In the current scenario, the organization has needed to understand the Internet of things (IOT) as it connects the individual from the physical device for the accomplishment of any specified goal. IOT could lead organization for the accomplishment of desire goal in limited time and cost. The internet of things may be defined as a network of physical devices, home appliances, vehicles, and other items embedded with electronics, sensors, software, and connectivity which enable these things to connect exchange and collect data (Höller et al, 2014). There are no unique and effective definitions for the internet of things that is adequate by the world society of users. Al-Fuqaha et al (2015) stated that the internet of things is maturing and effective in the IT world. According to Barnaghi (2012), IOT technologies help in detecting and preventing the crime issues and challenges in the international market. The internet of things may also be considered as an international network which permits the communication and cooperation between human to things, human to things and things to things which is anything across the world by rendering unique and effective identity to each and every object (Atzori, Iera, and Morabito, 2010).
The key purpose of this research is to address the role of the internet of thing in crime and laws. The following research questions will be accomplished by the researcher to meet the aim of this study:
In the research study, the dissertation structure is imperative because it facilitates the research scholar to achieve the aim and objectives of investigation in an appropriate manner (Harbawi, and Varol, 2017). There are different factors such as introduction, literature review, research methodology, data analysis and findings and conclusion and recommendation discussed as below:
The introduction is the first section of the investigation. It considers several components like the aim and objectives of the research study, research background, questions of research, the topic of the research study, and importance of research with respect to gain understanding towards research dilemma. In addition to this, this section offers depth knowledge regarding limitations of a research study which are confronted by the research scholar in completing the current research. Consequently, this section assists the investigator for evaluating the way of study and considerably discovers the research matter (Höller, et. al., 2014).
The second chapter of the investigation is a literature review that is conducted to discover the research concern by implementing various appropriate theories. This section supports the research scholar to consider the analysis of current knowledge with respect to the research topic (Soundarya, Kanimozhi, and Manjula, 2017). There are various components that assist to enhance the theoretical knowledge towards the research matter such as journals, articles, books and authentic websites. This section also facilitates the research scholar to determine the gap of understanding and construct the foundation to implement the primary research techniques (Al-Fuqaha, et. al., 2015).
In the research study, research methodology is the third chapter. The research scholar described the various tools and approaches to complete the investigation in ethically and appropriately way (Manches, et. al., 2015). This section describes several factors which are data collection methods, approaches, purposes, strategies, sampling, data analysis method, and research designs, it also helps to attain the feasible and consistent result. In this research study, research methodology is categorized as per the aim and objectives of research that is imperative in obtaining reliable and valid outcome (Barnaghi, et. al., 2012).
Data analysis and findings are a very important section of the research study as it facilitates to effectively evaluate the gathered data. This section offers the prominent foundation for the research scholar in the way of isolating the accumulated data and evaluating them in opposed to the objectives (Dlodlo, et. al., 2015). In order to this, it supports the research scholar to organize and evaluate the data in a reliable way by practicing appropriate techniques of data analysis. This section assists the research scholar to demonstrate the data in an appropriate manner for attaining reliable result (Atzori, Iera, and Morabito, 2010).
Conclusion and Recommendation:
The last section of the research is the conclusion and recommendation that facilitates the research scholar to summarize the whole investigation as per the findings. This section aids to produce consistent and effective conclusion because it develops the relationship between research objectives and findings (Byun, Nasridinov, and Park, 2014). In addition to this, it also offers recommendations with respect to human resource practices to encourage the commitment of employees. Consequently, this section is also imperative to describe the practical applications for directing upcoming research scholars for their investigation (Jalali, El-Khatib, and McGregor, 2015).
According to Rathore et al. (2016), biometric identification contains the technique for distinctly addressing human as per the over one behavioral and physical traits. Furthermore, physiological features involve the face recognition, DNA, handwriting, Irish identification, and palm print. Behavioral characteristics involve the voice and gait and sometimes, to name of the person. This policy could promptly assess the sufferer of motor accidents through the devices of mobile biometric. This can also address the suspects that are carrying wrong and there is no need to identifying the documents.
In contrast to this, Zawoad and Hasan (2015) stated that as per the medical council of research, South Africans consume over 5 billion liters of alcohol in each year. There are about 60% of the hospital trauma cases due to the outcome of drunkenness. It is also found that there is a key cause of road accidents due to drunkenness. Due to this, there is a high amount of internet of things that can aid the sensors for assessing the blood alcohol content by smelling the breath of a person.
