SlideShare a Scribd company logo
Running head: INTERNET OF THINGS1
INTERNET OF THINGS10
Internet of Things
Ideation Process
Innovation technology is mainly concerned with the
introduction of a new idea into the market. Any basic
innovation technology has an ideation process as its basis.
Ideation becomes the most basic step. During this stage, a
thought is generated. From this thought, an idea is analyzed
and provided. The analysis process is done purposefully to
determine the feasibility of the implementation of the developed
idea. Analysis also establishes the market demand of the idea
that has been developed. It determines the possible profit, and
this such of an idea would bring to the organization upon its
implementation. This explanation will be discussed on the
aspect of a new technology known as Internet of Things, which
was designed with a main reason of providing internet faculties
to all locations on the surface of the earth on each scale.
When an analysis has been completed, what follows
afterwards is the aspect of idea implementation.
Implementation of the idea is always followed by the testing of
the idea (Gubbi et al., 2013). Here, the idea is tested for its
validity to be established. The validity here is trying to answer
the question of whether the idea is trying to answer the problem
that led to its establishment and implementation. Validity also
gives the corrections and accuracy on the assessment of the set
system. In case the assessment gives the right thing that the set
idea was meant to provide, then the idea is valued and worth to
be used in the market. If a contrary occurs, then it becomes
advisable for the idea to be scripted. Every system needs to
pass the validity test for it to be reliable, although some experts
argues that not all valid systems are reliable.
Alternative
Solution
s
Most cases of the idealization process require alternatives to
limit any possible risk or loss. Sometimes, it is evident that the
innovative idea may bring some critical challenges in the
implementation process. Some aspects that should be
considered in the process include budget, and other critical
resources that are required in the implementation process. For
instance, the IoT can be used to supply internet connectivity in
case the other alternative fails or vice versa. It is recommended
that any form of learning and research should be done to control
any possible discrepancies in the IoT technology. Any other
technology can be implemented if it depicts the same
functionality as the one described by the IoT.
Overview
The IoT refers to ever-growing technology that provides IP
addresses to all objects and substances that one may imagine
associating with. The assigned objects can promote
communication amongst themselves. This technology tries to
improve communication among individuals on a large scale by
using the internet. The data grouping as well as digitizing the
concept of IoT, calls for construction of four core basic models
(Tukker et al., 2013). Namely, extend, manage, monetize and
finally operate. These named models are the most common
models that can be applied in the four internets. Any business
should not believe that IoT has control over the four named
basic models. For example, one should pay for usage of a
model to function such services.
Some benefits of IoT is that it does not look at the size of an
organization when providing its services. Internet of Things
has improved efficiency at the workplace. It promotes rapid
business improvement since it promotes effective advertising of
its products. It promotes easy access of the business tools since
they can be accessed from anywhere. But of course, whenever
there are benefits, there are always some concerns. In this case,
securities management in IoT with advancement in technology,
the security issue has become the most critical concern. It is
the one of the main factors that makes some businesses from
accepting the use of IoT on their premises. Some of the
security risk factor originates from authentication, access
management and risk virtualization which could consist of
identity and record management. IoT is trying to provide quick
notifications for the internet service providers and content
services providers. The named modification tends to present an
aspect of data leakage, a fact that may lead to privacy
compromising and thus insecurity. Distributed and outsourcing
on the other hand can cause risk to the information security
(Feki et al., 2013).
Quantitative Data
Most of the technologies on the internet is responsible for
the interaction between the content and people forming the
foundation for the modern internet usage. The active users of
the web are based on the generation of materials and the
downloading of things through smartphones and computers.
The change in the internet by the clients may be passive if the
projection for the rise in IoT becomes a reality, especially with
objects like home appliances, car components, and the self-
maintained machines. The devices are responsible for receiving
and sending information on behalf of the user with or without
the intervention of man. The shift may lead to the change of
thoughts, if most of the internet connections and the derived
data are transformed from the passive involvement of the
