scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2015"


Journal ArticleDOI
TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Abstract: This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies, and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement to deliver a new class of applications. The current revolution in Internet, mobile, and machine-to-machine (M2M) technologies can be seen as the first phase of the IoT. In the coming years, the IoT is expected to bridge diverse technologies to enable new applications by connecting physical objects together in support of intelligent decision making. This paper starts by providing a horizontal overview of the IoT. Then, we give an overview of some technical details that pertain to the IoT enabling technologies, protocols, and applications. Compared to other survey papers in the field, our objective is to provide a more thorough summary of the most relevant protocols and application issues to enable researchers and application developers to get up to speed quickly on how the different protocols fit together to deliver desired functionalities without having to go through RFCs and the standards specifications. We also provide an overview of some of the key IoT challenges presented in the recent literature and provide a summary of related research work. Moreover, we explore the relation between the IoT and other emerging technologies including big data analytics and cloud and fog computing. We also present the need for better horizontal integration among IoT services. Finally, we present detailed service use-cases to illustrate how the different protocols presented in the paper fit together to deliver desired IoT services.

6,131 citations


Journal ArticleDOI
TL;DR: The definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed and the major challenges which need addressing by the research community and corresponding potential solutions are investigated.
Abstract: In recent year, the Internet of Things (IoT) has drawn significant research attention. IoT is considered as a part of the Internet of the future and will comprise billions of intelligent communicating `things'. The future of the Internet will consist of heterogeneously connected devices that will further extend the borders of the world with physical entities and virtual components. The Internet of Things (IoT) will empower the connected things with new capabilities. In this survey, the definitions, architecture, fundamental technologies, and applications of IoT are systematically reviewed. Firstly, various definitions of IoT are introduced; secondly, emerging techniques for the implementation of IoT are discussed; thirdly, some open issues related to the IoT applications are explored; finally, the major challenges which need addressing by the research community and corresponding potential solutions are investigated.

5,295 citations


Journal ArticleDOI
TL;DR: The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday.
Abstract: It has been next to impossible in the past months not to come across the term ‘‘Internet of Things’’ (IoT) one way or another. Especially the past year has seen a tremendous surge of interest in the Internet of Things. Consortia have been formed to define frameworks and standards for the IoT. Companies have started to introduce numerous IoTbased products and services. And a number of IoT-related acquisitions have been making the headlines, including, e.g., the prominent takeover of Nest by Google for $3.2 billion and the subsequent acquisitions of Dropcam by Nest and of SmartThings by Samsung. Politicians as well as practitioners increasingly acknowledge the Internet of Things as a real business opportunity, and estimates currently suggest that the IoT could grow into a market worth $7.1 trillion by 2020 (IDC 2014). While the term Internet of Things is now more and more broadly used, there is no common definition or understanding today of what the IoT actually encompasses. The origins of the term date back more than 15 years and have been attributed to the work of the Auto-ID Labs at the Massachusetts Institute of Technology (MIT) on networked radio-frequency identification (RFID) infrastructures (Atzori et al. 2010; Mattern and Floerkemeier 2010). Since then, visions for the Internet of Things have been further developed and extended beyond the scope of RFID technologies. The International Telecommunication Union (ITU) for instance now defines the Internet of Things as ‘‘a global infrastructure for the Information Society, enabling advanced services by interconnecting (physical and virtual) things based on, existing and evolving, interoperable information and communication technologies’’ (ITU 2012). At the same time, a multitude of alternative definitions has been proposed. Some of these definitions exhibit an emphasis on the things which become connected in the IoT. Other definitions focus on Internet-related aspects of the IoT, such as Internet protocols and network technology. And a third type centers on semantic challenges in the IoT relating to, e.g., the storage, search and organization of large volumes of information (Atzori et al. 2010). The fields of application for IoT technologies are as numerous as they are diverse, as IoT solutions are increasingly extending to virtually all areas of everyday. The most prominent areas of application include, e.g., the smart industry, where the development of intelligent production systems and connected production sites is often discussed under the heading of Industry 4.0. In the smart home or building area, intelligent thermostats and security systems are receiving a lot of attention, while smart energy applications focus on smart electricity, gas and water meters. Smart transport solutions include, e.g., vehicle fleet tracking and mobile ticketing, while in the smart health area, topics such as patients’ surveillance and chronic disease management are being addressed. And in the context of Accepted after one revision by Prof. Dr. Sinz.

