Big Data Security in IoT Used in Digital Marketing Report

Verified

Added on  2020/04/29

|8
|1761
|52
Report
AI Summary
This report explores the critical intersection of big data security and the Internet of Things (IoT) within the context of digital marketing. The analysis begins with an overview of big data, discussing its characteristics like volume, velocity, and variety, and highlights the challenges in managing this data, particularly in unstructured formats. It then delves into the impact of big data on business innovation, emphasizing the integration of data into business processes and decision-making. The report also covers data security theories and examines the role of IoT in digital marketing, including its ability to provide real-time data and enhance customer service. Research questions address the big data security issues in IoT, the role of big data in digital marketing, and potential solutions. The methodology section outlines the research philosophy, approach, and design, including the use of positivism and deductive approaches. The report also includes a literature analysis and references for further study. The report aims to provide insights into the challenges and opportunities presented by big data security in the evolving landscape of digital marketing.
Document Page
Running head: BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
Big data and data security problems in IOT used in digital marketing
Working Paper 2
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
Table of Contents
Literature analysis............................................................................................................................2
Overview..........................................................................................................................................2
Impact of big data on business innovation......................................................................................3
Theory of data security....................................................................................................................3
Impact of IOT in digital marketing..................................................................................................4
Research questions...........................................................................................................................4
Draft of the methods section............................................................................................................4
Research philosophy........................................................................................................................5
Research approach...........................................................................................................................6
Research Design..............................................................................................................................6
References........................................................................................................................................7
Document Page
2
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
Literature analysis
Overview
Big data is a term that has advanced to represent the quickly extending measures of
computerized data that are being created, the endeavors to make that data analyzable and the real
utilization of that data as a way to enhance profitability, produce and encourage development and
enhance basic leadership. With improvement of big data, it can deal volume, speed, variety and
furthermore vacillation (Kaur and Mahajan 2013). Regardless, in most of the affiliations social
database organization system has been realized that causes issues in regulating unstructured and
gigantic number of data. Hereafter, it transforms into a great test for social database organization
venders to help big data. Creation, control, examines and furthermore trading of data close by
sub-nuclear showing need a correspondingly new approach of the databases. Thus, affiliations
require getting data organization practices that would be valuable to process colossal measure of
data. Likewise,, Big Data conjecture and moreover look into gives an approach to manage move
social database organization structures.
The measure of Big Data, speed and speed make security and assurance. Openness and
accessibility of the kind of framework may bring security issues in gigantic data (Ram et al.
2015). Limit in the big data building is secured on a couple of that tons of business (Lee and Lee
2015). For example, high need of "hot" data will generally store on streak media. Along these
lines, missing down limit infers tons of business for execution and cost is occurred for it.
The Healthcare business is one of the greatest bits of the money related make-up of the
United States with 17.9 percent of the GDP or $8,500 per capita in 2010, as showed up in With
Document Page
3
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
the measure of information list to increase inside the business in light of Obama Care, there will
be fantastic potential for specialist's offices, underwriters, and authorities and examiners to use
business look into gadgets more tolerably and effectively to deal with the information surge and
meanwhile to give quality contemplations to the patients.
Impact of big data on business innovation
Peppard and Ward 2016 stated that organizations need to take a comprehensive view that
perceives that achievement is based upon the coordination of individuals, process, innovation
and data; this implies having the capacity to fuse data into their business schedules, their
procedure and their day by day operations. Creation arrange Management Effective usage of
business examination instruments would help such associations as Boeing to settle on right
decisions in the matter of the sum to outsource for its Boeing 787 Dreamliner, which is planned
to use 20 percent less fuel and foreseen that would be 10 percent bring down in cost-per-arrange
mile.
Theory of data security
A system is isolated from its condition by a limit, which isolates what is in the system.
Section to the system, over the limit is done through the contributions of the system. The other
intersection of the limit is performed by yields from the system, which give data back to the