connected objects in the wider environment (Perera, et al.
2014).
Potential Threats
There is a high level of trust for someone that utilizes a
computer or any device that is connected to the internet. Some
people would like to think the machines connected to the
internet are safe and secure to conduct various activities that we
conduct daily. The loss of trust may occur if the customers do
not believe in the security of their devices and the information
stored (Gubbi, et al. 2013). The provision of safety should be
considered as the top priority. Inadequate security of the IoT
services could give an opportunity for the entry of the cyber-
crimes by enabling the malicious persons to re-program the
device or cause a serious malfunctioning. The bad design of the
devices can expose the data to theft due to the data streams
inadequate protection. The malfunctioning machines can create
the security vulnerability. The problem would appear internally
in the computers connectivity that connects to the Internet. On
the other hand, the technical constraints and the competitive
cost of the IoT machines create barriers to the manufacturers to
have adequate security design characteristics into these
machines. Thus, creating security vulnerability and other
maintenance threats as compared to the traditional computers
(AFCEA, 2015).
Our capability to operate and conduct our daily activities is
using the systems or devices that are internet enabled and on the
rise. It is much harder to obtain individual machines that are
not connected to the internet. Therefore, we become more
dependent on the IoT devices for the substantial applications in
the day to day use, which attracts more cyber-attacks. It makes
the security of the IoT machines a significant threat and
discussion point of all the component of the devices (AFCEA,
2015).
Success Factors
The IoT entails a broad range of items from the sensors,
networks, all the way to the machinery. The most significant
point in the communication are the processors speed in the
communication. There are four critical aspects to consider in
the foundation of the successful deployment of IoT. These
include connectivity, security, interoperability/standards, and
ecosystem. Connectivity, the advantages of the trending
technological advancement while providing protection to the
massive investment is the primary challenge to the industrial
firms. The legacy created by the technology cannot be
overlooked. The manageability of the systems is significantly
increasing for the manufacturing business. Security is vital and
is a necessity to ensure that the inviolability of the computer
operates firmly. The consequences may spread beyond control.
The value of the secret data is essential to the organization’s
success (Gubbi, et al. 2013). Interoperability and the standards:
the various components of the IoT should be able to
interoperate and connect with the devices. The action can only
be possible with the right and open industries that can provide
reliable interconnections, secure information and share
information in the IoT. Ecosystem, it plays a more vital role in
the innovative thinking and advancements in the industry. It
needs an extensive network of trusted partners for it to
accomplish its full objectives (Gubbi, et al. 2013).
Lifecycle Model & Cost
With regards to the time and cost of development and
research of the model, it is important that the costs be offset by
the profits which are realized once the product is released to the
market for the customers to use it. Therefore, the varying
product should also be understood that its lifespan imply that
the business should accurately project their returns on their
research, development and costs associated with the investments
is based on the potential longevity of the product in the chosen
market. The amounts of time which can be taken to recover the
costs mainly depend on various factors. This includes the
availability of the market for the products produced by the
company using such technological model (Williams et al.,
2015). This implies that when the market is available, then more
goods will be sold, resulting in an increase in revenue making
the organization to recover its costs of setting up as well as any
other relevant costs.
The elasticity of demand of the product as well will
determine the time which will be taken to recover the costs of
setting up and development costs. This is because if the product
is more elastic, then it implies that any slight increase in the
price will make all the customers decrease their demand for the
product. However, if the product is inelastic, then the company
can increase its price and the demand will be the same making
them recover their costs within a short span of time.
Consequently, the return on investment basing mainly on the
development costs together with the risks of the product life
cycle model as well depend on various factors such as the
utilization of the available technology into producing the
products which are very appealing to the customers. The timing
will depend on the demand of the produced product which can,
in turn, lead to an immediate return on investment.
Marketing Measures
The marketing measures are undertaken so that the product
can get accepted in the market by the customers, as well as