3,499 citations


Journal ArticleDOI
TL;DR: Five IoT technologies that are essential in the deployment of successful IoT-based products and services are presented and three IoT categories for enterprise applications used to enhance customer value are discussed and the real option approach is illustrated.

2,024 citations


Journal ArticleDOI
TL;DR: The current state of research on the Internet of Things is reported on by examining the literature, identifying current trends, describing challenges that threaten IoT diffusion, presenting open research questions and future directions and compiling a comprehensive reference list to assist researchers.
Abstract: The Internet of Things is a paradigm where everyday objects can be equipped with identifying, sensing, networking and processing capabilities that will allow them to communicate with one another and with other devices and services over the Internet to accomplish some objective. Ultimately, IoT devices will be ubiquitous, context-aware and will enable ambient intelligence. This article reports on the current state of research on the Internet of Things by examining the literature, identifying current trends, describing challenges that threaten IoT diffusion, presenting open research questions and future directions and compiling a comprehensive reference list to assist researchers.

1,301 citations


Journal ArticleDOI
TL;DR: This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues and analyzes the open challenges and strategies for future research work in the area.
Abstract: The Internet of Things (IoT) introduces a vision of a future Internet where users, computing systems, and everyday objects possessing sensing and actuating capabilities cooperate with unprecedented convenience and economical benefits. As with the current Internet architecture, IP-based communication protocols will play a key role in enabling the ubiquitous connectivity of devices in the context of IoT applications. Such communication technologies are being developed in line with the constraints of the sensing platforms likely to be employed by IoT applications, forming a communications stack able to provide the required power—efficiency, reliability, and Internet connectivity. As security will be a fundamental enabling factor of most IoT applications, mechanisms must also be designed to protect communications enabled by such technologies. This survey analyzes existing protocols and mechanisms to secure communications in the IoT, as well as open research issues. We analyze how existing approaches ensure fundamental security requirements and protect communications on the IoT, together with the open challenges and strategies for future research work in the area. This is, as far as our knowledge goes, the first survey with such goals.

968 citations


Journal ArticleDOI
TL;DR: A generally accepted definition for SDN is presented, including decoupling the control plane from the data plane and providing programmability for network application development, and its three-layer architecture is dwelled on, including an infrastructure layer, a control layer, and an application layer.
Abstract: Emerging mega-trends (e.g., mobile, social, cloud, and big data) in information and communication technologies (ICT) are commanding new challenges to future Internet, for which ubiquitous accessibility, high bandwidth, and dynamic management are crucial. However, traditional approaches based on manual configuration of proprietary devices are cumbersome and error-prone, and they cannot fully utilize the capability of physical network infrastructure. Recently, software-defined networking (SDN) has been touted as one of the most promising solutions for future Internet. SDN is characterized by its two distinguished features, including decoupling the control plane from the data plane and providing programmability for network application development. As a result, SDN is positioned to provide more efficient configuration, better performance, and higher flexibility to accommodate innovative network designs. This paper surveys latest developments in this active research area of SDN. We first present a generally accepted definition for SDN with the aforementioned two characteristic features and potential benefits of SDN. We then dwell on its three-layer architecture, including an infrastructure layer, a control layer, and an application layer, and substantiate each layer with existing research efforts and its related research areas. We follow that with an overview of the de facto SDN implementation (i.e., OpenFlow). Finally, we conclude this survey paper with some suggested open research challenges.

894 citations


Journal ArticleDOI
TL;DR: The different characteristics and potentials of different prediction techniques in recommendation systems are explored in order to serve as a compass for research and practice in the field of recommendation systems.

861 citations


Journal ArticleDOI
TL;DR: This work demonstrates how to recruit participants using Facebook, incentivize them effectively, and maximize their engagement, and outlines the most important opportunities and challenges associated with using Facebook for research.
Abstract: Facebook is rapidly gaining recognition as a powerful research tool for the social sciences. It constitutes a large and diverse pool of participants, who can be selectively recruited for both online and offline studies. Additionally, it facilitates data collection by storing detailed records of its users' demographic profiles, social interactions, and behaviors. With participants' consent, these data can be recorded retrospectively in a convenient, accurate, and inexpensive way. Based on our experience in designing, implementing, and maintaining multiple Facebook-based psychological studies that attracted over 10 million participants, we demonstrate how to recruit participants using Facebook, incentivize them effectively, and maximize their engagement. We also outline the most important opportunities and challenges associated with using Facebook for research, provide several practical guidelines on how to successfully implement studies on Facebook, and finally, discuss ethical considerations.

