Watch What You Wear

Author(s):  
Joseph Ricci ◽  
Ibrahim Baggili ◽  
Frank Breitinger

There is no doubt that the form factor of devices continues to shrink as evidenced by smartphones and most recently smartwatches. The adoption rate of small computing devices is staggering and needs stronger attention from the cybersecurity and digital forensics communities. In this chapter, we dissect smartwatches. We first present a historical roadmap of smartwatches. We then explore the smartwatch marketplace and outline existing smartwatch hardware, operating systems and software. Next we elaborate on the uses of smartwatches and then discuss the security and forensic implications of smartwatches by reviewing the relevant literature. Lastly, we outline future research directions in smartwatch security and forensics.

2018 ◽  
pp. 1458-1478
Author(s):  
Joseph Ricci ◽  
Ibrahim Baggili ◽  
Frank Breitinger

There is no doubt that the form factor of devices continues to shrink as evidenced by smartphones and most recently smartwatches. The adoption rate of small computing devices is staggering and needs stronger attention from the cybersecurity and digital forensics communities. In this chapter, we dissect smartwatches. We first present a historical roadmap of smartwatches. We then explore the smartwatch marketplace and outline existing smartwatch hardware, operating systems and software. Next we elaborate on the uses of smartwatches and then discuss the security and forensic implications of smartwatches by reviewing the relevant literature. Lastly, we outline future research directions in smartwatch security and forensics.


Info ◽  
2016 ◽  
Vol 18 (3) ◽  
pp. 42-57 ◽  
Author(s):  
Daeho Lee ◽  
Dong-Hee Shin

Purpose The purpose of this study is to categorize network neutrality according to its issues under debate and assess the state of the debate based on such organization. In addition, the study discusses the reasons that network neutrality is so difficult to solve and the future research directions that would do so. Design/methodology/approach This study presents a critical review of the current network neutrality issues and summarizes the economic background of each position in the debate. The relevant literature is organized by issue to examine the reasons that the network neutrality debate is so difficult to solve and determine the further study required to solve it. Findings An analysis of the relevant literature suggests that the proponents and opponents of network neutrality disagree on the best methods of developing the Internet. Therefore, future research and regulatory and practitioners’ applications would greatly benefit from a comprehensive review of that literature. Originality/value Network neutrality regulation is receiving increased attention because the development and significant influences of the Internet are becoming more apparent.


As various theoretical and practical details of using membrane computing models have been presented throughout the book, certain details might be hard to find at a later time. For this reason, this chapter provides the reader with a set of checkmark topics that a developer should address in order to implement a robot controller using a membrane computing model. The topics discussed address areas such as: (1) robot complexity, (2) number of robots, (3) task complexity, (4) simulation versus real world execution, (5) sequential versus parallel implementations. This chapter concludes with an overview of future research directions. These directions offer possible solutions for several important concerns: the development of complex generic algorithms that use a high level of abstraction, the design of swarm algorithms using a top-down (swarm-level) approach and ensuring the predictability of a controller by using concepts such as those used in real-time operating systems.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Marco Tregua ◽  
Danilo Brozovic ◽  
Anna D'Auria

PurposeThe purpose of this article was to provide an outline of the citation practices of “Evolving to a new dominant logic for marketing” by Vargo and Lusch (2004) to identify and discuss the most prominent research topics in which citations were used and to suggest future research based on the results of the analysis.Design/methodology/approachThe authors used a comprehensive framework of citation practices based on iterations of previous literature to analyze the relevant literature, which they identified by accessing, systematically and rigorously, every available contribution matching a set of criteria. The authors then categorized these contributions and highlighted the main topics of research interest in each category.FindingsThe findings identify some of the factors in the continuous development of SDL, the way this new marketing logic permeated the scientific debate, the infusion of Vargo and Lusch (2004) into several contributions framed in the new logic or justified through it, and a general perception of a default reference. Additionally, the findings highlight the main topics of research interest in each category.Research limitations/implicationsThe analysis enabled the detection of the original paper's influence through advances in service studies, pollination into other fields of research and continuous scientific debate. The authors have highlighted several avenues for research and proposed future research directions.Originality/valueThis research analyzed the effects of the spread of the SDL cornerstone article and emphasized the advantage of using an in-depth approach to the analysis of studies through a framework applied to more than 4,600 studies.


2021 ◽  
Vol 1 (4) ◽  
pp. 580-596
Author(s):  
Cecelia Horan ◽  
Hossein Saiedian

As technology has become pivotal a part of life, it has also become a part of criminal life. Criminals use new technology developments to commit crimes, and investigators must adapt to these changes. Many people have, and will become, victims of cybercrime, making it even more important for investigators to understand current methods used in cyber investigations. The two general categories of cyber investigations are digital forensics and open-source intelligence. Cyber investigations are affecting more than just the investigators. They must determine what tools they need to use based on the information that the tools provide and how effectively the tools and methods work. Tools are any application or device used by investigators, while methods are the process or technique of using a tool. This survey compares the most common methods available to investigators to determine what kind of evidence the methods provide, and which of them are the most effective. To accomplish this, the survey establishes criteria for comparison and conducts an analysis of the tools in both mobile digital forensic and open-source intelligence investigations. We found that there is no single tool or method that can gather all the evidence that investigators require. Many of the tools must be combined to be most effective. However, there are some tools that are more useful than others. Out of all the methods used in mobile digital forensics, logical extraction and hex dumps are the most effective and least likely to cause damage to the data. Among those tools used in open-source intelligence, natural language processing has more applications and uses than any of the other options.