determine the time the return on investment will be realized. By
carrying out rigorous marketing to enable the customers and the
prospective customers to understand more about the product and
its usefulness, it is coherent that the sales will increase and in
turn ensuring that the organizations realize its return on
investment (Bertin et al., 2013).
Cost Associated
The costs associated with the life of the product of the IoT
are the research and development costs which are incurred in
ensuring that the product, which is being developed is
acceptable and most importantly, appealing to the customers.
Furthermore, the advertising and marketing costs can be
incurred as well to ensure that the products produced are well
known to the customers. Delivery costs, which can be incurred
when transporting the product to the customer's location, can as
well be experienced. Such costs will be recovered in the profit
made for such activities carried out.
Acceptance Process
The acceptance process relating to the IoT as well as the IoT
lifecycle is that it is coherent that most of the devices, which
surround an individual, will be connected to the internet. This
can be achieved through the cell phones or the wearable
technology. This implies that the IoT will connect each of the
individuals in any way possible. Such activities have been
found to mainly be acceptable so that the operations of any
organizations can work efficiently. It is coherent that there has
been a various dramatic increase in the innovation activities
where there is a potential improvement of activities in the
cyber-physical systems (Miller et al., 2015).Engineering and
Manufacturing Processes & Planning for Development
The convergence facilitated by the IoT has eliminated the
so-called silo walls. These existed between information
technology and operational technology. Currently, there is an
allowance that allows unstructured data to be sorted and
analyzed for availing insights which drive improvements.
Computers do not have to be solely dependent on the input of
humans, and this has resolved major challenges with the
deficiency of human inputs (Orsino et al.,2016).
Human beings tend to have limited attention, accuracy, and
time. It follows that they have inadequacies when capturing data
on things (Junget al., 2016). Having computers which can
record and analyze everything, what there is to know as far as
things (people, animals, as well as inanimate natural and
manmade things) are concerned means that human beings are
then able to count and track everything. This ends-up with a
great reduction in cost, waste, as well as losses. The use of the
IoT would facilitate accurate estimation of when things need
replacing, recalling, or even repairs (Li et al., 2016).Defects &
Causes of Deviations during Development
The biggest challenge with the IoT is that with the increase
in the smart nodes, the amount of the upstream data is bound to
match-up with an unprecedented amplification. This is because
most of the nodes will be actively generating data and new
security concerns are bound to be raised. They will be
particularly with respect to data sovereignty and data privacy.
Even if some due diligence has been exercised to make
communication secure and safe, trends have indicated that the
stakeholders may not be certain about this (Li et al., 2016).
It is bound to be important to avoid interruptions and
operational failures, as more enterprises continue to use the
technology. Now, the physical attacks on remotely located
devices have not been a matter of significant concern. With
time, organizations will have to do more to strengthen their
physical security to avert unauthorized access. This is
particularly since the complexity of the vulnerabilities has not
yet been understood (Orsino et al.,2016).Using Internet of
Things to Maximize Productivity
The IoT technology is among one of the most notable
applications in many industries. It came in handy in building
management, precision agriculture, energy, transportation as
well as healthcare (Orsino et al.,2016). There have been a
remarkable number of connectivity options, which application
developers as well as electronic engineers, may utilize while
working with the various systems. If effective vulnerability,
patching and management is put in place, the rapidly increasing
demand in the bandwidth will always be met in time (Chung et
al., 2016).
Among the stakeholders who are bound to find the IoT being
valuable include technology enthusiasts and marketers.
Entrepreneurs are impressed when they get data on customers.
IoT is facilitating better connection and access to clients. With
smart devices, it will be possible to track and even record
important patterns relating to consumer purchasing behaviors.
This will ultimately facilitate the making of impactful product
recommendations.
The IoT will also facilitate remote work, or telecommuting,
as well as revolutionize inventory management and tracking.
Nonetheless, it will always depend on the kind of business and
the activity one wishes to speed-up and expand. Even if some
businesses and industries may disappear, i.e. unless they change
in a radical manner, those which integrate IoT in their
operations will have a remarkable increase in productivity.

