SlideShare a Scribd company logo
1 of 9
Below are various theories and models that have been used and
can be used in research (from Dr. Steve Brown)
Behavioral et. al.
Absorptive capacity Theory
Accountability Theory
Activity Theory
Adaptive Structuration Theory
Administrative Behavior Theory
Argumentation Theory
Asch Conformity
Behavioral Decision Model
Belief Action Outcome Framework
Chaos Theory
Cognitive Fit Theory
Cognitive Load Theory
Cognitive Behavioral Therapy
Classical Conditioning
Conditioned Emotional Response
Cognitive Dissonance
Cognitive “purposive” Behaviorism
Consequentialist Ethics
Critical Theory
Csíkszentmihályi’s Flow
Cultural Theory
Deontological Ethics
Diffusion of Innovations Theory
Dynamic Capabilities
Distributed Cognitions Theory
Embodied social presence theory
Equity theory
Evolutionary theory
Eysenck’s Theory
Expectancy-value theory
Expectation Confirmation Theory
False Memory Syndrome
Field Theory
Fishbein's Attitude
General Deterrence Theory
Gestalt Theory of Personality
General Strain theory
Goal Contagion Theory
Gompertz Model (based upon Social Conflict Theory)
Grounded Theory
Hermeneutics
Illusion of Control
Impression Management Theory
Information Processing Theory
Impression Management Theory
Information Asymmetry Theory
Information Security Management Theory
Institutional Theory
Integrated Systems Theory
Keller's Motivational Model
Language action perspective
Law of Effect
Law of Emotion
Learned Helplessness Theory
McClelland’s Needs Theory
Neutralization Theory
Operant Conditioning
Mitchel’s Personality theory
Prospect Theory
Protection Motivation Theory
Self Determination Theory
Self-Efficacy Theory
Social Action Theory
Social Conflict Theory
Social Cognitive Theory
Social Exchange Theory
Social Identity Theory
Social Influence Theory
Social Learning Theory
Socio Technical Systems Theory
Task Closure Theory
Technology Acceptance Model
Technology Threat Avoidance Theory
Theory of Contextualism
Theory of Contiguity
Theory of Equipotentiality
Theory of Planned Behavior
Theory of Protection Motivation
Theory of Reasoned Action
Theory of Planned Behavior
Trait Theory
Virtue Ethics
Unified theory of acceptance and use of technology (UTAUT)
Universal Law of Generalization
Non-Behavioral
Accountability obfuscation
Actor Network theory
Attack Tree and Vague Sets
Bayes Theorem
Bayesian Inference
Bayesian Belief Network
Bayesian Networks
Boundary Object Theory
Broadbent’s Filter Theory Model
Complexity Theory
Cooperative game theory
Conformity Theory
Critical Realism Theory
Customer Based Discrepancy Theory
Customer Focus Theory
Deferred Action Theory
Design Theory
Elaboration Likelihood Model
Fit-Viability Theory
Flow Theory
Game Theory
Garbage Can Theory
General Systems Theory
General Deterrence Theory
Hebbian Theory
Human Agency Theory
Information Warfare
Institutional theory
International Information Systems Theory
Internationalization Theory
Information Technology Portfolio
Knowledge Management
Noncooperative game theory
Organization Based Access Control
Role-base access control
Management (ITPM) model
Mere Exposure Effect
Multi-attribute Utility Theory
Multi-motive Information Systems Continuance Model
Organizational culture theory
Organizational information processing theory
Organizational knowledge creation
Organizational learning theory
Portfolio theory
Process virtualization theory
P3P privacy policies
Poliheuristic decision theory
Privacy-enhancing technologies
Retrieval-induced forgetting
Social Information Processing Theory
Social Learning Theory
Social Network Theory
Social Penetration Theory
Task-technology Fit Model
Technology Dominance Theory
Technology-Organization-Environment TOE Framework
Theory of Information Warfare
Transaction Cost Economics
Tulving’s Model
Zeigarnik Effect
Internet of Things (IoT), security with TLS Digital Certificates
1
5
Internet of Things (IoT), security with TLS Digital Certificates
Internet of Things (IoT), security with TLS Digital Certificates
Sai Balaji Yamsani
University of the Cumberland’s
Internet of Things (IoT), security with TLS Digital Certificates
Introduction
The cited problem is security issues that occur in the
application of Internet of Things. The platform encounters a lot
of challenges due to the variety of devices connected and
numerous operations that depend on the online communicatio ns
(Sfar, 2018). Security incidents such as hacking are prone as the
IoT gets targeted for its high performance and capability of
promoting connectivity. The persons mainly affected by
problems in IoT are the device manufacturers, clients, and
technical teams that get constantly engaged with the devices to
facilitate their seamless operations. The purpose of this research
is to asses IoT issues that lead to the suitable solution which is
to implement the use of digital TLS 1.2 certificates for internet