709 citations


Journal ArticleDOI
TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.

694 citations


Journal ArticleDOI
TL;DR: This position paper briefly introduces the concept of big data, including its definition, features, and value, and identifies from different perspectives the significance and opportunities that big data brings to us.

Journal ArticleDOI
TL;DR: This article presents an overview of enabling technologies for efficient WEH, analyzes the lifetime of WEH-enabled IoT devices, and briefly study the future trends in the design of efficientWEH systems and research challenges that lie ahead.
Abstract: The Internet of Things (IoT) is an emerging computing concept that describes a structure in which everyday physical objects, each provided with unique identifiers, are connected to the Internet without requiring human interaction. Long-term and self-sustainable operation are key components for realization of such a complex network, and entail energy-aware devices that are potentially capable of harvesting their required energy from ambient sources. Among different energy harvesting methods, such as vibration, light, and thermal energy extraction, wireless energy harvesting (WEH) has proven to be one of the most promising solutions by virtue of its simplicity, ease of implementation, and availability. In this article, we present an overview of enabling technologies for efficient WEH, analyze the lifetime of WEH-enabled IoT devices, and briefly study the future trends in the design of efficient WEH systems and research challenges that lie ahead.

01 Jun 2015
TL;DR: The central finding is that the hype may actually understate the full potential of the IoT—but that capturing it will require an understanding of where real value can be created and a successful effort to address a set of systems issues, including interoperability.
Abstract: The Internet of Things (IoT)—sensors and actuators connected by networks to computing systems—has received enormous attention over the past five years. A new McKinsey Global Institute report, The Internet of Things: Mapping the value beyond the hype, attempts to determine exactly how IoT technology can create real economic value. Our central finding is that the hype may actually understate the full potential—but that capturing it will require an understanding of where real value can be created and a successful effort to address a set of systems issues, including interoperability. To get a broader view of the IoT’s potential benefits and challenges across the global economy, we analyzed more than 150 use cases, ranging from people whose devices monitor health and wellness to manufacturers that utilize sensors to optimize the maintenance of equipment and protect the safety of workers. Our bottom-up analysis for the applications we size estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. At the top end, that level of value—including the consumer surplus—would be equivalent to about 11 percent of the world economy.

Posted Content
TL;DR: oTree is an open-source and online software for implementing interactive experiments in the laboratory, online, the field or combinations thereof, and provides the source code, a library of standard game templates and demo games which can be played by anyone.
Abstract: oTree is an open-source and online software for implementing interactive experiments in the laboratory, online, the field or combinations thereof. oTree does not require installation of software on subjects’ devices; it can run on any device that has a web browser, be that a desktop computer, a tablet or a smartphone. Deployment can be internet-based without a shared local network, or local-network-based even without internet access. For coding, Python is used, a popular, open-source programming language. www.oTree.org provides the source code, a library of standard game templates and demo games which can be played by anyone.

Journal ArticleDOI
TL;DR: The IoBNT stands as a paradigm-shifting concept for communication and network engineering, where novel challenges are faced to develop efficient and safe techniques for the exchange of information, interaction, and networking within the biochemical domain, while enabling an interface to the electrical domain of the Internet.
Abstract: The Internet of Things (IoT) has become an important research topic in the last decade, where things refer to interconnected machines and objects with embedded computing capabilities employed to extend the Internet to many application domains. While research and development continue for general IoT devices, there are many application domains where very tiny, concealable, and non-intrusive Things are needed. The properties of recently studied nanomaterials, such as graphene, have inspired the concept of Internet of NanoThings (IoNT), based on the interconnection of nanoscale devices. Despite being an enabler for many applications, the artificial nature of IoNT devices can be detrimental where the deployment of NanoThings could result in unwanted effects on health or pollution. The novel paradigm of the Internet of Bio-Nano Things (IoBNT) is introduced in this paper by stemming from synthetic biology and nanotechnology tools that allow the engineering of biological embedded computing devices. Based on biological cells, and their functionalities in the biochemical domain, Bio-NanoThings promise to enable applications such as intra-body sensing and actuation networks, and environmental control of toxic agents and pollution. The IoBNT stands as a paradigm-shifting concept for communication and network engineering, where novel challenges are faced to develop efficient and safe techniques for the exchange of information, interaction, and networking within the biochemical domain, while enabling an interface to the electrical domain of the Internet.