Author(s):  
Alexandra Bonnici ◽  
Alican Akman ◽  
Gabriel Calleja ◽  
Kenneth P. Camilleri ◽  
Patrick Fehling ◽  
...  

AbstractSketching is a natural and intuitive communication tool used for expressing concepts or ideas which are difficult to communicate through text or speech alone. Sketching is therefore used for a variety of purposes, from the expression of ideas on two-dimensional (2D) physical media, to object creation, manipulation, or deformation in three-dimensional (3D) immersive environments. This variety in sketching activities brings about a range of technologies which, while having similar scope, namely that of recording and interpreting the sketch gesture to effect some interaction, adopt different interpretation approaches according to the environment in which the sketch is drawn. In fields such as product design, sketches are drawn at various stages of the design process, and therefore, designers would benefit from sketch interpretation technologies which support these differing interactions. However, research typically focuses on one aspect of sketch interpretation and modeling such that literature on available technologies is fragmented and dispersed. In this paper, we bring together the relevant literature describing technologies which can support the product design industry, namely technologies which support the interpretation of sketches drawn on 2D media, sketch-based search interactions, as well as sketch gestures drawn in 3D media. This paper, therefore, gives a holistic view of the algorithmic support that can be provided in the design process. In so doing, we highlight the research gaps and future research directions required to provide full sketch-based interaction support.


Author(s):  
Reza Montasari ◽  
Richard Hill ◽  
Simon Parkinson ◽  
Pekka Peltola ◽  
Amin Hosseinian-Far ◽  
...  

Considering the ever-growing ubiquity of technology, there is an associated growth in the possibility of digital devices related to a criminal investigation or civil litigation. As the variety of digital devices is increasing, the storage capacity of each is also rising exponentially. Due to the varied and large volumes of data produced, law enforcement agencies (LEAs) worldwide are facing a significant backlog of cases. This has culminated in significant delays in dealing with cases that urgently require digital forensic investigations (DFIs). It is of paramount importance that new research approaches be adopted to address such challenges. This article evaluates the existing set of circumstances surrounding the field of digital forensics (DF). The article provides two important contributions to the field of DF; it identifies and analyses the most important mid- and long-term challenges that need to be considered by LEAs. It also proposes important specific future research directions, the undertaking of which can assist LEAs in adopting a new approach to addressing these challenges.


2021 ◽  
Vol 23 (1) ◽  
pp. 1-20
Author(s):  
Fati Tahiru

Artificial intelligence (AI) is developing and its application is spreading at an alarming rate, and AI has become part of our daily lives. As a matter of fact, AI has changed the way people learn. However, its adoption in the educational sector has been saddled with challenges and ethical issues. The purpose of this study is to analyze the opportunities, benefits, and challenges of AI in education. A review of available and relevant literature was done using the systematic review method to identify the current research focus and provide an in-depth understanding of AI technology in education for educators and future research directions. Findings showed that AI's adoption in education has advanced in the developed countries and most research became popular within the Industry 4.0 era. Other challenges, as well as recommendations, are discussed in the study.


Author(s):  
Lu Zhen ◽  
Haolin Li

AbstractE-commerce, new retail, and other changes have highlighted the requirement of high efficiency and accuracy in the logistics service. As an important section in logistics and supply chain management, warehouses need to respond positively to the increasing requirement. The “smart warehouse” system, which is equipped with emerging warehousing technologies, is increasingly attracting the attention of industry and technology giants as an efficient solution for the future of warehouse development. This study provides a holistic view of operations management problems within the context of smart warehouses. We provide a framework to review smart warehouse operations management based on the characteristics of smart warehouses, including the perspectives of information interconnection, equipment automation, process integration, and environmental sustainability. A comprehensive review of relevant literature is then carried out based on the framework with four perspectives. This study could provide future research directions on smart warehouses for academia and industry practitioners.


2019 ◽  
Vol 19 (3) ◽  
pp. 253-277
Author(s):  
Pankaj Kaprwan ◽  
Sameer Mathur

Practitioners and marketers have leveraged brand equity in order to charge a premium price for their products, relative to competition, in the marketplace, yet, we do not find a systematic literature review that captures the importance of this metric as an outcome of brand equity. The purpose of this review is to fill this gap. This review (a) identifies and summarises the relevant literature, providing an understanding of brand equity; (b) highlights the academic literature which compares various brand equity measures and identifies price premium as a key metric; and (c) highlights empirical research work that identifies and validates price premium as a key metric in the B2C marketplace. This review suggests future research directions, exploring the relevance of a price premium metric as a service brand equity measure.


Sign in / Sign up

Export Citation Format

Share Document