of things. (Comments from professor :Need a reference to
support this )
Comment by Dr_Webb: Need a reference to support this
Problem and Research Theory Model
The IoT industry has faced challenging issues related to its
capability of connecting devices and implementing high quality
technology for manufacturing industry. An issue discovered is
transition of already existent systems to full IoT functions that
can improve on business functionality. Change from M2M to
IoT is exposed to such issues that require more study to
determine a smooth transition procedure (SierraWireless, 2017).
The theoretical framework suitable for this study is use of a
conceptual framework to analyze different components in the
area of IoT. It is possible to determine variables in research
using the theoretical framework. In this paper, the variables are
IoT devices, TLS certificates, and technology improvements in
the areas. (Professor comments - You need to identify a model.
Comment by Dr_Webb: You need to identify a model. I
have provided a list in the announcements.
Issues of security in the IoT are connected lack of accuracy in
access control, limited privacy, little trust in the connectivity
for the devices, and inability to identify the required operations
to enhance the IoT’s adaptations in many industries. The
security challenges have been common since digital
transformation has resulted in the majority of people in the
industry adapting to the use of IoT devices in their daily lives
and for work purposes (Sfar, 2018). The deployment of IoT
technology in different industries results in security issues due
to the new connectivity required as well as the need to employ
persons with the appropriate knowledge.
The population involved in this project is persons who use
IoT devices, technical teams required to maintain the devices,
and manufacturers that adopt the use of IoT for their products.
The common IoT devices include “smart fridges, smart Mobiles,
smart refrigerators, smart watches, smart fire alarm, smart door
lock, smart bicycle, medical sensors, fitness trackers, smart
security system” (Software Testing, 2021). The population to
get studied shall provide suitable insight into how the IoT
devices function. It would be possible to determine adaptability
of the devices to the current market. All technical teams
involved would lead to a discovery of the required
developments to handle the system’s operations. (professor
comments: your population is too broad. Need a better one.)
Application of a qualitative research model is the
effective way of improving the value of understanding IoT
industries. Qualitative research method is applicable by
studying documents that contain information related to the topic
(McLeod, 2019). The study shall assess different documents to
determine how use of TLS certificates gets conducted in the
current IT environment. Analysis of documents developed by
persons qualified to handle the topics would be an effective
method of supporting use of TLS certificates. There are
numerous documents created by valid persons with experience
in handling TLS certificates in the IoT industry. Comment by
Dr_Webb: Your population is too broad.
The article chosen for this approval paper is “Enhancing
Digital Certificate Usability in Long Lifespan IoT Devices by
Utilizing Private CA” by Yamakawa et al. (2018). The article is
closely related to my topic since it explains that the IoT’s
security issues can get managed by adopting the use of digital
certificates. The article offers effective connection to the topic
since it is possible to generate proper solutions for the
challenges connect to IoT operations. The participants in the
article were persons that possessed technical knowledge of
operation of IoT devices. The study analyzed how cloud server
operations and the security components promote the
development of factual security performance enhancement. It is
possible to increase the widespread manufacture of IoT devices
after adopting the operations to facilitate accuracy and smooth
operability.
Reference
SierraWireless. (2017). What is M2M? : The Evolution from
M2M to IoT. Retrieved 5 June 2021 from
https://www.sierrawireless.com/iot-blog/m2m-vs-iot-vs-ioe/.
Software Testing. (2021). 18 Most Popular IoT Devices In 2021
(Only Noteworthy IoT Products). Retrieved 5 June 2021 from
https://www.softwaretestinghelp.com/iot-devices/.
Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A
roadmap for security challenges in the Internet of Things,
Digital Communications and Networks, 4, (2). 118-137,
https://doi.org/10.1016/j.dcan.2017.04.003.
Yamakawa, D., Okimoto, T., Teerakanok, S., Inomata, A., &
Uehara, T. (2021). Enhancing Digital Certificate Usability in
Long Lifespan IoT Devices by Utilizing Private CA. Security
And Communication Networks, 2021, 1-14.
https://doi.org/10.1155/2021/6610863