More Related Content

Similar to Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx

1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
vickeryr87
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
Cigniti Technologies Ltd
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
ADCBarcode
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
Accenture Technology
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
ijcsit
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
AIRCC Publishing Corporation
 
What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?
Pixel Crayons
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
IJEACS
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
FuGenx Technologies
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
VannaSchrader3
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
MdShahinAlam25
 
Internet of things
Internet of thingsInternet of things
Internet of things
SUBHASHREESUDHANSUSE
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
BugRaptors
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
Dr. Raghavendra GS
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 

Similar to Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx (20)

1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?What are Pros and Cons of Internet of Things?
What are Pros and Cons of Internet of Things?
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things Novel authentication framework for securing communication in internet-of-things
Novel authentication framework for securing communication in internet-of-things
 

More from cowinhelen

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
cowinhelen
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
cowinhelen
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
cowinhelen
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docx
cowinhelen
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docx
cowinhelen
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
cowinhelen
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
cowinhelen
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docx
cowinhelen
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
cowinhelen
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
cowinhelen
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
cowinhelen
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docx
cowinhelen
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
cowinhelen
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docx
cowinhelen
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docx
cowinhelen
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docx
cowinhelen
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docx
cowinhelen
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
cowinhelen
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docx
cowinhelen
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
cowinhelen
 

More from cowinhelen (20)

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docx
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docx
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docx
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docx
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docx
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docx
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docx
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docx
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docx
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
 

