Open Access

Economic impact of IOT and conventional data breaches: cost analysis and statistical trends

 and   
Feb 05, 2025

Cite
Download Cover

ExpressVPN (2024) The true cost of cyber attacks in 2024 and beyond https://www.expressvpn.com/blog/the-true-cost-of-cyber-attacks-in-2024-and-beyond/. (accessed 15th July 2024). Search in Google Scholar

Frustaci, M., Pace, P. and Aloi, G. (2017) Securing the IoT World: Issues and Perspectives. In: 2017 IEEE Conference on Standards for Communications and Networking (CSCN). IEEE, 246–251. Search in Google Scholar

Gatouillat, A., Badr, Y., Massot, B. and Sejdic, E. (2018) Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine. Journal of Healthcare Engineering. IEEE, 5, 3810–3822. Search in Google Scholar

IBM (2023) Cost of a Data Breach Report 2023. https://www.ibm.com/security/data-breach (accessed 30th June 2024) Search in Google Scholar

IBM (2024) What is a data breach? https://www.ibm.com/topics/data-breach (accessed 30th June 2024). Search in Google Scholar

IT Governance (2024a) Global Data Breaches and Cyber Attacks in 2024, https://www.itgovernance.co.uk/blog/global-data-breaches-and-cyber-attacks-in-2024 (accessed 12th July 2024). Search in Google Scholar

IT Governance (2024b) Data Breaches and Cyber Attacks – Europe 2024 Report, https://www.itgovernance.eu/blog/en/data-breaches-and-cyber-attacks-in-2024-in-europe (accessed 12th July 2024). Search in Google Scholar

Kang, W. M., Moon, S. Y. and Park, J. H. (2017) An Enhanced Security Framework for Home Appliances in Smart Homes. Human-Centric Computing and Information Sciences, 7 (6), https://doi.org/10.1186/s13673-017-0087-4 Search in Google Scholar

Kricka, L. J. (2019) History of Disruptions in Laboratory Medicine: What Have We Learned from Predictions? Clinical Chemistry and Laboratory Medicine. 57(3), 308–311. Search in Google Scholar

Lynn, T., Endo, P.T., Ribeiro, A.M.N.C., Barbosa, G.B.N., and Rosati, P. (2020) The Internet of Things: Definitions, Key Concepts, and Reference Architectures. In: T. Lynn, J. Mooney, B. Lee and P. Endo, eds., The Cloud-to-Thing Continuum. Palgrave Studies in Digital Business & Enabling Technologies. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-41110-7 1. https://link.springer.com/chapter/10.1007/978-3-030-41110-71#citeas Search in Google Scholar

Nadikattu, A. K. R. (2018) IoT and the Issue of Data Privacy. Journal of Advances in Computer Engineering and Technology, 5(10). ISSN: 2394–3696. Search in Google Scholar

Perera, C., Liu, C. H. and Jayawardena, S. (2015) The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey. IEEE Transactions on Emerging Topics in Computing, 3(4), 585–598. DOI: 10.1109/TETC.2015.2390034 Search in Google Scholar

Vongsingthong, S. and Smanchat, S. (2014) Internet of Things: A Review of Applications & Technologies. Suranaree Journal of Science and Technology, 21(4):359-374. Search in Google Scholar

Weyrich, M. and Ebert, C. (2016) Reference Architectures for the Internet of Things. IEEE Software, 33(1), 112–116. https://doi.org/10.1109/MS.2016.20 Search in Google Scholar