<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sean S. Costigan</style></author><author><style face="normal" font="default" size="100%">Gustav Lindström</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Policy and the Internet of Things</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical infrastructures</style></keyword><keyword><style  face="normal" font="default" size="100%">Industrial Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">machine communications</style></keyword><keyword><style  face="normal" font="default" size="100%">security implications of IoT</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">9-18</style></pages><abstract><style face="normal" font="default" size="100%">Cybersecurity has steadily crept to the top of the national security agenda. Simultaneously, a merger of the physical and virtual worlds is noticeably underway. A confluence of technologies has come together to make this possible under the rubric known as the Internet of Things (IoT). This merger will bring sensors and computing devices totaling in the billions to connect objects together in a network that does not require human intervention, along with which will come much vaunted benefits, knowable risks, uncertainties and considerable security dilemmas. Using the past as a predictor of future behavior, a vast increase in hackable devices will create equally vast vulnerabilities that will now touch the physical world. Yet the IoT will also present opportunities that are just now being imagined, likely making the Internet revolution seem small by comparison. While technological growth often appears to outpace policy, government retains the power to convene and ultimately to regulate. This article examines why policymakers should care about the IoT, the significant trends for the next five to ten years, and likely security implications stemming from those trends. The article finalizes with an overview of policy considerations.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>