In the view of Kolias et al. (2016), IOT is used in copper theft detection in terms of community safety and crime prevention. Hence, when the prices of copper will increase then, there could be a chance of increasing the theft of copper wire. In addition, authentic exposure of theft practices is performed by assessing the location via sensor as, it may lead to address the unauthorized access. This could be performed at an electrical-switch place to constantly assess the response to high-frequency pulses. It also addresses the transformation in wire properties of the circuit. It declines the rate of theft by promptly reacting towards unauthorized alert access.
On the other side, Liu et al. (2018) stated that there is a need for perimeter fences, alarm systems, metal detectors, and CCTV cameras for safer school. It is evaluated that alarm system can have GPS coordinator that helps in the control center and aids to simply locate the site. Electronic barriers can be wireless in the ground. This barrier has a foundation of an electronic unit that releases the radio waves up to the certain range. Furthermore transmitter and receiver transfer the alert to the appropriate body. In the base, barriers may create from the radio waves but IOT aids to beeps once an individual crosses the limits. The perimeter security can create rigidly and hurdle related to fiber optic.
Rose Eldridge and Chapin (2015) illustrated that variance in bend and twist may create the barriers but, there is no matter how small changes may create the larger variation in the color of light such as diverse was lengths involved in white light demonstrate the diverse angels. Moreover, an optical time exhibits the meter that is attached with fiber optic. It would locate the spot within regarding a meter and where the bend and twist took place and finds a light that can be effective to attain the objective promptly.
On the other hand, Ferguson (2016) illustrated that the crime prevention involves the security camera. It is stated that traditional cameras are accountable only for capturing the scenes and does not competent for addressing the criminal practices. Furthermore, there was a need to highly focus such as 24*7 hours. In this way, artificial intelligence is the type of algorithm that mechanically assesses the scene. With the support of IOT, it provides the confirmation to police in case of any issue.
According to Suri et al. (2016), closed-circuit television can be used in a different public location in order to prevent the crime. This type of cameras is highly applied in traffic for signals such as capturing the people who break the rule of traffic. This is an automatic process of identifying the activity and creates the criminal record about a specific vehicle and also transferred it to match the address that is registered by an individual.
Gandhi et al. (2018) addressed that IOT technologies aid in the detection of crime. In this way, it is addressed that emotion sensing is attached in the body of the individual. The microelement of this sensor is accountable for fetching the heartbeat of people and temperature of an individual with the further procedure of information. In contrast to this, Ienca and Haselager (2016) stated that emotion controlling is held accountable for capturing the emotion of individual and transfer the feedback to the server after developing the received information in the unit of human heartbeats and temperature. According to Ashton (2017), crime detection is another technique that is used after processing the information from the emotion sensor. This technique also assesses the information received from this sensor and when there is any criminal practice perceived by it, then it calls back to police for a nearby hub in order to deal with circumstances.
The research types could be imperative for evaluating the research issues in a reliable manner. There are creation methods that could be considered in the research like exploratory, explanatory, and descriptive research. It will also allow to the researcher to conduct their research in an appropriate manner and get higher competitive benefits. In this research, the researcher will use the descriptive research design method to collect the information in the context of the current research matter (Hollywood, et. al., 2015). It assists the researcher to examine the research issues nature in an appropriate manner. The descriptive research design is beneficial to examine the characteristics and behavior of the specified sample (Hodo, et. al., 2016). It will also assist the researcher to collect opinion and views of the research participants with respect to the research concern. There are many intentions of applying this research like evaluating, rationalizing, and describing the research findings, which are effectively used in-depth evaluate research issue (Smith, Bennett Moses, and Chan, 2017).
How internet of thing may impact on the crime and Law?
H0: There is no significant association between Internet of Thing and crime
H1: There is a significant association between Internet of Thing and crime
H0: There is no significant association between Internet of Thing and law
H1: There is a significant association between Internet of Thing and law
In the research study, two variables are considered in the research like independent and dependent factors. Through this, the independent variable is the internet of thing while the dependent variables are crime and law. It demonstrates the crime and law could be dependent on the internet of things (Machaka, and Nelwamondo, 2016).
