Internet of Things Impact on Crime and Law: A Research Report

Verified

Added on  2023/06/05

|11
|976
|165
Report
AI Summary
This report delves into the influence of the Internet of Things (IoT) on crime and legal systems. It begins with an introduction to IoT, highlighting its potential for achieving organizational goals efficiently. The research investigates the meaning and concept of IoT, exploring its techniques for crime detection and applications in community safety and crime prevention. The study formulates hypotheses regarding the relationship between IoT, crime, and law. The methodology employs a descriptive research design, utilizing both primary and secondary data collection methods, including surveys and interviews. The report reviews relevant literature, discussing biometric identification, alcohol consumption, and IoT technologies in crime detection. Variables such as IoT (independent) and crime/law (dependent) are examined. Data collection involves simple random and judgmental non-probability sampling techniques. The study concludes with references to support its findings. This research report is available on Desklib, a platform providing AI-based study tools for students.
Document Page
Professional
Research and
communication
Scholar ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Background, context, overview
IOT could lead organization for the accomplishment of desire
goal in limited time and cost.
The internet of things may be defined as a network of physical
devices, home appliances, vehicles, and other items
embedded with electronics, sensors, software, and
connectivity which enable these things to connect exchange
and collect data
Document Page
Cont…
Purpose of the study
The key purpose of this research is to address the role of the
internet of thing in crime and laws.
Document Page
Summary of Research Questions and
Purpose
The following research questions will be accomplished by the researcher to
meet the aim of this study:
What is the meaning and concept of the internet of things
What are the IOT (internet of things) techniques for crime detection?
What are applications of IOT (internet of thing) in community safety and
crime prevention?
Hypothesis
Hypothesis 1
H0: There is no significant association between Internet of Thing and crime
H1: There is a significant association between Internet of Thing and crime
Hypothesis 2:
H0: There is no significant association between Internet of Thing and law
H1: There is a significant association between Internet of Thing and law
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cont…
Definition of the paradigm and methodology
The key purpose of this research is to address the role of the
internet of thing in crime and laws.
In this research, the researcher will use the descriptive
research design method to collect the information in the
context of the current research matter.
Document Page
Summary of Relevant Literature:
According to Rathore et al. (2016), biometric identification
contains the technique for distinctly addressing human as per
the over one behavioral and physical traits.
In contrast to this, Zawoad and Hasan (2015) stated that as per
the medical council of research, South Africans consume over
5 billion liters of alcohol in each year.
Document Page
Cont…
Gandhi et al. (2018) addressed that IOT technologies aid in the
detection of crime. In this way, it is addressed that emotion
sensing is attached in the body of the individual.
In contrast to this, Ienca and Haselager (2016) stated that
emotion controlling is held accountable for capturing the
emotion of individual and transfer the feedback to the server
after developing the received information in the unit of human
heartbeats and temperature.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Summary of Methods, Methodology and
Data Collection
Variables used and relations between variables
Through this, the independent variable is the internet of thing
while the dependent variables are crime and law.
It demonstrates the crime and law could be dependent on the
internet of things (Machaka, and Nelwamondo, 2016).
Document Page
Cont…
Data collection and measurement tools
For conducting this research, the researcher will both a primary
as well as secondary data collection technique to collect the data
in the context of research issue like primary and secondary data
collection method.
Further, the primary information gathering process or tool will
be used by the investigator as it would assist to obtain first-hand
data in the context of current research issues like survey through
a questionnaire, and interview method.
Moreover, there are certain sources that could be practiced by
the research at the time of collecting the information about the
research matter like academic publications, online articles,
government publication, journal articles, and textbooks (Ding,
et. al., 2018).
Document Page
Summary of any other
considerations/aspects of the research
Through this, a researcher will practice the simple random
sampling technique to collect opinion and views of the
research candidates towards the research matter.
Apart from this, judgemental non-probability sampling
technique will be practiced by the researcher to conduct
interview method for selection of current research matter.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Rathore, M.M., Ahmad, A., Paul, A. and Rho, S., 2016. Urban planning and building
smart cities based on the internet of things using big data analytics. Computer
Networks, 101, pp.63-80.
Zawoad, S. and Hasan, R., 2015, June. Faiot: Towards building a forensics aware
ecosystem for the internet of things. In 2015 IEEE International Conference on Services
Computing (SCC) (pp. 279-284). IEEE.
Ienca, M. and Haselager, P., 2016. Hacking the brain: brain-computer interfacing
technology and the ethics of neurosecurity. Ethics and Information Technology, 18(2),
pp.117-129.
Gandhi, U.D., Kumar, P.M., Varatharajan, R., Manogaran, G., Sundarasekar, R. and Kadu,
S., 2018. HIoTPOT: surveillance on IoT devices against recent threats. Wireless personal
communications, pp.1-16.
Machaka, P. and Nelwamondo, F., 2016. Data mining techniques for distributed denial of
service attacks detection in the internet of things: A research survey. In Data Mining
Trends and Applications in Criminal Science and Investigations (pp. 275-334). IGI Global.
Ding, G., Wu, Q., Zhang, L., Lin, Y., Tsiftsis, T.A. and Yao, Y.D., 2018. An amateur drone
surveillance system based on the cognitive Internet of Things. IEEE Communications
Magazine, 56(1), pp.29-35.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]