Journal ArticleDOI
Nick Hajli1
TL;DR: This research investigates the new stream in e-commerce by proposing a new model to develop understanding of social commerce using a PLS-SEM methodology and results show that Web 2.0 applications are attracting individuals to have interactions as well as generate content on the Internet.

Proceedings ArticleDOI
01 Dec 2015
TL;DR: An overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT is presented.
Abstract: The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved. Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT.

Journal ArticleDOI
TL;DR: This introduction to a special issue of "Telecommunications Policy" entitled "The Governance of Social Media" begins with a definition of social media that informs all contributions in the special issue, and synthesize definitions presented in the literature.
Abstract: This introduction to a special issue of "Telecommunications Policy" entitled "The Governance of Social Media" begins with a definition of social media that informs all contributions in the special issue. A section describing the challenges associated with the governance of social media is presented next, followed by an overview of the various articles included in the special issue.While the Internet and the World Wide Web have always been used to facilitate social interaction, the emergence and rapid diffusion of Web 2.0 functionalities during the first decade of the new millennium enabled an evolutionary leap forward in the social component of web use. This and falling costs for online data storage made it feasible for the first time to offer masses of Internet users access to an array of user-centric spaces they could populate with user-generated content, along with a correspondingly diverse set of opportunities for linking these spaces together to form virtual social networks.To define “social media” for our current purposes, we synthesize definitions presented in the literature and identify the following commonalities among current social media services:1) Social media services are (currently) Web 2.0 Internet-based applications,2) User-generated content is the lifeblood of social media,3) Individuals and groups create user-specific profiles for a site or app designed and maintained by a social media service,4) Social media services facilitate the development of social networks online by connecting a profile with those of other individuals and/or groups.Transformative communication technologies have always called for regulatory innovation. Theodor Vail’s vision of “one policy, one system, universal service” preceded more than one-hundred years of innovative regulations aimed at connecting all Americans to a single telephone network. The sinking of the Titanic, caused in part by “chaos in the spectrum” led to the Radio Act of 1912 and the creation of a command and control model designed to regulate broadcast radio. Safe-harbor hours were put in place after a father and son heard George Carlin’s “seven dirty words” routine over the radio in their car. The fairness doctrine and the minority tax certificate program were designed to address inequalities in the broadcast television industry. The Digital Millennium Copyright Act responded to intellectual property concerns raised by a global Internet and the FCC’s 700mhz auction was the result of demand for smarter mobile phones. Now we must consider the role of regulatory innovation in response to the emergence of social media.

Book
01 Jan 2015
TL;DR: This edited volume is unique in focussing on the data analytical aspects of social networks in the internet scenario, rather than the traditional sociology-driven emphasis prevalent in the existing books, which do not focus on the unique data-intensive characteristics of online social networks.
Abstract: Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Properties of Social Networks, Algorithms for Structural Discovery of Social Networks and Content Analysis in Social Networks. This book is also unique in focussing on the data analytical aspects of social networks in the internet scenario, rather than the traditional sociology-driven emphasis prevalent in the existing books, which do not focus on the unique data-intensive characteristics of online social networks. Emphasis is placed on simplifying the content so that students and practitioners benefit from this book. This book targets advanced level students and researchers concentrating on computer science as a secondary text or reference book. Data mining, database, information security, electronic commerce and machine learning professionals will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science.

Journal ArticleDOI
TL;DR: In this article, the authors discuss the nature of use of the Internet by American travelers and find that while traditional means of Internet use for travel planning appear to be widespread across all customer segments, higher-order Internet uses are now prevalent among some segments, particularly among travelers of Generation Y.

