Program‎ > ‎

7.2 Internet of Things (IoT) - Governance

Class Description (Kilnam Chon)
    History of IoT
    IoT - current status
    Issues - data, privacy, security, harmonization (global, inter-disciplinary)

Lecturer Pool: Kilnam Chon
Additional Lecturer Candidates: Malavika Jayaram,..

   AllSeen Alliance
   APRICOT, IoT - Next Wave of DDoS?, 2017.2
   Harald Bauer, et al., Security in IoT, McKinsey, 2017.5
   Woonchang Choi, IoT Governance Workshop, krIGF, 2016. [ppt in Korean]
   Kilnam Chon, IoT Governance, 2016/2017. [ppt]
   Kilnam Chon, Cyberspace Governance, 2014. [ppt] [article] [video]
   Kilnam Chon, Cybersecurity Governance, 2016. [ppt]
   Laura Denardis and Mark Raymond , IoT as global policy frontier, 2018.1., 7 open source IoT OS, 2017.
   GCIG, One Internet, 2016.
   Bryan Hannegan, IoT (and Smart Wind and Solar), Emtech, 2014.9.
   GSM Association, IoT Security Guideline - Overview Document, 2016.2.
Workshop on open source solutions on IoT, Triesta, 2017.6-26-7.7.
   Industrial Internet Consortium, The most read articles of industrial internet consortium, 2017.
   IGF, Dynamic Coalition-IoT Good practice Policy, 2016.
   IoT Ecosystem,
   IoT in 2017, Open Trends, 2016.12
   IAB, Report from IoT Software Update Workshop, Feb. 2017.
   Internet Society, There is no perimeter in IoT security, 2017-6-2.
   Malavika Jayaram, Bio, Berkman Kelin Center, Digital Asia Hub, 2016.
   McKinsie, Future of connectivity: enabling IoT, 2017.12.19
   Sekhar Kondepudi, IoT Standard War, Forum on IoT, ITU, 2015. [ppt]
   Margaret Martonosi, IoT: History, Hype Technology and Policy, UCSB, 2017. []
   NTIA, Multistakeholder Process: IoT Security Upgradability and Patching, 2016.
   Online Trust Alliance.
   Online Trust Alliance (OTA), IoT Trust Framework, 2017.1.5
   Open Interconnect Consortium
   Open Mind, A wakup call for IoT, 2016.12.5.
   OECD, Digital Ecnomy Outlook 2015; Emerging issues on IoT, 2015.
   Gil Press, 6 hot IoT security technologies, Forbes, 2017.3.20.
   Amanda Razani, IoT and problem, 2016.7.
   RFC 7228, Constrained Node Networks, (by A Keranen), 2014.
   Bruce Schneier, Security Economics of IoT, Schneier on Security, 2016.10.10.
   Bruce Schneier, Secuirty and privacy guidelines for IoT, Schneier on Security, 2017.2.9.
   Bruce Schneier, Botnets of Things, 10 Breakthrough Technologies, MIT Technology Review, March/April 2017.
   Zakir Syed, Iot - Technology and Engineering, pkSIG, 2016.
   US DHS, Strategic principles for securing IoT, 2016.11.15.
   White House, Big data and privacy, 2014.