Big Data and Data Security Problems in IOT Used in Digital Marketing

Added on - 29 Apr 2020

  • 50

    pages

  • 17300

    words

  • 5

    views

  • 0

    downloads

Showing pages 1 to 8 of 50 pages
Running head: BIG DATA AND DATA SECURITY PROBLEMS IN IOT USED IN DIGITALMARKETINGBig data and data security problems in IOT used in digital marketingFinal Master ThesisName of the Student:Name of the University:Author note:
1BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETINGAbstractResearchers have discovered vulnerabilities in frameworks running from electronic votingsystem to associated autos to Internet based learning stages. This sort of research keeps onbringing up troublesome issues about how and when to reveal vulnerabilities to the designer ofthe item or services. On the other hand, the Internet of Things, or IoT, alludes for the most part tothe advanced interconnection of regular articles to the Internet and to each other, and the capacityto gather and send data between gadgets. A generally new idea, the IoT does not have a broadlyacknowledged definition and includes an unpredictability of thoughts and capacities.Scatteredstructure is one of the big issues in enormous data. There is enormous data utilization that passeson colossal getting ready occupations over a couple of systems to get speedier research. On theother hand, Hadoop is an instance of open source tech that possessed with this. Scattered gettingready may describe as less data that is taken care of through any stream. In any case, it infersvarious structures where issues about security can be jumped up. In non-social data stores,NoSQL databases generally have nonattendance of security. The research analyzes big datasecurity issues in IOT that is used in digital marketing.
2BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETINGAcknowledgementConducting the research study enhances me to improve my knowledge as well as analyticalability. It gave me the chance to face challenges all the while and conquer them. It will not bepossible to conduct the research without the significant direction of my professors, companionsand every one of who have added to this advancing knowledge. I also want to thank mysupervisor __________ for helping me in my research work as well as give their full supportduring the research process. I would also thank all the participants within this study for givingtheir time and helping me out. From the support of people, I am inspired to work on the researchin this subject area. Finally, thank you to my family members those help me and encourage me.Thank You.
3BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETINGTable of ContentsAbstract2Chapter 1: Introduction........................................................................................................61.1 Background of the study............................................................................................61.2 Research Aims and Objectives..................................................................................81.2.1 Aims of the study....................................................................................................81.2.2 Objectives of the study...........................................................................................81.3 Research Questions....................................................................................................81.4 Problem Statement.....................................................................................................81.5 Rationale of the study..............................................................................................101.6 Knowledge gap........................................................................................................12Chapter 2: Literature review..............................................................................................132.1 Overview of the use of big data in IOT...................................................................132.2 Evaluation of Internet of Things..............................................................................142.3 Impact of big data on business innovation..............................................................152.4 System theory for data security...............................................................................182.5 Big Data Security Lifecycle.....................................................................................202.6 Big Data Threats and Attacks..................................................................................222.7 Impact of IOT in digital marketing..........................................................................242.8 Impact of big data on digital marketing...................................................................25Chapter 3: Research Methodology....................................................................................293.1 Preface.....................................................................................................................293.2 Methodology Outline...............................................................................................293.3 Research philosophy................................................................................................293.4 Research approach...................................................................................................30
4BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETING3.5 Research Design......................................................................................................313.6 Data collection process............................................................................................323.7 Data sources: Primary and Secondary.....................................................................323.7.2 Data techniques: Quantitative and Qualitative.....................................................323.8 Sampling Technique................................................................................................333.8 Ethical consideration...............................................................................................333.10 Research limitation................................................................................................33Chapter 4: Findings and analysis.......................................................................................354.1 Preface.....................................................................................................................354.2 Qualitative analysis..................................................................................................35Chapter 5: Conclusion and recommendations...................................................................445.1 Conclusion...............................................................................................................445.2 Recommendations....................................................................................................45References......................................................................................................................46
5BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETINGChapter 1: Introduction1.1 Background of the studySecurity is one of the greatest difficulties experienced with the Internet of Things andbigdata. In addition, on the grounds that these associated gadgets are connected to the physicalworld, gadget security likewise is a major concern. However, there is some proof that securityvulnerabilities are widespread in the Internet of Things (Hashem et al. 2015). Some portion ofthe reason might be monetary. Customary shopper merchandise makers that are currentlyentering the Internet of Things market might not have invested decades supporting. The processto secure their items and services from programmers in the way needs to be adoptedbyconventional innovation firms. For these organizations, including security skill might beespecially expensive. On the other hand, many associated gadgets will be reasonable andbasically dispensable. Obviously, organizations ought to unveil how they will secure users’data,and those revelations must be honest and not misdirecting (Chen et al. 2014). There is a long lineof FTC implementation activities against organizations that neglected to meet this standard.Also, the fairly arcane nature of data security does not pardon the disappointment oforganizations to apply fixes for understood vulnerabilities or find a way to ensure buyers' data orgadgets. The FTC is likewise promising engineers to go past the lawful necessities and receivesafety efforts that make more grounded securities for buyers. These variables point to the need totake an "all hands on deck" way to deal with data security, with security scientists assuming animperative part in exposing security defects.(Riggins and Wamba 2015) commented that it is not generally the sort of news thatorganizations or law requirement offices need to hear, and a few scientists have been indicted fortheir exercises. In October, the FTC scrutinized a proposition in Congress that would haveinfluenced certain sorts of security to explore on associated autos illicit, on the ground that thisarrangement would remove a helpful wellspring of data about security vulnerabilities that couldinfluence shoppers' physical safety. Fortunately, many organizations see the benefit of findingout about vulnerabilities in their items, and many will pay "bug bounties" to be the first to berecounted helplessness in one of their own items. All things considered, security look into istroublesome and questionable.
6BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETINGSagiroglu and Sinanc (2013) commented that researchersapproach source code, they mayexperience considerable difficulties distinguishing mistakes. Luckily, security specialists haveformulated numerous different approaches to test parts and frameworks all the more rapidly andon a bigger scale. No single strategy is fit for finding powerlessness, yet extraordinary strategies,utilized as a part of mix, can give more confirmation that frameworks are dependable. To takethe greater part of this back to purchasers and their trust in organizations and their servicess,giving shoppers auspicious data about vulnerabilities, how to settle them, and making it simple todo as such are a portion of the most ideal approaches to look after trust. It will be examinedthatthe issues at the FTC's up and coming begin with Security occasion, ideal here in Seattle, onFebruary ninth (Arora et al. 2013). It will give organizations especially little organizations withpragmatic exhortation and suggested systems for actualizing compelling data security.However, most definitions concentrate on how computers, sensors, and articlescollaborate with each other and process data (Kshetri 2014). The IoT incorporates gadgets forcustomer use, and also gadgets for organizations which may help enhance operationaleffectiveness through the capacity to gather and decipher vast data, and computerizecorrespondence between machines. There is as of now a big number of gadgets and itemsconsidered under the IoT range, and the quantity of keen, associated items is expanding atuncommon rates. At some point in 2008, the quantity of associated gadgets bridges the quantityof individuals on the planet. In 2016, an expected 6.4 billion associated things will be being used,a 30% expansion from 2015. By 2020, a few evaluations anticipate there will be upwards of 50billion associated gadgets on the planet. This implies there will be around 6.5 associated gadgetsfor every individual around the world, with unlimited open doors for advancement, creation andnetwork of things that only a couple of years back may have been never been considered(Wixom et al. 2014). These associated gadgets will give extraordinary and imaginativeadvantages to shoppers and organizations, yet in addition will have the capacity to gather,transmit, store, and offer data, some of it possibly very individual and touchy. This brings uponnew and extraordinary difficulties for advertisers, as they endeavor to exceed worries of buyerprotection and security with the additional advantages of these new IoT advances.
7BIG DATA SECURITY PROBLEMS IN IOT USED IN DIGITAL MARKETING1.2 Research Aims and Objectives1.2.1 Aims of the studyThe research aims to investigate the security issues involved with IOT used in digitalmarketing. Moreover, recommendations are provided in the present study.1.2.2 Objectives of the studyTo identify the big data security issues involved with IOTTo critically analyze the role of big data in digital marketingTo recommend solutions to overcome the challenges1.3 Research QuestionsWhat is the big data security issues involved with IOT?What is the role of big data in digital marketing?What are the solutions to overcome the challenges?1.4 Problem StatementThe ascent of the IoT will significantly influence the regular daily existences andspending conduct of customers. Many organizations and retail locations have effectively paidheed and gotten a head begin in the IoT race. In spite of this, most customers are still generallyunconscious of IoT innovation, as 87% of Americans said they had never heard the expression"Internet of Things", as indicated by a recent report by Aquity Group. In any case, buyerappropriation and request of IoT gadgets is on the ascent, as buyers turn out to be progressivelymindful and start to change their lives with these interconnected, advantageous items. Overportion of every American family effectively claim internet associated TV gadget and thatnumber is just anticipated that would ascend, as savvy TVs start to link set-up boxes. Associatedhomes connected home innovation is viewed as the best buyer advertise for the IoT, and by 2019organizations will transport 1.9 billion associated home gadgets, achieving in $490 billion inincome (Weber et al. 2014). Business Insider's meaning of associated home gadgets incorporatesevery keen machine like washers, dryers, coolers, wellbeing and security frameworks associatedsensors, screens, cameras, caution frameworks, and vitality hardware, for example, shrewdindoor regulators and smart lighting.
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document