More Related Content

Similar to Below are various theories and models that have been used and can

Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information ManagementAlexander Deucalion
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxcowinhelen
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of ThingsDeris Stiawan
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...IJECEIAES
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)Dadhaniya Renish
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Pvrtechnologies Nellore
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...IJECEIAES
 

Similar to Below are various theories and models that have been used and can (20)

Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
Iot 7-12-2021
Iot 7-12-2021Iot 7-12-2021
Iot 7-12-2021
 
Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...Aggregated proof based hierarchical authentication scheme for the internet of...
Aggregated proof based hierarchical authentication scheme for the internet of...
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Hyperparameter optimization using custom genetic algorithm for classificatio...
Hyperparameter optimization using custom genetic algorithm  for classificatio...Hyperparameter optimization using custom genetic algorithm  for classificatio...
Hyperparameter optimization using custom genetic algorithm for classificatio...
 

More from ChantellPantoja184

Problem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxProblem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxChantellPantoja184
 
Problem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docxProblem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docxChantellPantoja184
 
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxProblem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxChantellPantoja184
 
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxProblem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxChantellPantoja184
 
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxProblem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxChantellPantoja184
 
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxProblem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxChantellPantoja184
 
Problem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxProblem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxChantellPantoja184
 
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxProblem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxChantellPantoja184
 
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docxProblem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docxChantellPantoja184
 
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docxPROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docxChantellPantoja184
 
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxProblem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxChantellPantoja184
 
Problem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxProblem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxChantellPantoja184
 
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxProblem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxChantellPantoja184
 
Problem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docxProblem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docxChantellPantoja184
 
Problem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxProblem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxChantellPantoja184
 
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxProblem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxChantellPantoja184
 
Probation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxProbation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxChantellPantoja184
 
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxProblem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxChantellPantoja184
 
Probe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxProbe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxChantellPantoja184
 

More from ChantellPantoja184 (20)

Problem 1Problem 2.docx
Problem 1Problem 2.docxProblem 1Problem 2.docx
Problem 1Problem 2.docx
 
Problem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docxProblem 20-1A Production cost flow and measurement; journal entrie.docx
Problem 20-1A Production cost flow and measurement; journal entrie.docx
 
Problem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docxProblem 2 Obtain Io.Let x be the current through j2, ..docx
Problem 2 Obtain Io.Let x be the current through j2, ..docx
 
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docxProblem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
Problem 1On April 1, 20X4, Rojas purchased land by giving $100,000.docx
 
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docxProblem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
Problem 17-1 Dividends and Taxes [LO2]Dark Day, Inc., has declar.docx
 
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docxProblem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
Problem 1Problem 1 - Constant-Growth Common StockWhat is the value.docx
 
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docxProblem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
Problem 1Prescott, Inc., manufactures bookcases and uses an activi.docx
 
Problem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docxProblem 1Preston Recliners manufactures leather recliners and uses.docx
Problem 1Preston Recliners manufactures leather recliners and uses.docx
 
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docxProblem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
Problem 1Pro Forma Income Statement and Balance SheetBelow is the .docx
 
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docxProblem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
Problem 2-1PROBLEM 2-1Solution Legend= Value given in problemGiven.docx
 
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docxPROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
PROBLEM 14-6AProblem 14-6A Norwoods Borrowings1. Total amount of .docx
 
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docxProblem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
Problem 13-3AThe stockholders’ equity accounts of Ashley Corpo.docx
 
Problem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docxProblem 12-9AYour answer is partially correct.  Try again..docx
Problem 12-9AYour answer is partially correct.  Try again..docx
 
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docxProblem 1123456Xf122437455763715813910106Name DateTopic.docx
Problem 1123456Xf122437455763715813910106Name DateTopic.docx
 
Problem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docxProblem 1. For the truss and loading shown below, calculate th.docx
Problem 1. For the truss and loading shown below, calculate th.docx
 
Problem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docxProblem 1 (30 marks)Review enough information about .docx
Problem 1 (30 marks)Review enough information about .docx
 
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docxProblem 1 (10 points) Note that an eigenvector cannot be zero.docx
Problem 1 (10 points) Note that an eigenvector cannot be zero.docx
 
