首页 | 本学科首页   官方微博 | 高级检索  
     检索      


User values and the development of a cybersecurity public policy for the IoT
Institution:1. University of North Carolina at Greensboro, Information Systems & Supply Chain Management Dept. 516 Stirling St., Greensboro, NC, 27412, USA;2. University of New South Wales, School of Information Systems Technology and Management, Sydney, Australia;1. Graduate Institute of Global Business and Strategy, National Taiwan Normal University, Taipei, Taiwan;2. National Taipei University of Education, Taipei, Taiwan;1. Management Information Systems Group, Indian Institute of Management Calcutta, Kolkata, India;2. Research School of Management, Australian National University, Canberra, Australia;3. Marketing Group, Indian Institute of Management Calcutta, Kolkata, India;1. Effat College of Engineering, Effat University, Jeddah, P.O. Box 34689, Saudi Arabia;2. Effat College of Business, Effat University, Jeddah, P.O. Box 34689, Saudi Arabia;3. Thiagarajar School of Management, Madurai, India;4. King Abdulaziz University, Jeddah, Saudi Arabia;5. Deree College – The American College of Greece, 6 Gravias, Aghia Paraskevi, Athens, 15342, Greece;1. University of Nevada, Las Vegas, Las Vegas, NV, 89154, United States;2. Towson University, Towson, MD, 21252, United States;3. Western Carolina University, Cullowhee, NC, 28723, United States;4. University of Virginia, Charlottesville, VA, 22903, United States;1. Information Technology University, 346-B, Ferozepur Road, Lahore, Pakistan;2. Department of Operations, Technology, Events and Hospitality Management, Manchester Metropolitan University, Manchester, United Kingdom
Abstract:Public administrators, entrusted to develop public policy to manage the growing complexities of the IoT, face significant challenges. The challenges exist because of three reasons; First, there is a lack of policy direction. Second, user values related to cybersecurity are not well understood. Third, there is a lack of clarity as to how IoT public policy should be developed. In this paper we argue that new IoT policy should be guided by key stakeholder values (i.e. what users think to be important). We utilize the Public Value Forum to elicit public values to inform decision-making surrounding IoT policy by public administrators, conceptually informed by Rational choice theory. We use a five-phase process to introduce the decision context (i.e. the policy problem), define fundamental objectives, rank these objectives, identify value-based trade-offs between them and construct a multi-attribute utility model. The findings indicate several key themes for IoT security from the citizens themselves and decision-making administrators in diverse public agencies developing IoT cybersecurity public policy.
Keywords:IoT  Cyber security  Policy planning  Public values  Strategic objectives  Qualitative research
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号