{"id":"https://openalex.org/W4416049006","doi":"https://doi.org/10.1007/s43926-025-00251-0","title":"Invisible intrusions, internal threats and ethical vulnerabilities in Nigeria\u2019s internet of things","display_name":"Invisible intrusions, internal threats and ethical vulnerabilities in Nigeria\u2019s internet of things","publication_year":2025,"publication_date":"2025-11-09","ids":{"openalex":"https://openalex.org/W4416049006","doi":"https://doi.org/10.1007/s43926-025-00251-0"},"language":"en","primary_location":{"id":"doi:10.1007/s43926-025-00251-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00251-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00251-0.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00251-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092774257","display_name":"Aminu Muhammad Auwal","orcid":"https://orcid.org/0009-0005-1799-7876"},"institutions":[{"id":"https://openalex.org/I161374704","display_name":"University of Jos","ror":"https://ror.org/009kx9832","country_code":"NG","type":"education","lineage":["https://openalex.org/I161374704"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"Aminu Muhammad Auwal","raw_affiliation_strings":["Faculty of Natural Sciences, University of Jos, Jos, Plateau State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Faculty of Natural Sciences, University of Jos, Jos, Plateau State, Nigeria","institution_ids":["https://openalex.org/I161374704"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5092774257"],"corresponding_institution_ids":["https://openalex.org/I161374704"],"apc_list":{"value":990,"currency":"EUR","value_usd":1067},"apc_paid":{"value":990,"currency":"EUR","value_usd":1067},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4765146,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.16609999537467957,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.16609999537467957,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10953","display_name":"E-Government and Public Services","score":0.04619999974966049,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.04190000146627426,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5753999948501587},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.5400000214576721},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.48190000653266907},{"id":"https://openalex.org/keywords/language-change","display_name":"Language change","score":0.46709999442100525},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4546000063419342},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4113999903202057},{"id":"https://openalex.org/keywords/element","display_name":"Element (criminal law)","score":0.3898000121116638},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3840999901294708},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3285999894142151}],"concepts":[{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5753999948501587},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.5400000214576721},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.48190000653266907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48089998960494995},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4794999957084656},{"id":"https://openalex.org/C2780027415","wikidata":"https://www.wikidata.org/wiki/Q524648","display_name":"Language change","level":2,"score":0.46709999442100525},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4546000063419342},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.435699999332428},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4113999903202057},{"id":"https://openalex.org/C200288055","wikidata":"https://www.wikidata.org/wiki/Q2621792","display_name":"Element (criminal law)","level":2,"score":0.3898000121116638},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3840999901294708},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C505623098","wikidata":"https://www.wikidata.org/wiki/Q3002932","display_name":"Critical security studies","level":5,"score":0.3249000012874603},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.3212999999523163},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.3091000020503998},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3077000081539154},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C2776900844","wikidata":"https://www.wikidata.org/wiki/Q8028383","display_name":"Witness","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.2964000105857849},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.29420000314712524},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.28679999709129333},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2851000130176544},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.273499995470047},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.2685000002384186},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.26420000195503235},{"id":"https://openalex.org/C2779449393","wikidata":"https://www.wikidata.org/wiki/Q302285","display_name":"Human security","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C203043789","wikidata":"https://www.wikidata.org/wiki/Q138461","display_name":"Digital economy","level":2,"score":0.26010000705718994}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s43926-025-00251-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00251-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00251-0.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:963244345e0945aeb1a0c418f98d0e7e","is_oa":true,"landing_page_url":"https://doaj.org/article/963244345e0945aeb1a0c418f98d0e7e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Internet of Things, Vol 5, Iss 1, Pp 1-8 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s43926-025-00251-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s43926-025-00251-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s43926-025-00251-0.pdf","source":{"id":"https://openalex.org/S4210230675","display_name":"Discover Internet of Things","issn_l":"2730-7239","issn":["2730-7239"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Internet of Things","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416049006.pdf","grobid_xml":"https://content.openalex.org/works/W4416049006.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2785673334","https://openalex.org/W4206469981","https://openalex.org/W4306751875","https://openalex.org/W4308478116","https://openalex.org/W4308588403","https://openalex.org/W4377139362","https://openalex.org/W4390740543","https://openalex.org/W4391514746","https://openalex.org/W4405135033","https://openalex.org/W4408793574","https://openalex.org/W4408828099","https://openalex.org/W4409250950","https://openalex.org/W4409427857","https://openalex.org/W4410274200"],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"adoption":[2],"of":[3,6,44,81,129],"the":[4,29,42,142],"Internet":[5],"Things":[7],"(IoT)":[8],"in":[9,19,99],"Nigeria":[10],"presents":[11],"both":[12],"opportunity":[13],"and":[14,27,37,66,72,102,126],"risk.":[15],"While":[16],"technological":[17],"advancements":[18],"IoT":[20,56,138,148],"promise":[21],"improved":[22],"system":[23,146],"efficiency,":[24],"service":[25],"delivery":[26],"connectivity,":[28],"broader":[30],"socio-ethical":[31],"landscape":[32],"marked":[33],"by":[34,107],"institutional":[35,74,103],"corruption":[36],"weak":[38],"digital":[39,82,119],"accountability":[40],"threatens":[41],"security":[43,80,149],"these":[45],"systems.":[46],"This":[47],"commentary":[48],"critically":[49],"examines":[50],"how":[51],"internal":[52],"vulnerabilities":[53],"often":[54],"compromise":[55],"Security":[57],"across":[58],"key":[59],"sectors":[60],"such":[61,112],"as":[62,113,132],"healthcare,":[63],"finance,":[64],"energy":[65],"governance.":[67],"Drawing":[68],"from":[69,87,93],"interdisciplinary":[70],"literature":[71],"real-world":[73],"dynamics,":[75],"it":[76],"argues":[77],"that":[78],"lasting":[79],"infrastructure":[83],"will":[84],"not":[85],"emerge":[86],"technical":[88],"solutions":[89],"alone":[90],"but":[91],"only":[92],"a":[94],"generational":[95],"shift":[96],"one":[97],"grounded":[98],"values,":[100],"ethics,":[101],"integrity.":[104],"It":[105],"concludes":[106],"proposing":[108],"uncompromising":[109],"human-centered":[110],"interventions":[111],"asset":[114],"forfeiture,":[115],"mandatory":[116],"audits,":[117],"compulsory":[118],"ethics":[120],"education,":[121],"aggressive":[122],"enforcement,":[123],"lifetime":[124],"disqualification,":[125],"criminal":[127],"prosecution":[128],"complicit":[130],"actors":[131],"necessary":[133],"conditions":[134],"for":[135],"securing":[136],"Nigeria\u2019s":[137],"infrastructure.":[139],"Without":[140],"addressing":[141],"human":[143],"factors":[144],"behind":[145],"compromise,":[147],"efforts":[150],"may":[151],"remain":[152],"fundamentally":[153],"incomplete.":[154]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-11-09T00:00:00"}
