{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:06:22Z","timestamp":1775851582991,"version":"3.50.1"},"reference-count":82,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Along with the growing threat of cyberattacks, cybersecurity has become one of the most important areas of the Internet of Things (IoT). The purpose of IoT cybersecurity is to reduce cybersecurity risk for organizations and users through the protection of IoT assets and privacy. New cybersecurity technologies and tools provide potential for better IoT security management. However, there is a lack of effective IoT cyber risk management frameworks for managers. This paper reviews IoT cybersecurity technologies and cyber risk management frameworks. Then, this paper presents a four-layer IoT cyber risk management framework. This paper also applies a linear programming method for the allocation of financial resources to multiple IoT cybersecurity projects. An illustration is provided as a proof of concept.<\/jats:p>","DOI":"10.3390\/fi12090157","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T07:27:33Z","timestamp":1600414053000},"page":"157","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":205,"title":["Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management"],"prefix":"10.3390","volume":"12","author":[{"given":"In","family":"Lee","sequence":"first","affiliation":[{"name":"School of Computer Sciences, College of Business and Technology, Western Illinois University, Macomb, IL 61455, USA"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"key":"ref_1","first-page":"100078","article-title":"The Internet of things for enterprises: An ecosystem, architecture, and IoT service business model","volume":"7","author":"Lee","year":"2019","journal-title":"Internet Things Eng. Cyber Phys. Hum. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2017.3680959","article-title":"Security risk assessment in Internet of Things systems","volume":"19","author":"Nurse","year":"2017","journal-title":"IT Prof."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1080\/09720529.2019.1642628","article-title":"Security risk management in IoT environment","volume":"22","author":"Malik","year":"2019","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_5","unstructured":"MarketsandMarkets (2020, September 17). IoT Security Market Worth $35.2 Billion by 2023. Available online: https:\/\/www.marketsandmarkets.com\/PressReleases\/iot-security.asp."},{"key":"ref_6","unstructured":"PwC (2020, September 17). Managing Emerging Risks from the Internet of Things. Available online: https:\/\/www.pwc.com\/us\/en\/services\/consulting\/cybersecurity\/library\/broader-perspectives\/managing-iot-risks.html."},{"key":"ref_7","unstructured":"Irdeto (2020, September 17). New 2019 Global Survey: IoT-Focused Cyberattacks Are the New Normal. Available online: https:\/\/resources.irdeto.com\/global-connected-industries-cybersecurity-survey\/new-2019-global-survey-iot-focused-cyberattacks-are-the-new-normal."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Aldmour, R., Burnap, P., and Lakoju, M. (2019, January 1\u20132). Risk assessment methods for converged IoT and SCADA systems: Review and recommendations. Proceedings of the Living in the Internet of Things (IoT 2019), London, UK.","DOI":"10.1049\/cp.2019.0130"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MS.2017.4541031","article-title":"Probabilistic threat detection for risk management in cyber-physical medical systems","volume":"35","author":"Rao","year":"2018","journal-title":"IEEE Softw."},{"key":"ref_10","unstructured":"Deloitte (2020, September 17). Secure IoT by Design. Available online: https:\/\/www2.deloitte.com\/us\/en\/pages\/operations\/articles\/iot-platform-security.html."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bendavid, Y., Bagheri, N., Safkhani, M., and Rostampour, S. (2018). IoT Device Security: Challenging \u201cA Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function\u201d. Sensors, 18.","DOI":"10.3390\/s18124444"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"025007","DOI":"10.1088\/2632-2153\/ab8967","article-title":"Development of use-specific high-performance cyber-nanomaterial optical detectors by effective choice of machine learning algorithms","volume":"1","author":"Hejazi","year":"2020","journal-title":"Mach. Learn. Sci. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","article-title":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","volume":"84","author":"Mollah","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","article-title":"On security challenges and open issues in Internet of Things","volume":"83","author":"Sha","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Yu, R., Xue, G., Kilari, V.T., and Zhang, X. (June, January 30). Deploying Robust Security in Internet of Things. Proceedings of the 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, China.","DOI":"10.1109\/CNS.2018.8433219"},{"key":"ref_16","first-page":"1","article-title":"XOR-based low-cost reconfigurable PUFs for IoT security","volume":"18","author":"Liu","year":"2019","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/ACCESS.2015.2503432","article-title":"Emerging physical unclonable functions with nanotechnology","volume":"4","author":"Gao","year":"2016","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/J.ENG.2016.01.014","article-title":"Insecurity by design: Today\u2019s IoT device security problem","volume":"2","year":"2016","journal-title":"Engineering"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MDAT.2016.2544845","article-title":"PUFs as promising tools for security in Internet of Things","volume":"33","author":"Mukhopadhyay","year":"2016","journal-title":"IEEE Des. Test"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kulseng, L., Yu, Z., Wei, Y., and Guan, Y. (2010, January 15\u201319). Lightweight Mutual Authentication and Ownership Transfer for RFID Systems. Proceedings of the 2010 IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462233"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Xu, H., Ding, J., Li, P., Zhu, F., and Wang, R. (2018). A lightweight RFID mutual authentication protocol based on physical unclonable function. Sensors, 18.","DOI":"10.3390\/s18030760"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhu, F., Li, P., Xu, H., and Wang, R. (2019). A lightweight RFID mutual authentication protocol with PUF. Sensors, 19.","DOI":"10.3390\/s19132957"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Boeckl, K.R., Fagan, M.J., Fisher, W.J., Lefkovitz, N.B., Megas, K.N., Nadeau, E.M., Piccarreta, B.M., O\u2019Rourke, D.G., and Scarfone, K.A. (2020, September 17). Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. NISTIR 8228, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2019\/NIST.IR.8228.pdf.","DOI":"10.6028\/NIST.IR.8228"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MSEC.2019.2904475","article-title":"Toward a cybersecurity certification framework for the Internet of Things","volume":"17","author":"Matheu","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hodo, E., Xavier Bellekens, X., Hamilton, A., Dubouilh, P.-L., Iorkyase, E., Tachtatzis, C., and Atkinson, R. (2016, January 11\u201313). Threat Analysis of IoT Networks Using Artificial Neural Network Intrusion Detection System. Proceedings of the 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Pacheco, J., Benitez, V., and F\u00e9lix, L. (2019, January 1\u20132). Anomaly Behavior Analysis for IoT Network Nodes. Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, Paris, France.","DOI":"10.1145\/3341325.3342008"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","article-title":"AI-based two-stage intrusion detection for software defined IoT networks","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Subasi, A., Al-Marwani, K., Alghamdi, R., Kwairanga, A., Qaisar, S.M., Al-Nory, M., and Rambo, K.A. (2018, January 25\u201326). Intrusion Detection in Smart Grid Using Data Mining Techniques. Proceedings of the 2018 21st Saudi Computer Society National Computer Conference (NCC), Riyadh, Saudi Arabia.","DOI":"10.1109\/NCG.2018.8593124"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Roopak, M., Tian, G.Y., and Chambers, J. (2019, January 7\u20139). Deep Learning Models for Cyber Security in IoT Networks. Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2019.8666588"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1109\/TETC.2016.2633228","article-title":"A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks","volume":"7","author":"Pajouh","year":"2019","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.cose.2017.08.016","article-title":"A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments","volume":"74","author":"Sohal","year":"2018","journal-title":"Comput. Secur."