Abstract

PurposeThe purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact.Design/methodology/approachThe research relies on general morphological analysis for deconstructing wicked problems into core components, and on crowdsourcing 50 experts on Wikistrat’s commercial platform, allowing them to suggest core components, rank them by importance and develop scenarios together. This methodology allowed a wider view than usual, and allowed the experts to examine unorthodox combination of components, leading to the creation of wild-card scenarios.FindingsAnalysis of both the core components and the resulting scenarios indicates that the IoT is set to have a dramatic role in crime and terror attacks in the near future. High-impact high-probability scenarios include attacks on power plants, cyber wallets and personal assistants. High-impact low-probability scenarios include terrorist attacks by environmentalist groups, accidental attacks conducted by immature pranksters and having a computer worm propagating in a low-security but critical facility like a hospital.Originality/valueThis paper brings a standardized method which can be used to examine complex events like crime and terror attacks using a disruptive and emerging technology. The results can be used by practitioners to further study the issue and develop many other scenarios more tailored to their needs. The scenarios presented in this paper can also be of value to security bodies who wish to be better prepared for the future.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.