Skip to main content

Table 1 The lists of factors, which the experts in the study used to develop their scenarios

From: Scenarios for crime and terrorist attacks using the internet of things

Motives

Targets

Methods

Blackmailing

Automobile Sensors and Controls

A “Genius Hacker”

Damaging the reputation

Cyberwallets

An “Inside Man”

Deep surveillance

Hospitals and Health Facilities

Botnets

Identity theft

Intelligence and defense information systems

DDoS

Industrial espionage

Nuclear and Energy Power Plants, Electrical Grids, and Pipelines

Mass Attack by Thousands of Computer Users

Political subjugation and control

Smart Assistants

Social Engineering

Propaganda

SmartHome Platforms

 

Sex crime

Traffic management systems

 

Surveillance and exposure of the intelligence community