Study on IoT Security and Privacy Preservation
18 Pages3563 Words84 Views
Added on 2020-04-21
Study on IoT Security and Privacy Preservation
Added on 2020-04-21
ShareRelated Documents
Running head: RESEARCH PROPOSALResearch Proposal Title: Study on IoT Security and Privacy Preservation: A case study onCentral Bank of JordanName of the Student:Name of the University:
1RESEARCH PROPOSALTable of Contents1.0 Title............................................................................................................................................22.0 Brief introduction.......................................................................................................................23.0 Background and statement of the problem................................................................................24.0 Research questions, aim and objectives.....................................................................................35.0 Study design...............................................................................................................................46.0 Study population and sampling.................................................................................................57.0 Data collection methods and instruments..................................................................................58.0 Data analysis methods...............................................................................................................69.0 Mechanisms to assure the quality of the study..........................................................................710.0 Timetable for completion of the project..................................................................................711.0 Participants in the study...........................................................................................................912.0 Ethical considerations..............................................................................................................913.0 Resources required for the study including of budget...........................................................10References......................................................................................................................................13Appendix........................................................................................................................................151. Online Questionnaire.............................................................................................................15
2RESEARCH PROPOSAL
3RESEARCH PROPOSAL1.0 Title“Study on IoT Security and Privacy Preservation: A case study on Central Bank ofJordan”2.0 Brief introduction The internet of things (IoT) is a network of network, which is connected throughoutinformation as well as communication infrastructure to provide of value added services. Thisresearch study is based on analyzing the IoT security and privacy issues for the banking sector.The selected organization for this case is Central Bank of Jordan. Into the banking organization,large amount of data are communicated and exchanged from one place to another. Most of thecommunication includes of exchange of confidential data. Aljawarneh et al. (2014) stated thatprivacy preservation is also important as no party are trusted over the public network withoutinvestigation and verification. IoT security issues are revolved around electronic currency alongwith digital cash; therefore, its security is a key significant concern into Central Bank of Jordan.Into this bank, the customer’s data are not only used for cyber frauds but also used to be sold intoblack market. 3.0 Background and statement of the problem Kipf et al. (2016) determined that some of the banks are failed to secure their system asthey experience that security of the data is related to Information Technology. Residual risks arecaused due to inadequate control of the logical as well as physical access to the system forcontaining of customer data. There is also inadequate logging along with monitoring of the
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Literature Survey: Network Security and Data Privacy Protectionlg...
|14
|3790
|402
(PDF) Research Methods in Computinglg...
|26
|6517
|161
IOT Enabled Infrastructure in Smart Cities Report 2022lg...
|17
|4333
|4
Towards a Secure and Efficient Distributed Computing Systemlg...
|13
|2006
|13
Research Proposal on Data Security in Regards to Smart Home Applicationslg...
|17
|3763
|18
Security Issues Research Paper 2022lg...
|5
|3360
|15