Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-relat...
Main Authors: | , |
---|---|
Format: | Others |
Language: | en |
Published: |
Department für Informationsverarbeitung und Prozessmanagement, WU Vienna University of Economics and Business
2014
|
Subjects: | |
Online Access: | http://epub.wu.ac.at/4431/1/SLRprotocol.pdf |
id |
ndltd-VIENNA-oai-epub.wu-wien.ac.at-4431 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-VIENNA-oai-epub.wu-wien.ac.at-44312016-10-26T05:19:05Z Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing Kusen, Ema Strembeck, Mark systematic review / ubiquitous computing / mobile computing / wearable computing / security Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract) Department für Informationsverarbeitung und Prozessmanagement, WU Vienna University of Economics and Business 2014-12-18 Paper NonPeerReviewed en application/pdf http://epub.wu.ac.at/4431/1/SLRprotocol.pdf Creative Commons: Attribution 3.0 Austria Series: Working Papers on Information Systems, Information Business and Operations http://epub.wu.ac.at/4431/ |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
systematic review / ubiquitous computing / mobile computing / wearable computing / security |
spellingShingle |
systematic review / ubiquitous computing / mobile computing / wearable computing / security Kusen, Ema Strembeck, Mark Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing |
description |
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013).
Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems.
Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results.
Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract) === Series: Working Papers on Information Systems, Information Business and Operations |
author |
Kusen, Ema Strembeck, Mark |
author_facet |
Kusen, Ema Strembeck, Mark |
author_sort |
Kusen, Ema |
title |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing |
title_short |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing |
title_full |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing |
title_fullStr |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing |
title_full_unstemmed |
Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing |
title_sort |
protocol for a systematic literature review on security-related research in ubiquitous computing |
publisher |
Department für Informationsverarbeitung und Prozessmanagement, WU Vienna University of Economics and Business |
publishDate |
2014 |
url |
http://epub.wu.ac.at/4431/1/SLRprotocol.pdf |
work_keys_str_mv |
AT kusenema protocolforasystematicliteraturereviewonsecurityrelatedresearchinubiquitouscomputing AT strembeckmark protocolforasystematicliteraturereviewonsecurityrelatedresearchinubiquitouscomputing |
_version_ |
1718390593597472768 |