earth. A system may contain a controller segment, intended to deal with the control of the yield,
in light of the contribution of a system. The controller part works against data inside the limit of
the system as it were. One way of portraying a system is to characterize the states that the system
can exist in, and the strategy for change between these states. The linkage between the system
and controller has been investigated by numerous systems researchers (Chang and
Ramachandran 2016).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
Impact of IOT in digital marketing
The IoT will give computerized requesting abilities in view of current stock and request
factors. Another advantage of IoT mix is enhanced client benefit, enabling organizations to
increase prescient bits of knowledge into client issues and proactively giving arrangements, as
opposed to responding after the issue happens (Kaur and Mahajan 2013).. Associated gadgets
will have the capacity to inform organizations when a client issue has happened, or before it even
jumps out at keep up consumer loyalty and use of the item.
Research questions
What is the big data security issues involved with IOT?
What is the role of big data in digital marketing?
What are the solutions to overcome the challenges?
Draft of the methods section
The methodology section of research helps to detect the most suitable approach, which
can be adopted for acquiring the desired outcomes from the specific research. It includes certain
theories along with concepts that can be adopted to obtain better analysis on the chosen topic for
research
Methodological tool Selected tool
Research Philosophy Positivism Philosophy
Research approach Deductive approach
Research design Descriptive design
Data collection process Secondary data collection process
Data analysis technique Qualitative data analysis technique
Document Page
5
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
Research philosophy
In a research, philosophy of the research has an important role to decide appropriate
method in order to obtain subtle components of the research point. On the other hand, research
philosophy helps in making clarification of the presumption process that is attempted by the
researcher at the time of conducting the research. On contrary, the process of evaluating a certain
point can fluctuate so that determination of the research theory needs to be viable as well as in
legitimate arrangement. Moreover, expansive as well as regular types of epistemology include
theories such as positivism, authenticity as well as interpretivism.
Positivism philosophy is considered as a subject that helps in using research rationale in
order to examine covered actualities along with data in an investigative method. Positivism
philosophy is a subject in research that is useful in application of the logic and analyzing the
hidden factors and data in scientific way. Metaphysics is rejected in positivism philosophy so
that detailed process of observation as well as knowledge collection can be enabled. It is
generally involved in a social business world as well as management activities (Rao and
Selvamani 2015). On the other side, interpretative study aims to explain the things with such
concepts regarding natural law to specific extent rejected in the scientific approach. Moreover,
interpretation of data and results of the study that can be suited with the requirements through the
results of the study can be achieved. On the other hand, realism philosophy is known as mixed
approach that includes positivism as well as interpretative and includes characteristics of the
philosophies. However, realism explains the application related to human beliefs and assists in
order to study interaction of humans as well as realities in the research.
Document Page
6
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
Research approach
A research approach is needed in a study for conducting the research in proper way.
Inductive approach is considered as observation, which assists to get related big as well as
develops the way of research accordingly. Inductive approach serves with the purpose of
developing new theory, whereas deductive approach is used as a procedure, which explains
practical application of such theories that are analyzed in order to obtain access to content of the
research study (Rewagad and Pawar 2013). Deductive approach of a research develops a theory
having more specifications as well as concepts related to data analysis.
Research Design
Research design assists in describing the research framework that would be useful in
selecting and analyzing pattern of the research. During the conduction of the research, a specific
type of the research can be applied, which assists in better analyzing the research design.
Exploratory research design can be helpful for the researcher in order to acknowledge different
types of ideas as well as thoughts needed for completion of the research (Rong et al. 2013). On
the other hand, research design explains occurrence of such incidents as well as correspondingly
impact of the process.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
BIG DATA SECURITY IN IOT USED IN DIGITAL MARKETING
References
Bello-Orgaz, G., Jung, J.J. and Camacho, D., 2016. Social big data: Recent achievements and
new challenges. Information Fusion, 28, pp.45-59.
Cao, N., Wang, C., Li, M., Ren, K. and Lou, W., 2014. Privacy-preserving multi-keyword
ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed
systems, 25(1), pp.222-233.
Chang, V. and Ramachandran, M., 2016. Towards achieving data security with the cloud
computing adoption framework. IEEE Transactions on Services Computing, 9(1), pp.138-151.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P., 2013. A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611.
Fernández, A., del Río, S., López, V., Bawakid, A., del Jesus, M.J., Benítez, J.M. and Herrera,
F., 2014. Big Data with Cloud Computing: an insight on the computing environment,
MapReduce, and programming frameworks. Wiley Interdisciplinary Reviews: Data Mining and
Knowledge Discovery, 4(5), pp.380-409.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage, pp.7-19.
Gast, D.L. and Ledford, J.R. eds., 2014. Single case research methodology: Applications in
special education and behavioral sciences. Routledge.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]