},{"key":"ref_32","first-page":"685","article-title":"Security and Privacy Issues of Fog Computing: A Survey","volume":"Volume 9204","author":"Xu","year":"2015","journal-title":"Wireless Algorithms, Systems, and Applications, Proceedings of the WASA 2015, Qufu, China, 10\u201312 August 2015"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.iot.2018.05.002","article-title":"Blockchain mechanisms for IoT security","volume":"1","author":"Minoli","year":"2018","journal-title":"Internet Things"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"100079","DOI":"10.1016\/j.iot.2019.100079","article-title":"Perspectives on emerging directions in using IoT devices in blockchain applications","volume":"10","author":"Rao","year":"2020","journal-title":"Internet Things"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Neisse, R., Hern\u00e1ndez-Ramos, J.L., Matheu, S.N., Baldini, G., and Skarmeta, A. (2019, January 28\u201330). Toward a Blockchain-Based Platform to Manage Cybersecurity Certification of IoT devices. Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain.","DOI":"10.1109\/CSCN.2019.8931384"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","article-title":"The Internet of things (IoT): Applications, investments and challenges for enterprises","volume":"58","author":"Lee","year":"2015","journal-title":"Bus. Horiz."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MCC.2016.63","article-title":"Threats to networking cloud and edge datacenters in the Internet of Things","volume":"3","author":"Puthal","year":"2016","journal-title":"IEEE Cloud Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Almulhim, M., and Zaman, N. (2018, January 11\u201314). Proposing Secure and Lightweight Authentication Scheme for IoT Based E-Health Applications. Proceedings of the 2018 20th International Conference on Advanced Communication Technology (ICACT), Chuncheon, Korea.","DOI":"10.23919\/ICACT.2018.8323802"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s11277-017-4434-6","article-title":"Cyber security threats to IoT applications and service domains","volume":"95","author":"Skouby","year":"2017","journal-title":"Wirel. Pers. Commun. Int. J."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Nastase, L. (2017, January 29\u201331). Security in the Internet of Things: A Survey on Application Layer Protocols. Proceedings of the 2017 21st International Conference on Control Systems and Computer Science (CSCS), Bucharest, Romania.","DOI":"10.1109\/CSCS.2017.101"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Tekeoglu, A., and Tosun, A.S. (2016, January 10\u201313). A Testbed for Security and Privacy Analysis of IoT Devices. Proceedings of the IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Brasilia, Brazil.","DOI":"10.1109\/MASS.2016.051"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","article-title":"Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations","volume":"21","author":"Neshenko","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Yang, K., Forte, D., and Tehranipoor, M.M. (2015, January 2\u20136). Protecting Endpoint Devices in IoT Supply Chain. Proceedings of the 2015 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD), Austin, TX, USA.","DOI":"10.1109\/ICCAD.2015.7372591"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1108\/JBIM-01-2018-0023","article-title":"IoT adoption in agriculture: The role of trust, perceived value and risk","volume":"33","author":"Jayashankar","year":"2018","journal-title":"J. Bus. Ind. Mark."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","article-title":"Security and privacy for cloud-based IoT: Challenges","volume":"55","author":"Zhou","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., and Gauravaram, P. (2017, January 13\u201317). Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, HI, USA.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/MCOM.2018.1700364","article-title":"PrivacyProtector: Privacy-protected patient data collection in IoT-based healthcare systems","volume":"56","author":"Luo","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_49","unstructured":"NIST (2020, September 17). Cybersecurity Framework, Available online: https:\/\/www.nist.gov\/cyberframework."