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6073-3981","authenticated-orcid":false,"given":"Said A.","family":"Salloum","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,5,29]]},"reference":[{"key":"57_CR1","doi-asserted-by":"publisher","first-page":"101010","DOI":"10.1016\/j.aei.2019.101010","volume":"43","author":"P Zhang","year":"2020","unstructured":"Zhang, P., Nie, Z., Dong, Y., Zhang, Z., Yu, F., Tan, R.: Smart concept design based on recessive inheritance in complex electromechanical system. Adv. Eng. Inf. 43, 101010 (2020)","journal-title":"Adv. Eng. Inf."},{"key":"57_CR2","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.indmarman.2020.03.010","volume":"89","author":"P Naik","year":"2020","unstructured":"Naik, P., Schroeder, A., Kapoor, K.K., Bigdeli, A.Z., Baines, T.: Behind the scenes of digital servitization: actualising IoT-enabled affordances. Ind. Mark. Manag. 89, 232\u2013244 (2020)","journal-title":"Ind. Mark. Manag."},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257\u2013260 (2012)","DOI":"10.1109\/FIT.2012.53"},{"key":"57_CR4","doi-asserted-by":"publisher","first-page":"102538","DOI":"10.1016\/j.jnca.2020.102538","volume":"154","author":"H Tahaei","year":"2020","unstructured":"Tahaei, H., Afifi, F., Asemi, A., Zaki, F., Anuar, N.B.: The rise of traffic classification in IoT networks: a survey. J. Netw. Comput. Appl. 154, 102538 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Pal, A., Mukherjee, A., Dey, S.: Future of healthcare\u2014sensor data-driven prognosis. In: Wireless World in 2050 and Beyond: A Window into the Future!, pp. 93\u2013109 (2016)","DOI":"10.1007\/978-3-319-42141-4_9"},{"key":"57_CR6","unstructured":"Dutta, S., Geiger, T., Lanvin, B.: The global information technology report 2015 (2015)"},{"key":"57_CR7","doi-asserted-by":"crossref","unstructured":"Sharma, N., Shamkuwar, M., Singh, I.: The history, present and future with IoT. In: Internet of Things and Big Data Analytics for Smart Generation, pp. 27\u201351 (2019)","DOI":"10.1007\/978-3-030-04203-5_3"},{"issue":"4","key":"57_CR8","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1016\/j.red.2014.01.002","volume":"17","author":"A Trew","year":"2014","unstructured":"Trew, A.: Spatial takeoff in the first industrial revolution. Rev. Econ. Dyn. 17(4), 707\u2013725 (2014)","journal-title":"Rev. Econ. Dyn."},{"key":"57_CR9","unstructured":"Thangaraj, J., Narayanan, R.L.: Industry 1.0 to 4.0: the evolution of smart factories (2018)"},{"key":"57_CR10","unstructured":"Crandall, R.E.: Industry 1.0 to 4.0: the evolution of smart factories. APICS (2017)"},{"key":"57_CR11","unstructured":"Deloitte development. The internet of things (2013)"},{"key":"57_CR12","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1016\/j.procs.2019.09.104","volume":"158","author":"KA Demir","year":"2019","unstructured":"Demir, K.A., D\u00f6ven, G., Sezen, B.: Industry 5.0 and human-robot co-working. Procedia Comput. Sci. 158, 688\u2013695 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"57_CR13","unstructured":"Ashton. That\u2014internet of things. RFiD J (2009)"},{"key":"57_CR14","unstructured":"Bolt, R., Beranek, L., Newman: A history of the ARPANET: the first decade; DARPA report no. 4799; Bolt Beranek and Newman Inc.: USA: Cambridge, 1981"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Manley, J.H.: Embedded computers. In: Proceedings of the 6\u201310 May 1974, national computer conference and exposition on - AFIPS 1974, p. 343 (1974)","DOI":"10.1145\/1500175.1500247"},{"key":"57_CR16","doi-asserted-by":"crossref","unstructured":"Weise, M.: The computer for the 21st century (1991)","DOI":"10.1038\/scientificamerican0991-94"},{"issue":"4","key":"57_CR17","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393\u2013422 (2002)","journal-title":"Comput. Netw."},{"issue":"6","key":"57_CR18","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.3390\/s17061379","volume":"17","author":"J Ibarra-Esquer","year":"2017","unstructured":"Ibarra-Esquer, J., Gonz\u00e1lez-Navarro, F., Flores-Rios, B., Burtseva, L., Astorga-Vargas, M.: Tracking the evolution of the internet of things concept across different application domains. Sensors 17(6), 1379 (2017)","journal-title":"Sensors"},{"key":"57_CR19","unstructured":"Pontin, J.: Bill joy\u2019s six webs. MIT Technology Review (2005)"},{"key":"57_CR20","unstructured":"Roberti, M.: The history of RFID technology. In: RFID J. (2005)"},{"key":"57_CR21","unstructured":"Taso: SRI consulting business intelligence\u2014the internet of things roadmap (2014)"},{"key":"57_CR22","unstructured":"Google trends: Explore what the world is searching. Google trends (2020)"},{"key":"57_CR23","unstructured":"Tech vision report: Redefine your company based on the company you keep (2018)"},{"issue":"15","key":"57_CR24","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"57_CR25","unstructured":"Evans, D.: The internet of things how the next evolution of the internet is changing everything (2011)"},{"key":"57_CR26","unstructured":"IoC: The world in 2050: IoT and the future (2020)"},{"key":"57_CR27","doi-asserted-by":"crossref","unstructured":"Safaei, B., Monazzah, A.M., Bafroei, M., Ejlali, A.: Reliability side-effects in internet of things application layer protocols (2017)","DOI":"10.1109\/ICSRS.2017.8272822"},{"key":"57_CR28","unstructured":"Dixon, W., Samartsev, D.: 3 technologies that could define the next decade of cybersecurity. World Economic Forum (2019)"},{"key":"57_CR29","unstructured":"Taddeo, M., McCutcheon, T., Floridi, L.: No Title (2019)"},{"key":"57_CR30","unstructured":"Kalember, R.: SVP of cybersecurity, proofpoint. Info Security (2019)"},{"key":"57_CR31","doi-asserted-by":"crossref","unstructured":"Frunza, M.-C., Cybercrime. In: Introduction to the Theories and Varieties of Modern Crime in Financial Markets, pp. 207\u2013220. Elsevier (2016)","DOI":"10.1016\/B978-0-12-801221-5.00015-4"},{"key":"57_CR32","unstructured":"Nadeau, M.: Future cyber security threats and challenges: are you ready for what\u2019s coming? CSO (2017)"},{"key":"57_CR33","unstructured":"Ajder, H.: A scientist\u2019s opinion: interview with Henry Ajder about Deepfakes. European Union (2018)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2021)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76346-6_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T11:38:36Z","timestamp":1622201916000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76346-6_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030763459","9783030763466"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76346-6_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AICV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Artificial Intelligence and Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Settat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicv12021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AICV2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}