Matovu Davis et al.; International Journal of Advance Research, Ideas and Innovations in Technology © 2019, www.IJARIIT.com All Rights Reserved Page | 1432 ISSN: 2454-132X Impact factor: 4.295 (Volume 5, Issue 2) Available online at: www.ijariit.com The Internet of Things: applications and security metrics with the Ugandan perspective Davis Matovu davismatovu@yahoo.com Busitema University, Busia, Uganda Mugeni Gilbert B. gbmugeni@gmail.com Communication Authority of Kenya, Nairobi, Kenya Karume Simon smkarume@gmail.com Laikipia University, Eldoret, Kenya Mutua Stephen stephen.makau@gmail.com Masinde Muliro University of Science and Technology, Kakamega, Kenya Gilbert Gilibrays Ocen gilbertocen@gmail.com Busitema University, Busia, Uganda ABSTRACT As the Internet of Things (IoT) increasingly becomes a reality, thousands of devices get connected to IoT platforms in smart cities and regions. These devices will actively send data updates to cloud-based platforms, as part of smart applications in various domains like healthcare, traffic, and education among others. Therefore, it is important to assess the ability of modern IoT systems to handle high rates of data updates coming from devices. The paper aims at developing metrics that can be used to assess the IoT cybersecurity status of a country in terms of the Intensity, Readiness, and Adoption with a special focus of Uganda as a case study. To achieve this, a design science approach was employed. Data were collected from a sample of 127 respondents from 7 firms around Kampala district. Finally, the impact of the proposed metrics is demonstrated through an application to the IoT assessment model. KeywordsInternet of Things, Cybersecurity, IoT applications, Metrics 1. INTRODUCTION The Internet of Things (IoT; also known as the Internet of Objects) is a system in which the physical world is connected to the Internet through ubiquitous sensors (Victor, 2017). This concept has evolved and extended to several industries and applications over the years, encompassing a vision where networked everyday objects are able to push information, change their state, interact with each other without human intervention and perform actions that affect the physical world (Victor, 2017). Chen at al. (2014) further asserts that the Internet of Things (IoT) is regarded as a technology and economic wave in the global information industry after the Internet. The IoT is an intelligent network which connects all things to the Internet for the purpose of exchanging information and communicating through the information sensing devices in accordance with agreed protocols (Chen at al, 2014). It achieves the goal of intelligent identifying, locating, tracking, monitoring, and managing things. According to Chen at al. (2014), IoT should have the following three characteristics; Comprehensive Perception: Using RFID, sensors, and two-dimensional barcode to obtain the object information at any time and anywhere, it will be a new opportunity. Reliable Transmission: Through a variety of available radio networks, telecommunication networks, and the Internet, objects information can be available at any time. Intelligent Processing: By collecting IoT data into databases, various intelligent computing technologies including cloud computing will be able to support IoT data applications. The network service providers can process tens of millions or even billion pieces of messages instantly through cloud computing. However, as the number of IoT devices continues to increase, so does the number of challenges we face. Security is a big concern since the number of attacks to IoT devices keeps rising. (Bonilla et al, 2017; Teng et al, 2014). It is widely acknowledged that the potential for malicious attacks can and will be greatly spread and actuated from the Internet to the physical word (Teng et al, 2014).