},{"key":"ref_50","unstructured":"ISO\/IEC (2020, September 17). ISO\/IEC 27005:2018(en) Information Technology\u2014Security Techniques\u2014Information Security Risk Management, Available online: https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:27005:ed-3:v1:en."},{"key":"ref_51","unstructured":"Lockheed Martin (2019, August 13). Cyber Kill Chain\u00ae. Available online: https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html."},{"key":"ref_52","unstructured":"Alberts, C., and Dorofee, A. (2020, September 17). Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process. Managing Information Security Risks: The OCTAVESM Approach. Addison Wesley. Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.461.7807&rep=rep1&type=pdf."},{"key":"ref_53","unstructured":"Caralli, R.A., Stevens, J.F., Young, L.R., and William R Wilson, W.R. (2020, September 17). TECHNICAL REPORT CMU\/SEI-2007-TR-012 ESC-TR-2007-012 CERT Program. Available online: https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2007_005_001_14885.pdf."},{"key":"ref_54","unstructured":"CMMI Institute LLC (2020, September 17). Over 1\/2 of Cyber Professionals Expect a Cyber Attack within 12 Months. Available online: https:\/\/cmmiinstitute.com\/products\/cybermaturity."},{"key":"ref_55","unstructured":"CIS (2020, September 17). CIS Controls\u00ae V7.1. Available online: https:\/\/www.cisecurity.org\/controls\/."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Khosravi-Farmad, M., and Ghaemi-Bafghi, A. (2020). Bayesian Decision Network-Based Security Risk Management Framework. J. Netw. Syst. Manag.","DOI":"10.1007\/s10922-020-09558-5"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Rea-Guaman, A.M., Mej\u00eda, J., San Feliu, T., and Calvo-Manzano, J.A. (2020). AVARCIBER: A framework for assessing cybersecurity risks. Clust. Comput.","DOI":"10.1007\/s10586-019-03034-9"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"tyaa005","DOI":"10.1093\/cybsec\/tyaa005","article-title":"Integrating cost\u2013benefit analysis into the NIST Cybersecurity Framework via the Gordon-Loeb Model","volume":"6","author":"Gordon","year":"2020","journal-title":"J. Cybersecur."},{"key":"ref_59","unstructured":"Thomas, M. (2020, September 17). 13 IOT security companies you should know. Available online: https:\/\/builtin.com\/internet-things\/iot-security-companies-startups."},{"key":"ref_60","first-page":"49","article-title":"Exploring factors affecting the adoption of Internet of Things services","volume":"58","author":"Hsu","year":"2018","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Das, R., Gadre, A., Zhang, S., Kumar, S., and Moura, J.M.F. (2018, January 20\u201324). A Deep Learning Approach to IoT Authentication. Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422832"},{"key":"ref_62","unstructured":"U.S. Department of Health and Human Services (2020, September 17). Health Insurance Portability and Accountability Act of 1996, Available online: https:\/\/aspe.hhs.gov\/report\/health-insurance-portability-and-accountability-act-1996."},{"key":"ref_63","unstructured":"U.S. Department of Health & Human Services (2020, September 17). HITECH Act Enforcement Interim Final Rule, Available online: https:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/hitech-act-enforcement-interim-final-rule\/index.html."},{"key":"ref_64","unstructured":"US Congress (2020, September 17). H.R.3985\u2014Internet of Medical Things Resilience Partnership Act of 2017, Available online: https:\/\/www.congress.gov\/bill\/115th-congress\/house-bill\/3985\/text?format=txt."},{"key":"ref_65","unstructured":"US Congress (2020, September 17). S.734\u2014Internet of Things Cybersecurity Improvement Act of 2019, Available online: https:\/\/www.congress.gov\/bill\/116th-congress\/senate-bill\/734\/text?q=%7B%22search%22%3A%5B%22Internet+of+Things+%28IoT%29+Cybersecurity+Improvement+."},{"key":"ref_66","unstructured":"European Union (2020, September 17). General Data Protection Regulation GDPR, Available online: https:\/\/gdpr-info.eu\/."},{"key":"ref_67","unstructured":"European Union (2020, September 17). The EU Cybersecurity Act, Available online: https:\/\/ec.europa.eu\/digital-single-market\/en\/eu-cybersecurity-act."