Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/11531/58144
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.advisorBlanco Méndez, Ricardoes-Es
dc.contributor.advisorLópez Moranchel, Ignacioes-Es
dc.contributor.authorSolera Cotanilla, Soniaes-ES
dc.contributor.authorVega Barbas, Marioes-ES
dc.contributor.authorPérez Sánchez, Jaimees-ES
dc.contributor.authorLópez López, Gregorioes-ES
dc.contributor.authorMatanza Domingo, Javieres-ES
dc.contributor.authorÁlvarez-Campana Fernández-Corredor, Manueles-ES
dc.contributor.other, Escuela Universitaria de Enfermería y Fisioterapiaes_ES
dc.date.accessioned2021-07-15T18:15:49Z-
dc.date.available2021-07-15T18:15:49Z-
dc.date.issued2022-06-01es_ES
dc.identifier.issn1424-8220es_ES
dc.identifier.otherE000007856es_ES
dc.identifier.urihttps:doi.org10.3390s22113967es_ES
dc.descriptionArtículos en revistases_ES
dc.description.abstractes-ES
dc.description.abstractUnder the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users’ security and privacy have been compromised due to some weaknesses in connected devices and underlying applications. This article focuses on analyzing the security and privacy of such devices to promote safe Internet use, especially by young people. First, the connected devices most used by the target group are classified, and an exhaustive analysis of the vulnerabilities that concern the user is performed. As a result, a set of differentiated security and privacy issues existing in the devices is identified. The study reveals that many of these vulnerabilities are related to the fact that device manufacturers often prioritize functionalities and services, leaving security aspects in the background. These companies even exploit the data linked to the use of these devices for various purposes, ignoring users’ privacy rights. This research aims to raise awareness of severe vulnerabilities in devices and to encourage users to use them correctly. Our results help other researchers address these issues with a more global perspective.en-GB
dc.language.isoen-GBes_ES
dc.sourceRevista: Sensors, Periodo: 1, Volumen: online, Número: 11, Página inicial: 3967-1, Página final: 3967-25es_ES
dc.subject.otherInstituto de Investigación Tecnológica (IIT)es_ES
dc.titleSecurity and privacy analysis of youth-oriented connected deviceses_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.description.versioninfo:eu-repo/semantics/publishedVersiones_ES
dc.rights.holderes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.keywordses-ES
dc.keywordsConnected Devices; Internet of Things; Privacy; Security; Vulnerabilityen-GB
asignatura.cursoacademico2022-2023es_ES
asignatura.periodoes_ES
asignatura.creditos3.0es_ES
asignatura.tipoOptativa (Grado)es_ES
Aparece en las colecciones: KFS-Guías Docentes

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
Guía Docente.pdf141,25 kBAdobe PDFVista previa
Visualizar/Abrir
IIT-22-082R1,43 MBUnknownVisualizar/Abrir
IIT-22-082R_preview2,96 kBUnknownVisualizar/Abrir


Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.