Towards Privacy by Design on the Internet of Things (IoT) Use: A Qualitative Descriptive Study
DOI:
https://doi.org/10.51519/journalisi.v4i2.302Keywords:
Privacy by Design, Internet of Things, Qualitative DescriptiveAbstract
From remote control and surveillance to energy and health monitoring, IoT devices provide cutting-edge services to improve our lives. Nevertheless, IoT technologies raise complicated, innovative privacy-related issues that might limit their widespread adoption. Due to the passive nature of many IoT devices, it may be challenging for users to understand that their personal information is being gathered. Therefore, this paper aims to examine the Privacy by Design IoT application idea. We adapted the seven principles of Ann Cavoukian's Privacy by Design, which were first developed. In this study's qualitative descriptive methodology with interview sections are used. The results indicate that the majority of IoT users agree with and have high expectations for the Privacy by Design concept to be one of the remedies to the imbalance between concerns about the risks and benefits of using IoT.
Downloads
References
S. Madakam, R. Ramaswamy, and S. Tripathi, "Internet of Things (IoT): A Literature Review," Journal of Computer and Communications, vol. 3, no. 5, 2015.
N. Ali Jasim and H. T. S. ALRikabi "Design and Implementation of Smart City Applications Based on the Internet of Things," International Journal of Interactive Mobile Technologies (iJIM), vol. 15, no. 13, 2021.
X. Yao, F. Farha, R. Li, I. Psychoula, L. Chen, and H. Ning, "Security and privacy issues of physical objects in the IoT: Challenges and opportunities," Digital Communications and Networks vol. 7, no. 3, 2021.
P. Bellini, P. Nesi, and G. Pantaleo, "IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies," Jurnal of Applied Science, vol. 12, no. 3, 2022.
H. Touqeer, S. Zaman, R. Amin, M. Hussain, F. Al-Turjman, and M. Bilal, "IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies," Jurnal of Applied Science, vol. 12, no. 3, 2022.
M. I. Ahmed and G. Kannan, "Secure and lightweight privacy preserving Internet of things integration for remote patient monitoring," Journal of King Saud University - Computer and Information Sciences, 2021.
D. G. Glance and R. Cardell-Oliver Privacy of Edge Computing and IoT. Book Secure Edge Computing. CRC Press, 2021.
Y. Ashibani and Q. H. Mahmoud "A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns," IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, 2018.
B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Journal of Internet of Things, vol. 11, 2020.
J. van Rest, "Designing Privacy-by-Design," Designing Privacy by Design, vol. 8319, 2014.
A. Cavoukian, "Privacy by Design: the definitive workshop," Identity in the Information Society, vol. 3, no. 2, 2010.
L. Bloomberg and M. Volpe, Completing Your Qualitative Dissertation: A Road Map From Beginning to End. 2018.
V. S. Brayan, N. Smith, and C. Mitton, "The Qualitative Descriptive Approach in International Comparative Studies: Using Online Qualitative Surveys," International Journal of Health Policy Management, vol. 7, no. 9, 2018.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