Book
29 Jan 2015
TL;DR: This book presents an overview of the challenges faced by ethnographers who wish to understand activities that involve the internet, and explores both methodological principles and practical strategies for coming to terms with the definition of field sites, the connections between online and offline and the changing nature of embodied experience.
Abstract: The internet has become embedded into our daily lives, no longer an esoteric phenomenon, but instead an unremarkable way of carrying out our interactions with one another. Online and offline are interwoven in everyday experience. Using the internet has become accepted as a way of being present in the world, rather than a means of accessing some discrete virtual domain. Ethnographers of these contemporary Internet-infused societies consequently find themselves facing serious methodological dilemmas: where should they go, what should they do there and how can they acquire robust knowledge about what people do in, through and with the internet?This book presents an overview of the challenges faced by ethnographers who wish to understand activities that involve the internet. Suitable for both new and experienced ethnographers, it explores both methodological principles and practical strategies for coming to terms with the definition of field sites, the connections between online and offline and the changing nature of embodied experience. Examples are drawn from a wide range of settings, including ethnographies of scientific institutions, television, social media and locally based gift-giving networks. - See more at: http://www.bloomsbury.com/uk/ethnography-for-the-internet-9780857855701/#sthash.6wmdZKzF.dpuf

Journal Article
TL;DR: The development of these applications, which is going to lead into a new era for the social digital communication between the internet users, all around the globe, are suggested.
Abstract: Nowadays the social networks have been developed into an advanced communications tool, which is important for all people to contact each other. These specific networks do offer lots of options as well as plenty of advantages and disadvantages. The social websites are many in number and titles, such as the facebook, the twitter, the bandoo etc. One of the most important function-mechanisms for the social network websites, are the marketing tools. The future goal is suggested to be the evolution of these programs. The development of these applications, which is going to lead into a new era for the social digital communication between the internet users, all around the globe.

Journal ArticleDOI
TL;DR: Merging the virtual World Wide Web with nearby physical devices that are part of the Internet of Things gives anyone with a mobile device and the appropriate authorization the power to monitor or control anything.
Abstract: Merging the virtual World Wide Web with nearby physical devices that are part of the Internet of Things gives anyone with a mobile device and the appropriate authorization the power to monitor or control anything.

Journal ArticleDOI
TL;DR: GigaSight is described, an Internet-scale repository of crowd-sourced video content, with strong enforcement of privacy preferences and access controls, and a federated system of VM-based cloudlets that perform video analytics at the edge of the Internet, thus reducing the demand for ingress bandwidth into the cloud.
Abstract: High-data-rate sensors, such as video cameras, are becoming ubiquitous in the Internet of Things. This article describes GigaSight, an Internet-scale repository of crowd-sourced video content, with strong enforcement of privacy preferences and access controls. The GigaSight architecture is a federated system of VM-based cloudlets that perform video analytics at the edge of the Internet, thus reducing the demand for ingress bandwidth into the cloud. Denaturing, which is an owner-specific reduction in fidelity of video content to preserve privacy, is one form of analytics on cloudlets. Content-based indexing for search is another form of cloudlet-based analytics. This article is part of a special issue on smart spaces.

Proceedings ArticleDOI
12 Oct 2015
TL;DR: Censys is introduced, a public search engine and data processing facility backed by data collected from ongoing Internet-wide scans that can identify specific vulnerable devices and networks and generate statistical reports on broad usage patterns and trends.
Abstract: Fast Internet-wide scanning has opened new avenues for security research, ranging from uncovering widespread vulnerabilities in random number generators to tracking the evolving impact of Heartbleed. However, this technique still requires significant effort: even simple questions, such as, "What models of embedded devices prefer CBC ciphers?", require developing an application scanner, manually identifying and tagging devices, negotiating with network administrators, and responding to abuse complaints. In this paper, we introduce Censys, a public search engine and data processing facility backed by data collected from ongoing Internet-wide scans. Designed to help researchers answer security-related questions, Censys supports full-text searches on protocol banners and querying a wide range of derived fields (e.g., 443.https.cipher). It can identify specific vulnerable devices and networks and generate statistical reports on broad usage patterns and trends. Censys returns these results in sub-second time, dramatically reducing the effort of understanding the hosts that comprise the Internet. We present the search engine architecture and experimentally evaluate its performance. We also explore Censys's applications and show how questions asked in recent studies become simple to answer.