The data collection techniques enable the researcher to obtain feasible information in the context of the current research matter. The data collection method considers different methods like primary and secondary data collection method. For conducting this research, the researcher will both a primary as well as secondary data collection technique to collect the data in the context of research issue like primary and secondary data collection method. Further, the primary information gathering process or tool will be used by the investigator as it would assist to obtain first-hand data in the context of current research issues like survey through a questionnaire, and interview method (Baig, et. al., 2017).
Moreover, the data gathering process could be imperative in gathering reliable data with respect to the research matter. But, it will be time-consuming and costly as compared to other research activities. In addition, I also observed that the secondary data collection tool could be imperative in collecting the information from the existing sources. The secondary data collection method could take less time as compared to the primary data collection tool. But, at the same time, it is also evaluated that secondary data could be more aesthetics as it is collected from the existing previewed of different authors. Moreover, there are certain sources that could be practiced by the research at the time of collecting the information about the research matter like academic publications, online articles, government publication, journal articles, and textbooks (Ding, et. al., 2018).
Research design could also be essential for accomplishing the desired aim and objectives in a reliable and systematic manner. There are many methods that could be used by the researcher to obtain reliable information about the research matter like qualitative, quantitative, and mixed research design. In this research, qualitative and quantitative research will be used by the researcher to meet the aim and objectives of the research matter (Caron, et. al., 2016). The qualitative research will facilitate the researcher to collect non-numerical information in the context of research matter while the quantitative research design is practiced to pool factual information in the context of the current matter. In this, the literature review will be practiced by the researcher to collect the qualitative data while survey through questionnaire method will be practiced by the researcher to collect the numerical data about the research issue (Korstanje, 2016).
For this study, both non-probability and probability sampling tool will be used by the researcher to select the sample size from the specified population. Through this, a researcher will practice the simple random sampling technique to collect opinion and views of the research candidates towards the research matter. This tool could be imperative in eliminating the biases from the research and meet the aim and objective of the research matter. Apart from this, judgemental non-probability sampling technique will be practiced by the researcher to conduct interview method for selection of current research matter. It could be quite a time consuming and costly (Russo, et. al., 2015). This research will be conducted on 55 research participants. In this, 5 accounting experts and 50 accounting professionals will be selected by the researcher to conduct this research.
Conclusion
On the basis of the above interpretation, it can be summarized that the internet of things could directly influence the crime level and law. It is examined that there is a certain study that has concentrated on offering the data with respect to the internet of this, crime, and laws. But this research relies on the role of the internet of thing on the crime and laws. `
It is also addressed that users could update their operating system for effectively operating their business process and get higher competitive benefits. This research concentrates on creating the understanding in the context of the significance of the internet of thing on the crime and laws. There is requisite of creating the formal system to evaluate factors that could impact on the security and usability of the internet of things and their impact on the crime level.
In the first week, I gained my knowledge in the context of information technology role in the increasing the probability of getting the success of the firm. Though this, I would be capable to effectively communicate with others in the context of current research matter. Furthermore, I improved my understanding of advanced technology that could enable to improve the financial performance of the organization. In addition, I also enhanced my understanding of the context of research philosophies as it would lead to obtaining accurate information about the information technology projects.
In week 2, I enhanced my understanding of certain methods that could be considered in the research philosophies like realism, empiricism, and positivism. Under this week, I also understood that how these research philosophies facilitate to obtain feasible information about the research matter. In this week, I enhanced my existing understanding about the quantitative research tools. Through this, I also gained my understanding in the context of certain factors like independent and dependent factor. Moreover, I also learned about the relationship between the independent as well as dependent factor.
In this week, I enhanced my understanding of the context of certain kinds of qualitative data as it could be collected. Through this way, it is also examined that quantitative research demonstrates the phenomenon by collecting the factual data as it is associated with factual data that is assessed by factually based tools (Isafiade, and Bagula, 2016). I also increased my understanding about the mean, mode, and medium that could be practiced for concluding the quantitative data. This learning would be imperative in practices evaluating the data by considering a survey through a questionnaire.
In week 4, I enhanced my understanding of the context of certain factors like interpretivism, qualitative data, and constructivism method. I also observed that the positivism philosophy enables to collect theoretical information in the context of the research matter. I also learned about the difference between interpretivism and positivism. This week was imperative to offer new perception about interpretivism as constructivism.
