Internet of Thing (IoT) Smart Home Systems: Conceptual Ethical Framework for Malaysian Developers

  • Hasnani HassanEmail author
  • Robiatul Adawiah Jamaluddin
  • Fadimatu Muhammad Marafa
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11870)


Internet of things (IoT) is an emerging technology that connects ‘Things’ to the ‘Internet’ just as implied by its name. The things include our smartphones, smart furniture and electrical appliances. Smart homes are considered the most significant aspect in the field of IoT allowing users to set preferences on their needs, as for example to keep the house in an optimal state and in the case of sick elderly residents resided in the house, to keep track of the medical history according to urine test or blood pressure. Despite these conveniences provided by IoT-based smart home system, the ethical aspect such as data protection and privacy of individuals are violated and thus security issues may arise. Therefore, a conceptual framework has been proposed for consideration in Malaysian context. The purpose of the conceptual framework is as point of reference for IoT developer in the development of smart home system which later can be extended to smart cities development.


Internet of Things (IoT) Smart home Ethical frameworks Conceptual framework Smart cities 


  1. 1.
    Christopher, L.O.: Telecommunication, media and technology. In: Guide to Doing Business in Malaysia, Rajah & Tann, Asia, pp.161–162 (2019)Google Scholar
  2. 2.
    Shouran, Z., Ashari, A., Priyambodo, T.: Internet of things (IoT) of smart home: privacy and security. Int. J. Comput. Appl. 182(39), 3–8 (2019)Google Scholar
  3. 3.
  4. 4.
    Shah, N.: Ethical issues in biomedical research and publication. J Conserv Dent. 14, 205–207 (2011)CrossRefGoogle Scholar
  5. 5.
    Merriam-Webster.: The Merriam-Webster Dictionary, International Edition. Merriam-Webster, Inc. (2016)Google Scholar
  6. 6.
    Collins Dictionaries.: Latin Dictionary. HarperCollins Publishers Limited (2018)Google Scholar
  7. 7.
  8. 8.
    Kang, M., Park, E., Cho, B.H., Lee, K.S.: Recent patient health monitoring platforms incorporating Internet of Things - enabled smart devices. Int. Neurourol. J. 22, 76–82 (2018). National Institutes of HealthCrossRefGoogle Scholar
  9. 9.
    Long, M.: Attack and defend: Linux privilege escalation techniques of 2016. STI graduate student research. SANS Technology Institute (2019)Google Scholar
  10. 10.
    Georgios, M., Dimitrios, L., Nikos, K..: Security in smart home environment. wireless technologies for ambient assisted living and health care: systems and applications. Medican Information Science Reference (2011)Google Scholar
  11. 11.
    Baldini, G., Botterman, M., Neisse, R., Tallacchini, M.: Ethical design in the Internet of Things. Sci. Eng. Ethics 24(3), 905–925 (2018). Scholar
  12. 12.
    Laws of Malaysia.: Computer Crimes Act 1997. Laws of Malaysia. 9–10. Laws Act 1968 & Percetakan Nasional Malaysia Bhd (2006)Google Scholar
  13. 13.
  14. 14.
    Steven, T.: Section 233(1)(a) of the Communications and Multimedia Act 1998 Creates a Chilling Effect on Freedom of Speech and Expression, and Should be Repealed. The Malaysia Bar (2015)Google Scholar
  15. 15.
    Laws of Malaysia.: Communications and Multimedia Act 1998. Laws of Malaysia. Laws Act 1968 & Percetakan Nasional Malaysia Bhd (2006)Google Scholar
  16. 16.
    Laws of Malaysia.: Penal Code. Laws of Malaysia. Laws Act 1968 & Percetakan Nasional Malaysia Bhd (2018)Google Scholar
  17. 17.
    Laws of Malaysia.: Personal Data Protection 2010. Laws of Malaysia. Laws Act 1968 & Percetakan Nasional Malaysia Bhd (2016)Google Scholar
  18. 18.
    Steinberg, J.: Official (ISC)2 Guide to the CISSP-ISSMP CBK, pp. 330–331. CRC Press, Boca Raton (2015)Google Scholar
  19. 19.
    Spyros, G.: Ethics and law in the Internet of Things world. Smart Cities Open Access J. Multi. Digit. Publish. Inst. 1, 98–120 (2018)Google Scholar
  20. 20.
    Frank, H.: Ethics and legislation regarding Internet of Things and data. Business and decision. Master Thesis. Tilburg University (2017)Google Scholar
  21. 21.
    Galetta, A., de Hert, P.: A European Perspective on Data Protection and the Right of Access. In: Norris, C., de Hert, P., L’Hoiry, X., Galetta, A. (eds.) The Unaccountable State of Surveillance. LGTS, vol. 34, pp. 21–43. Springer, Cham (2017). Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hasnani Hassan
    • 1
    Email author
  • Robiatul Adawiah Jamaluddin
    • 1
  • Fadimatu Muhammad Marafa
    • 1
  1. 1.Department of Information Technology, Faculty of Business, Information and Human SciencesInfrastructure University Kuala Lumpur (IUKL)KajangMalaysia

Personalised recommendations