Probation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docxProbation and Parole 3Running head Probation and Parole.docx
Probation and Parole 3Running head Probation and Parole.docx
 
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docxProblem 1(a) Complete the following ANOVA table based on 20 obs.docx
Problem 1(a) Complete the following ANOVA table based on 20 obs.docx
 
Probe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docxProbe 140 SPrecipitation in inchesTemperature in F.docx
Probe 140 SPrecipitation in inchesTemperature in F.docx
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Below are various theories and models that have been used and can

  • 1. Below are various theories and models that have been used and can be used in research (from Dr. Steve Brown) Behavioral et. al. Absorptive capacity Theory Accountability Theory Activity Theory Adaptive Structuration Theory Administrative Behavior Theory Argumentation Theory Asch Conformity Behavioral Decision Model Belief Action Outcome Framework Chaos Theory Cognitive Fit Theory Cognitive Load Theory Cognitive Behavioral Therapy Classical Conditioning Conditioned Emotional Response Cognitive Dissonance Cognitive “purposive” Behaviorism Consequentialist Ethics Critical Theory Csíkszentmihályi’s Flow Cultural Theory Deontological Ethics Diffusion of Innovations Theory Dynamic Capabilities Distributed Cognitions Theory Embodied social presence theory Equity theory Evolutionary theory Eysenck’s Theory Expectancy-value theory Expectation Confirmation Theory
  • 2. False Memory Syndrome Field Theory Fishbein's Attitude General Deterrence Theory Gestalt Theory of Personality General Strain theory Goal Contagion Theory Gompertz Model (based upon Social Conflict Theory) Grounded Theory Hermeneutics Illusion of Control Impression Management Theory Information Processing Theory Impression Management Theory Information Asymmetry Theory Information Security Management Theory Institutional Theory Integrated Systems Theory Keller's Motivational Model Language action perspective Law of Effect Law of Emotion Learned Helplessness Theory McClelland’s Needs Theory Neutralization Theory Operant Conditioning Mitchel’s Personality theory Prospect Theory Protection Motivation Theory Self Determination Theory Self-Efficacy Theory Social Action Theory Social Conflict Theory Social Cognitive Theory Social Exchange Theory Social Identity Theory
  • 3. Social Influence Theory Social Learning Theory Socio Technical Systems Theory Task Closure Theory Technology Acceptance Model Technology Threat Avoidance Theory Theory of Contextualism Theory of Contiguity Theory of Equipotentiality Theory of Planned Behavior Theory of Protection Motivation Theory of Reasoned Action Theory of Planned Behavior Trait Theory Virtue Ethics Unified theory of acceptance and use of technology (UTAUT) Universal Law of Generalization Non-Behavioral Accountability obfuscation Actor Network theory Attack Tree and Vague Sets Bayes Theorem Bayesian Inference Bayesian Belief Network Bayesian Networks Boundary Object Theory Broadbent’s Filter Theory Model Complexity Theory Cooperative game theory Conformity Theory Critical Realism Theory Customer Based Discrepancy Theory Customer Focus Theory Deferred Action Theory Design Theory Elaboration Likelihood Model
  • 4. Fit-Viability Theory Flow Theory Game Theory Garbage Can Theory General Systems Theory General Deterrence Theory Hebbian Theory Human Agency Theory Information Warfare Institutional theory International Information Systems Theory Internationalization Theory Information Technology Portfolio Knowledge Management Noncooperative game theory Organization Based Access Control Role-base access control Management (ITPM) model Mere Exposure Effect Multi-attribute Utility Theory Multi-motive Information Systems Continuance Model Organizational culture theory Organizational information processing theory Organizational knowledge creation Organizational learning theory Portfolio theory Process virtualization theory P3P privacy policies Poliheuristic decision theory Privacy-enhancing technologies Retrieval-induced forgetting Social Information Processing Theory Social Learning Theory Social Network Theory Social Penetration Theory Task-technology Fit Model
  • 5. Technology Dominance Theory Technology-Organization-Environment TOE Framework Theory of Information Warfare Transaction Cost Economics Tulving’s Model Zeigarnik Effect Internet of Things (IoT), security with TLS Digital Certificates 1 5 Internet of Things (IoT), security with TLS Digital Certificates Internet of Things (IoT), security with TLS Digital Certificates Sai Balaji Yamsani University of the Cumberland’s