In this week 5, I have gained my experience in writing the literature review and research proposal that could be an important part of the research. Herein, I analyzed that the key purpose of academic writing goal like to increase the existing understanding, to present the ideas, to demonstrates new information and perception, to permit work of other writers, and to anticipate the questions of the reader. In this week, I enhanced my understanding of academic essay components. Through this, I also enhanced my understanding of certain factors like abstract, introduction, paper body, conclusion, and references, and bibliography was used to make a proposal.
In this week, I gained my understanding of ethical structure. Through this way, I enhance my existing knowledge about the dissimilarities between concepts of certain terms such as ethics, values, virtues, and morals. This lecture also demonstrates ethical structure requirement with respect to the resolving the moral problems. It is effective for conducting this research in a reliable way (Fink, et. al., 2015). In this week, I gained my new perception with respect to the different ethical theories like utilitarianism, virtual ethics, and deontology. These theories will be supportive to eliminate issues of morale. This lecture was supportive to understand professional ethics code as it would lead to getting higher benefits. It will be imperative in conducting the study in an ethical manner (Chinchore, Jiang, and Xu, 2015).
During this week, I gained my understanding in the context of academic misconduct. In this way, I gained my understanding of several methods of academic misconduct. This week was imperative to comprehend the different types of references like APA, Harvard, Chicago, and MLA. It could also be imperative in understanding the different factors of plagiarism.
Under this week, I gained my understanding about research ethics at the time dealing with the human matter. In this week, I increased my understanding of the ethical research data. I gained my new perception about the major ethical application. I gained my understanding in the context of research issues as it is practiced by me to secure welfare and rights of research candidates, also supports to protect the property rights. This lecturer was supportive for me to understand the Nuremberg Code as it would lead to them to conduct suitable behavior.
In the week 9 and 10, I also increased my understanding towards the effective delivery. This week was imperative for delivering the presentation in an effective way. This week was imperative for significantly give the presentation because I have fear from speaking with the public. I have also gained my understanding regarding body language in the presentation. I have gained my awareness how we provide an effective presentation in front of other people.
Conclusion
On the basis of above discussion, it can be summarized that I have gained my knowledge about that role of the internet of thing (IOT) in detecting the crime and eliminating them by considering the IOT policies. It can also be concluded that there are certain approaches that could be imperative in gaining the understanding about certain approaches like quantitative research, quantitative research, measures of central tendency, qualitative research, quantitative research data and analysis, literature review, ethical framework, research ethics, academic misconduct, and delivery of the presentation. This study was created by technical skills, ethical skills, and research skills.
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. and Ayyash, M., 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), pp.2347-2376.
Ashton, M., 2017. Debugging the Real World: Robust Criminal Prosecution in the Internet of Things. Ariz. L. Rev., 59, p.805.
Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things: A survey. Computer networks, 54(15), pp.2787-2805.
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., Kerai, P., Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22, pp.3-13.
Barnaghi, P., Wang, W., Henson, C. and Taylor, K., 2012. Semantics for the Internet of Things: early progress and back to the future. International Journal on Semantic Web and Information Systems (IJSWIS), 8(1), pp.1-21.
Byun, J.Y., Nasridinov, A. and Park, Y.H., 2014. Internet of things for smart crime detection. Contemporary Engineering Sciences, 7(15), pp.749-754.
Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., 2016. The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. Computer law & security review, 32(1), pp.4-15.
Chinchore, A., Jiang, F. and Xu, G., 2015, August. Intelligent Sybil attack detection on abnormal connectivity behavior in mobile social networks. In International Conference on Knowledge Management in Organizations (pp. 602-617). USA: Springer, Cham.
Ding, G., Wu, Q., Zhang, L., Lin, Y., Tsiftsis, T.A. and Yao, Y.D., 2018. An amateur drone surveillance system based on the cognitive Internet of Things. IEEE Communications Magazine, 56(1), pp.29-35.
Dlodlo, N., Mbecke, P., Mofolo, M. and Mhlanga, M., 2015. The internet of things in community safety and crime prevention for South Africa. In Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering (pp. 531-537). USA: Springer, Cham.
Ferguson, A.G., 2016. The Internet of Things and the Fourth Amendment of effects. Cal. L. Rev., 104, p.805.