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Romero-Mariona, J. (April, January 31). DITEC (DoD-Centric and Independent Technology Evaluation Capability): A process for testing security. Proceedings of the 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops, Cleveland, OH, USA.","DOI":"10.1109\/ICSTW.2014.52"},{"key":"ref_69","unstructured":"ITU (2020, September 17). Internet of Things Global Standards Initiative. Available online: https:\/\/www.itu.int\/en\/ITU-T\/gsi\/iot\/Pages\/default.aspx#:~:text=The%20Internet%20of%20Things%20(IoT,interoperable%20information%20and%20communication%20technologies."},{"key":"ref_70","unstructured":"ISO (2020, September 17). ISO\/IEC JTC 1 Internet of Things (IoT) Preliminary Report 2014, Available online: https:\/\/www.iso.org\/files\/live\/sites\/isoorg\/files\/developing_standards\/docs\/en\/internet_of_things_report-jtc1.pdf."},{"key":"ref_71","unstructured":"ETSI (2020, September 17). Cyber Security for Consumer Internet of Things. Available online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/103600_103699\/103645\/01.01.01_60\/ts_103645v010101p.pdf."},{"key":"ref_72","first-page":"71","article-title":"To Improve cybersecurity, think like a hacker","volume":"58","author":"Esteves","year":"2017","journal-title":"MIT Sloan Manag. Rev."},{"key":"ref_73","unstructured":"(2020, September 17). Shred-it. Security Tracker 2018. Available online: https:\/\/www.shredit.com\/en-us\/resource-center\/original-research\/security-tracker-2018."},{"key":"ref_74","first-page":"843","article-title":"Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things","volume":"Volume 843","author":"Saeed","year":"2019","journal-title":"Recent Trends in Data Science and Soft Computing, Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018), Kuala Lumpur, Malaysia, 23\u201324 July 2018"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Dorasamy, M., Joanis, G.C., Jiun, L.W., Jambulingam, M., Samsudin, R., and Cheng, N.J. (2019, January 2\u20133). Cybersecurity Issues among Working Youths in an IoT Environment: A design Thinking Process for Solution. Proceedings of the 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS), Johor Bahru, Malaysia.","DOI":"10.1109\/ICRIIS48246.2019.9073644"},{"key":"ref_76","unstructured":"Bodeau, D., and Graubart, R. (2017). Cyber prep 2.0: Motivating Organizational Cyber Strategies in Terms of Threat Preparedness. Tech. Rep., Available online: https:\/\/www.mitre.org\/sites\/default\/files\/publications\/15-0797-cyber-prep-2-motivating-organizational-cyber-strategies.pdf."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s13347-013-0104-0","article-title":"Balance or trade-off? Online security technologies and fundamental rights","volume":"26","author":"Hildebrandt","year":"2013","journal-title":"Philos. Tech."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-030-29053-5_4","article-title":"Ethical Frameworks for Cybersecurity","volume":"Volume 21","author":"Christen","year":"2020","journal-title":"The Ethics of Cybersecurity"},{"key":"ref_79","unstructured":"Kuypers, M., and Maillart, T. (2018, January 18\u201319). Designing Organizations for Cyber Security Resilience. Proceedings of the 2018 The Workshop on the Economics of Information Security (WEIS), Innsbruck, Austria. Available online: https:\/\/weis2018.econinfosec.org\/wp-content\/uploads\/sites\/5\/2016\/09\/WEIS_2018_paper_50.pdf."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1007\/s10479-019-03186-2","article-title":"A linear programming primer: From Fourier to Karmarkar","volume":"287","author":"Chakraborty","year":"2020","journal-title":"Ann. Oper. Res."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Georgescu, T.-M., Iancu, B., and Zurini, M. (2019). Named-entity-recognition-based automated system for diagnosing cybersecurity situations in IoT networks. Sensors, 19.","DOI":"10.3390\/s19153380"},{"key":"ref_82","unstructured":"Boja, C., Zamfiroiu, A., Iancu, B., Georgescu, T.M., Cartas, C., and Toma, C. (2018). Avant-Garde Technology Hub for Advanced Security\u2014Technical Study, Military Technical Academy."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/9\/157\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:11:11Z","timestamp":1760177471000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/9\/157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":82,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["fi12090157"],"URL":"https:\/\/doi.org\/10.3390\/fi12090157","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,18]]}}}