Recently uploaded

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx

  • 1. Running head: INTERNET OF THINGS1 INTERNET OF THINGS10 Internet of Things Ideation Process Innovation technology is mainly concerned with the introduction of a new idea into the market. Any basic innovation technology has an ideation process as its basis. Ideation becomes the most basic step. During this stage, a thought is generated. From this thought, an idea is analyzed and provided. The analysis process is done purposefully to determine the feasibility of the implementation of the developed idea. Analysis also establishes the market demand of the idea that has been developed. It determines the possible profit, and this such of an idea would bring to the organization upon its implementation. This explanation will be discussed on the aspect of a new technology known as Internet of Things, which was designed with a main reason of providing internet faculties to all locations on the surface of the earth on each scale. When an analysis has been completed, what follows afterwards is the aspect of idea implementation. Implementation of the idea is always followed by the testing of the idea (Gubbi et al., 2013). Here, the idea is tested for its validity to be established. The validity here is trying to answer the question of whether the idea is trying to answer the problem that led to its establishment and implementation. Validity also gives the corrections and accuracy on the assessment of the set
  • 2. system. In case the assessment gives the right thing that the set idea was meant to provide, then the idea is valued and worth to be used in the market. If a contrary occurs, then it becomes advisable for the idea to be scripted. Every system needs to pass the validity test for it to be reliable, although some experts argues that not all valid systems are reliable. Alternative Solution s Most cases of the idealization process require alternatives to limit any possible risk or loss. Sometimes, it is evident that the innovative idea may bring some critical challenges in the implementation process. Some aspects that should be considered in the process include budget, and other critical resources that are required in the implementation process. For instance, the IoT can be used to supply internet connectivity in case the other alternative fails or vice versa. It is recommended that any form of learning and research should be done to control any possible discrepancies in the IoT technology. Any other technology can be implemented if it depicts the same functionality as the one described by the IoT. Overview The IoT refers to ever-growing technology that provides IP addresses to all objects and substances that one may imagine
  • 3. associating with. The assigned objects can promote communication amongst themselves. This technology tries to improve communication among individuals on a large scale by using the internet. The data grouping as well as digitizing the concept of IoT, calls for construction of four core basic models (Tukker et al., 2013). Namely, extend, manage, monetize and finally operate. These named models are the most common models that can be applied in the four internets. Any business should not believe that IoT has control over the four named basic models. For example, one should pay for usage of a model to function such services. Some benefits of IoT is that it does not look at the size of an organization when providing its services. Internet of Things has improved efficiency at the workplace. It promotes rapid business improvement since it promotes effective advertising of its products. It promotes easy access of the business tools since they can be accessed from anywhere. But of course, whenever there are benefits, there are always some concerns. In this case, securities management in IoT with advancement in technology, the security issue has become the most critical concern. It is the one of the main factors that makes some businesses from accepting the use of IoT on their premises. Some of the security risk factor originates from authentication, access management and risk virtualization which could consist of identity and record management. IoT is trying to provide quick
  • 4. notifications for the internet service providers and content services providers. The named modification tends to present an aspect of data leakage, a fact that may lead to privacy compromising and thus insecurity. Distributed and outsourcing on the other hand can cause risk to the information security (Feki et al., 2013). Quantitative Data Most of the technologies on the internet is responsible for the interaction between the content and people forming the foundation for the modern internet usage. The active users of the web are based on the generation of materials and the downloading of things through smartphones and computers. The change in the internet by the clients may be passive if the projection for the rise in IoT becomes a reality, especially with objects like home appliances, car components, and the self- maintained machines. The devices are responsible for receiving and sending information on behalf of the user with or without the intervention of man. The shift may lead to the change of thoughts, if most of the internet connections and the derived data are transformed from the passive involvement of the connected objects in the wider environment (Perera, et al. 2014). Potential Threats There is a high level of trust for someone that utilizes a computer or any device that is connected to the internet. Some
  • 5. people would like to think the machines connected to the internet are safe and secure to conduct various activities that we conduct daily. The loss of trust may occur if the customers do not believe in the security of their devices and the information stored (Gubbi, et al. 2013). The provision of safety should be considered as the top priority. Inadequate security of the IoT services could give an opportunity for the entry of the cyber- crimes by enabling the malicious persons to re-program the device or cause a serious malfunctioning. The bad design of the devices can expose the data to theft due to the data streams inadequate protection. The malfunctioning machines can create the security vulnerability. The problem would appear internally in the computers connectivity that connects to the Internet. On the other hand, the technical constraints and the competitive cost of the IoT machines create barriers to the manufacturers to have adequate security design characteristics into these machines. Thus, creating security vulnerability and other maintenance threats as compared to the traditional computers (AFCEA, 2015). Our capability to operate and conduct our daily activities is using the systems or devices that are internet enabled and on the rise. It is much harder to obtain individual machines that are not connected to the internet. Therefore, we become more dependent on the IoT devices for the substantial applications in the day to day use, which attracts more cyber-attacks. It makes
  • 6. the security of the IoT machines a significant threat and discussion point of all the component of the devices (AFCEA, 2015). Success Factors The IoT entails a broad range of items from the sensors, networks, all the way to the machinery. The most significant point in the communication are the processors speed in the communication. There are four critical aspects to consider in the foundation of the successful deployment of IoT. These include connectivity, security, interoperability/standards, and ecosystem. Connectivity, the advantages of the trending technological advancement while providing protection to the massive investment is the primary challenge to the industrial firms. The legacy created by the technology cannot be overlooked. The manageability of the systems is significantly increasing for the manufacturing business. Security is vital and is a necessity to ensure that the inviolability of the computer operates firmly. The consequences may spread beyond control. The value of the secret data is essential to the organization’s success (Gubbi, et al. 2013). Interoperability and the standards: the various components of the IoT should be able to interoperate and connect with the devices. The action can only be possible with the right and open industries that can provide reliable interconnections, secure information and share information in the IoT. Ecosystem, it plays a more vital role in