  • 6. Internet of Things (IoT), security with TLS Digital Certificates Introduction The cited problem is security issues that occur in the application of Internet of Things. The platform encounters a lot of challenges due to the variety of devices connected and numerous operations that depend on the online communicatio ns (Sfar, 2018). Security incidents such as hacking are prone as the IoT gets targeted for its high performance and capability of promoting connectivity. The persons mainly affected by problems in IoT are the device manufacturers, clients, and technical teams that get constantly engaged with the devices to facilitate their seamless operations. The purpose of this research is to asses IoT issues that lead to the suitable solution which is to implement the use of digital TLS 1.2 certificates for internet of things. (Comments from professor :Need a reference to support this ) Comment by Dr_Webb: Need a reference to support this Problem and Research Theory Model The IoT industry has faced challenging issues related to its capability of connecting devices and implementing high quality technology for manufacturing industry. An issue discovered is transition of already existent systems to full IoT functions that can improve on business functionality. Change from M2M to IoT is exposed to such issues that require more study to determine a smooth transition procedure (SierraWireless, 2017). The theoretical framework suitable for this study is use of a conceptual framework to analyze different components in the
  • 7. area of IoT. It is possible to determine variables in research using the theoretical framework. In this paper, the variables are IoT devices, TLS certificates, and technology improvements in the areas. (Professor comments - You need to identify a model. Comment by Dr_Webb: You need to identify a model. I have provided a list in the announcements. Issues of security in the IoT are connected lack of accuracy in access control, limited privacy, little trust in the connectivity for the devices, and inability to identify the required operations to enhance the IoT’s adaptations in many industries. The security challenges have been common since digital transformation has resulted in the majority of people in the industry adapting to the use of IoT devices in their daily lives and for work purposes (Sfar, 2018). The deployment of IoT technology in different industries results in security issues due to the new connectivity required as well as the need to employ persons with the appropriate knowledge. The population involved in this project is persons who use IoT devices, technical teams required to maintain the devices, and manufacturers that adopt the use of IoT for their products. The common IoT devices include “smart fridges, smart Mobiles, smart refrigerators, smart watches, smart fire alarm, smart door lock, smart bicycle, medical sensors, fitness trackers, smart security system” (Software Testing, 2021). The population to get studied shall provide suitable insight into how the IoT devices function. It would be possible to determine adaptability of the devices to the current market. All technical teams involved would lead to a discovery of the required developments to handle the system’s operations. (professor comments: your population is too broad. Need a better one.) Application of a qualitative research model is the effective way of improving the value of understanding IoT industries. Qualitative research method is applicable by studying documents that contain information related to the topic (McLeod, 2019). The study shall assess different documents to determine how use of TLS certificates gets conducted in the
  • 8. current IT environment. Analysis of documents developed by persons qualified to handle the topics would be an effective method of supporting use of TLS certificates. There are numerous documents created by valid persons with experience in handling TLS certificates in the IoT industry. Comment by Dr_Webb: Your population is too broad. The article chosen for this approval paper is “Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA” by Yamakawa et al. (2018). The article is closely related to my topic since it explains that the IoT’s security issues can get managed by adopting the use of digital certificates. The article offers effective connection to the topic since it is possible to generate proper solutions for the challenges connect to IoT operations. The participants in the article were persons that possessed technical knowledge of operation of IoT devices. The study analyzed how cloud server operations and the security components promote the development of factual security performance enhancement. It is possible to increase the widespread manufacture of IoT devices after adopting the operations to facilitate accuracy and smooth operability.
  • 9. Reference SierraWireless. (2017). What is M2M? : The Evolution from M2M to IoT. Retrieved 5 June 2021 from https://www.sierrawireless.com/iot-blog/m2m-vs-iot-vs-ioe/. Software Testing. (2021). 18 Most Popular IoT Devices In 2021 (Only Noteworthy IoT Products). Retrieved 5 June 2021 from https://www.softwaretestinghelp.com/iot-devices/. Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things, Digital Communications and Networks, 4, (2). 118-137, https://doi.org/10.1016/j.dcan.2017.04.003. Yamakawa, D., Okimoto, T., Teerakanok, S., Inomata, A., & Uehara, T. (2021). Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. Security And Communication Networks, 2021, 1-14. https://doi.org/10.1155/2021/6610863