Proceedings ArticleDOI
06 Jul 2015
TL;DR: This study explores the security aims and goals of IoT and then provides a new classification of different types of attacks and countermeasures on security and privacy and discusses future security directions and challenges that need to be addressed to improve security concerns over such networks and aid in the wider adoption of IoT by masses.
Abstract: Internet of Things (IoT) has been given a lot of emphasis since the 90s when it was first proposed as an idea of interconnecting different electronic devices through a variety of technologies. However, during the past decade IoT has rapidly been developed without appropriate consideration of the profound security goals and challenges involved. This study explores the security aims and goals of IoT and then provides a new classification of different types of attacks and countermeasures on security and privacy. It then discusses future security directions and challenges that need to be addressed to improve security concerns over such networks and aid in the wider adoption of IoT by masses.

Journal ArticleDOI
TL;DR: This paper surveys over one hundred IoT smart solutions in the marketplace and examines them closely in order to identify the technologies used, functionalities, and applications, and suggests a number of potentially significant research directions.
Abstract: The Internet of Things (IoT) is a dynamic global information network consisting of Internet-connected objects, such as Radio frequency identifications, sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future Internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium enterprises, large corporations, academic research institutes (such as universities), and private and public research organizations making their way into the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications. Based on the application domain, we classify and discuss these solutions under five different categories: 1) smart wearable; 2) smart home; 3) smart city; 4) smart environment; and 5) smart enterprise. This survey is intended to serve as a guideline and a conceptual framework for future research in the IoT and to motivate and inspire further developments. It also provides a systematic exploration of existing research and suggests a number of potentially significant research directions.

Journal ArticleDOI
TL;DR: The Governance of Social Media as discussed by the authors is a special issue of Telecommunication Policy with a focus on the role of regulatory innovation in response to the emergence of social media and the challenges associated with social media.

Book ChapterDOI
12 Dec 2015
TL;DR: In this article, the authors developed an operational framework for measuring tangible outcomes of internet use and linking these to the inequalities identified by digital divide research and concluded that the internet remains more beneficial for those with higher social status, not in terms of how extensively they use the technology but in what they achieve as a result of this use for several important domains.
Abstract: Purpose Research into the explanations of digital inclusion has moved from investigations of skills and usage to tangible outcomes, what we label here as the third-level digital divide. There is a lack of theoretical development about which types of people are most likely to benefit. Understanding how achieving outcomes of internet use is linked to other types of (dis)advantage is one of the most complex aspects of digital inclusion research because very few reliable and valid measures have been developed. In the current study we took a first step toward creating an operational framework for measuring tangible outcomes of internet use and linking these to the inequalities identified by digital divide research. Methodology/approach After having proposed a classification for internet outcomes, we assessed these outcomes in a representative sample of the Dutch population. Findings Our overall conclusion in relation to the more general relationship between offline resources and third-level digital divides is that the internet remains more beneficial for those with higher social status, not in terms of how extensively they use the technology but in what they achieve as a result of this use for several important domains. Social implications When information and services are offered online, the number of potential outcomes the internet has to offer increases. If individuals with higher social status are taking greater offline advantage from digital engagement than their lower status counterparts, existing offline inequalities could potentially be acerbated

Journal ArticleDOI
TL;DR: In this article, the authors present a survey of IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications, and identify the trends, opportunities and open challenges in the industry-based IoT solutions.
Abstract: The Internet of Things (IoT) is a dynamic global information network consisting of internet-connected objects, such as Radio-frequency identification (RFIDs), sensors, actuators, as well as other instruments and smart appliances that are becoming an integral component of the future internet. Over the last decade, we have seen a large number of the IoT solutions developed by start-ups, small and medium enterprises, large corporations, academic research institutes (such as universities), and private and public research organisations making their way into the market. In this paper, we survey over one hundred IoT smart solutions in the marketplace and examine them closely in order to identify the technologies used, functionalities, and applications. More importantly, we identify the trends, opportunities and open challenges in the industry-based the IoT solutions. Based on the application domain, we classify and discuss these solutions under five different categories: smart wearable, smart home, smart, city, smart environment, and smart enterprise. This survey is intended to serve as a guideline and conceptual framework for future research in the IoT and to motivate and inspire further developments. It also provides a systematic exploration of existing research and suggests a number of potentially significant research directions.