Fink, G.A., Zarzhitsky, D.V., Carroll, T.E. and Farquhar, E.D., 2015, June. Security and privacy grand challenges for the Internet of Things. In Collaboration Technologies and Systems (CTS), 2015 International Conference on (pp. 27-34). IEEE.
Gandhi, U.D., Kumar, P.M., Varatharajan, R., Manogaran, G., Sundarasekar, R. and Kadu, S., 2018. HIoTPOT: surveillance on IoT devices against recent threats. Wireless personal communications, pp.1-16.
Harbawi, M. and Varol, A., 2017, April. An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework. In Digital Forensic and Security (ISDFS), 2017 5th International Symposium on (pp. 1-6). IEEE.
Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C. and Atkinson, R., 2016, May. Threat analysis of IoT networks using artificial neural network intrusion detection system. In Networks, Computers and Communications (ISNCC), 2016 International Symposium on(pp. 1-6). IEEE.
Höller, J., Boyle, D., Karnouskos, S., Avesand, S., Mulligan, C. and Tsiatsis, V., 2014. From machine-to-machine to the internet of things (pp. 1-331). Cambridge: Academic Press.
Hollywood, J.S., Woods, D., Silberglitt, R.S. and Jackson, B.A., 2015. Using future internet technologies to strengthen criminal justice. USA: RAND Corporation.
Ienca, M. and Haselager, P., 2016. Hacking the brain: brain-computer interfacing technology and the ethics of neurosecurity. Ethics and Information Technology, 18(2), pp.117-129.
Isafiade, O.E., and Bagula, A.B. eds., 2016. Data Mining Trends and Applications in Criminal Science and Investigations. USA: IGI Global.
Jalali, R., El-Khatib, K., and McGregor, C., 2015, February. Smart city architecture for community-level services through the internet of things. In Intelligence in Next Generation Networks (ICIN), 2015 18th International Conference on (pp. 108-113). IEEE.
Kolias, C., Stavrou, A., Voas, J., Bojanova, I. and Kuhn, R., 2016. Learning internet-of-things security” hands-on”. IEEE Security & Privacy, 14(1), pp.37-46.
Korstanje, M.E. ed., 2016. Threat mitigation and detection of cyber warfare and terrorism activities. USA: IGI Global.
Liu, J., Shen, H., Narman, H.S., Chung, W., and Lin, Z., 2018. A survey of mobile crowdsensing techniques: A critical component for the internet of things. ACM Transactions on Cyber-Physical Systems, 2(3), p.18.
Machaka, P. and Nelwamondo, F., 2016. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey. In Data Mining Trends and Applications in Criminal Science and Investigations (pp. 275-334). IGI Global.
Manches, A., Duncan, P., Plowman, L. and Sabeti, S., 2015. Three questions about the Internet of things and children. TechTrends, 59(1), pp.76-83.
Rathore, M.M., Ahmad, A., Paul, A. and Rho, S., 2016. Urban planning and building smart cities based on the internet of things using big data analytics. Computer Networks, 101, pp.63-80.
Rose, K., Eldridge, S. and Chapin, L., 2015. The internet of things: An overview. The Internet Society (ISOC), pp.1-50.
Russo, G., Marsigalia, B., Evangelista, F., Palmaccio, M. and Maggioni, M., 2015. Exploring regulations and scope of the Internet of Things in contemporary companies: a first literature analysis. Journal of Innovation and Entrepreneurship, 4(1), p.11.
Smith, G.J., Bennett Moses, L. and Chan, J., 2017. The challenges of doing criminology in the big data era: Towards a digital and data-driven approach. The British Journal of Criminology, 57(2), pp.259-274.
Soundarya, V., Kanimozhi, U. and Manjula, D., 2017. Recommendation System for Criminal Behavioral Analysis on Social Network using Genetic Weighted K-Means Clustering. JCP, 12(3), pp.212-220.
Suri, N., Tortonesi, M., Michaelis, J., Budulas, P., Benincasa, G., Russell, S., Stefanelli, C. and Winkler, R., 2016, May. Analyzing the applicability of internet of things to the battlefield environment. In Military Communications and Information Systems (ICMCIS), 2016 International Conference on (pp. 1-8). IEEE.
Zawoad, S. and Hasan, R., 2015, June. Faiot: Towards building a forensics aware ecosystem for the internet of things. In 2015 IEEE International Conference on Services Computing (SCC) (pp. 279-284). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download