  • 7. the innovative thinking and advancements in the industry. It needs an extensive network of trusted partners for it to accomplish its full objectives (Gubbi, et al. 2013). Lifecycle Model & Cost With regards to the time and cost of development and research of the model, it is important that the costs be offset by the profits which are realized once the product is released to the market for the customers to use it. Therefore, the varying product should also be understood that its lifespan imply that the business should accurately project their returns on their research, development and costs associated with the investments is based on the potential longevity of the product in the chosen market. The amounts of time which can be taken to recover the costs mainly depend on various factors. This includes the availability of the market for the products produced by the company using such technological model (Williams et al., 2015). This implies that when the market is available, then more goods will be sold, resulting in an increase in revenue making the organization to recover its costs of setting up as well as any other relevant costs. The elasticity of demand of the product as well will determine the time which will be taken to recover the costs of setting up and development costs. This is because if the product is more elastic, then it implies that any slight increase in the price will make all the customers decrease their demand for the
  • 8. product. However, if the product is inelastic, then the company can increase its price and the demand will be the same making them recover their costs within a short span of time. Consequently, the return on investment basing mainly on the development costs together with the risks of the product life cycle model as well depend on various factors such as the utilization of the available technology into producing the products which are very appealing to the customers. The timing will depend on the demand of the produced product which can, in turn, lead to an immediate return on investment. Marketing Measures The marketing measures are undertaken so that the product can get accepted in the market by the customers, as well as determine the time the return on investment will be realized. By carrying out rigorous marketing to enable the customers and the prospective customers to understand more about the product and its usefulness, it is coherent that the sales will increase and in turn ensuring that the organizations realize its return on investment (Bertin et al., 2013). Cost Associated The costs associated with the life of the product of the IoT are the research and development costs which are incurred in ensuring that the product, which is being developed is acceptable and most importantly, appealing to the customers. Furthermore, the advertising and marketing costs can be
  • 9. incurred as well to ensure that the products produced are well known to the customers. Delivery costs, which can be incurred when transporting the product to the customer's location, can as well be experienced. Such costs will be recovered in the profit made for such activities carried out. Acceptance Process The acceptance process relating to the IoT as well as the IoT lifecycle is that it is coherent that most of the devices, which surround an individual, will be connected to the internet. This can be achieved through the cell phones or the wearable technology. This implies that the IoT will connect each of the individuals in any way possible. Such activities have been found to mainly be acceptable so that the operations of any organizations can work efficiently. It is coherent that there has been a various dramatic increase in the innovation activities where there is a potential improvement of activities in the cyber-physical systems (Miller et al., 2015).Engineering and Manufacturing Processes & Planning for Development The convergence facilitated by the IoT has eliminated the so-called silo walls. These existed between information technology and operational technology. Currently, there is an allowance that allows unstructured data to be sorted and analyzed for availing insights which drive improvements. Computers do not have to be solely dependent on the input of humans, and this has resolved major challenges with the
  • 10. deficiency of human inputs (Orsino et al.,2016). Human beings tend to have limited attention, accuracy, and time. It follows that they have inadequacies when capturing data on things (Junget al., 2016). Having computers which can record and analyze everything, what there is to know as far as things (people, animals, as well as inanimate natural and manmade things) are concerned means that human beings are then able to count and track everything. This ends-up with a great reduction in cost, waste, as well as losses. The use of the IoT would facilitate accurate estimation of when things need replacing, recalling, or even repairs (Li et al., 2016).Defects & Causes of Deviations during Development The biggest challenge with the IoT is that with the increase in the smart nodes, the amount of the upstream data is bound to match-up with an unprecedented amplification. This is because most of the nodes will be actively generating data and new security concerns are bound to be raised. They will be particularly with respect to data sovereignty and data privacy. Even if some due diligence has been exercised to make communication secure and safe, trends have indicated that the stakeholders may not be certain about this (Li et al., 2016). It is bound to be important to avoid interruptions and operational failures, as more enterprises continue to use the technology. Now, the physical attacks on remotely located devices have not been a matter of significant concern. With
  • 11. time, organizations will have to do more to strengthen their physical security to avert unauthorized access. This is particularly since the complexity of the vulnerabilities has not yet been understood (Orsino et al.,2016).Using Internet of Things to Maximize Productivity The IoT technology is among one of the most notable applications in many industries. It came in handy in building management, precision agriculture, energy, transportation as well as healthcare (Orsino et al.,2016). There have been a remarkable number of connectivity options, which application developers as well as electronic engineers, may utilize while working with the various systems. If effective vulnerability, patching and management is put in place, the rapidly increasing demand in the bandwidth will always be met in time (Chung et al., 2016). Among the stakeholders who are bound to find the IoT being valuable include technology enthusiasts and marketers. Entrepreneurs are impressed when they get data on customers. IoT is facilitating better connection and access to clients. With smart devices, it will be possible to track and even record important patterns relating to consumer purchasing behaviors. This will ultimately facilitate the making of impactful product recommendations. The IoT will also facilitate remote work, or telecommuting, as well as revolutionize inventory management and tracking.
  • 12. Nonetheless, it will always depend on the kind of business and the activity one wishes to speed-up and expand. Even if some businesses and industries may disappear, i.e. unless they change in a radical manner, those which integrate IoT in their operations will have a remarkable increase in productivity.