Computer Science, asked by Anonymous, 1 month ago

Which is not the Design principle of connected device?
a) Easy adoption b) Privacy c) Backward compatibility d) Difficulty in access​

Answers

Answered by revanthkumarreddy55
3

Answer:

he Internet of Things (IoT) refers to the network of devices which contain electronics, sensors or software that enables them to connect at anytimeand anywhere through a cyber-physical system. Before the establishment of such a system, it should be considered to what extent the users are ready to adopt and use it in their daily routines. Therefore, this paper explores users’ attitudestowardsusing IoT technologies to receive healthcare services. This is in contrast to most previous research, which has studied the technical requirements or devices of the IoT that are required in healthcare services, or ways in which connectivity and performance can be improved using the IoT. Based on known models of technology acceptance, an integrated framework was developed to investigate the impact of security and privacy concerns, and familiarity with the technology, on users’ trust in the IoT, and then to measure the effect of that trust on Omani users’ attitudes regarding use ofIoT technologies to receive healthcare services. This framework enabled the measurement of risk perception as a mediator between user trust and their attitudes towards using the IoT. Data were collected from 387 respondents and were analysed using SPSS 25 and AMOS 25 statistics software. Exploratory and confirmatory analysis and structural equation modelling were applied. The findings showed that levels of security, privacy and familiarity affected trustin the IoT. Furthermore, these levels of trust in the IoT were found to affect both users’ perceptions of risk in, and their attitude towards, using the IoT. The users’ risk perception partially mediated the relations between users’ trustand their attitude regarding use of the IoT. The framework was supported and interpreted by 40 per cent of the variance in the attitude towards usingthe IoT in healthcare, while the mediator showed 47 per cent of the variance in the attitude towards using the IoT inhealthcare.

Explanation:

please mark me as brain list

Answered by ravilaccs
0

Answer:

The correct answer is option B

Explanation:

  • The aesthetic design of a connected device is not of concern in an IoT project. The design aspects of concern are the interaction with other elements and this design needs to be well thought out.
  • Design goes beyond the narrow objective of physical appearance. For example, product design covers appearance but it also covers product functionality.
  • The first important concept when designing an IoT project is calm technology. A system that does not compete for attention but has a high utility when given attention, this type of technology is referred to as calm technology. In a connected devices environment multiple challenges come up. Challenges that arise are configuration, power sources, communication among devices and communication with humans.
  • Powering devices and networking are technical challenges and they have been the motivation of development of 6LoWPAN.
  • Configuration and interaction have a human element therefore they cannot be completely solved by technical solutions. Therefore, a good design supports technology uptake and usability.
  • A design principle that thinks of a single device is inefficient in considering the challenges that will be faced in a production environment. Therefore an IoT design should view a device in the context of its operating environment.
  • IoT devices interaction with people poses a great difficulty. With a few devices, notifications and alerts can be effectively used. However even in an environment with 100 devices notifications will not be effective resulting in an attention seeking system. A distinct feature of an IoT environment is the shift from use of screens notifications to real world notifications such as twitches and vibrations.
  • To help people understand the capabilities of IoT, an analogy of magic can be used. This analogy is appropriate because connected devices in an IoT project share capabilities with enchanted objects found in magic. Connected devices can be seen as magical because of simplifying and adding fun to daily activities. Connected devices are trusted to accomplish their tasks and also ensure the data they collect does not fall into the wrong hands which brings up the issue of privacy. Therefore an IoT project design has to put into consideration protection and the privacy of intentionally or unintentionally collected data.
  • Privacy issues do not just arise in healthcare, for example a parking management system in a city can compromise the privacy of its users. Besides privacy issues of data ownership also arise when data is captured in public areas.
  • When designing an IoT project, an important design consideration is how the data from different devices will be consumed. Although, there is an effort to standardize communication protocols used by different devices, they use different web services. To overcome this challenge an application programming interface (API) is used. When one API is inadequate multiple APIs can be combined and this use of multiple APIs is referred to as mashing. For example identifying trending topics on social media and displaying trends in each geographic region is mashing up. When there is no API web scraping is a technique that can be used to get data from the internet. However, scraping may violate terms of web services leading to legal consequences or denial of service.
  • A very critical to success API consideration is security. Although, a connected device is not a high risk security target there are unique challenges when working with connected devices. In the event of security vulnerability updates to software are easy but hardware updates are very challenging. Password changes to a connected device are difficult therefore design considerations around configuration need to be carefully made.
  • To secure passwords sent over a network encryption at the server or device level is used. Setting up a secure server is easy, but encryption at the device level is challenging because of CPU and memory limitation. When designing a security layer around an IoT project you need to consider the risk of data breach and the cost of implementing security. For example weather monitoring data has low risk while patient data has a very high risk in case of a data breach.

Reference Link

  • https://brainly.in/question/39241929
  • https://brainly.in/question/19625378
Similar questions