Security Challenges and Selected Legal Aspects for Wearable Computing

2012 ◽  
Vol 5 (1) ◽  
pp. 68-87
Author(s):  
John Lindström ◽  
Claas Hanken

This paper discusses information security challenges encountered during the wearIT@work project and selected legal aspects of wearable computing. Wearable computing will offer interesting opportunities to improve and reengineer work processes in organizations, but can at the same introduce alignment problems as users in organizations may adopt the new technology before organizations are prepared. In addition, needed supportive legal frameworks have not yet fully addressed the new wearable computing technology. Different alignment concepts for how such challenges can be managed are discussed in the paper.

Author(s):  
John Lindström ◽  
Claas Hanken

Wearable computing is gaining more and more interest as new “wearables,” intended for both work and leisure, are introduced. This trend brings benefits and challenges; for instance, the potential to improve work processes and issues related to IT management and privacy. The introduction and use of wearable computing provides opportunities to improve and reengineer work processes in organizations but can at the same time introduce alignment problems, as users in organizations may adopt the new technology before organizations are prepared. Further, alignment problems posed by the emerging trend, “Bring Your Own Device” (BYOD), are discussed. In addition, as in the cloud computing area, needed and necessary supportive legal frameworks have not yet fully addressed the new wearable computing technology. In the light of recent developments regarding global intelligence gathering, security and privacy concerns must be given careful consideration. Different alignment concepts for managing security challenges and legal aspects related to wearable computing, such as cultivation, care, hospitality, and care with hospitality, are discussed in the chapter.


2018 ◽  
pp. 1043-1067 ◽  
Author(s):  
John Lindström ◽  
Claas Hanken

Wearable computing is gaining more and more interest as new “wearables,” intended for both work and leisure, are introduced. This trend brings benefits and challenges; for instance, the potential to improve work processes and issues related to IT management and privacy. The introduction and use of wearable computing provides opportunities to improve and reengineer work processes in organizations but can at the same time introduce alignment problems, as users in organizations may adopt the new technology before organizations are prepared. Further, alignment problems posed by the emerging trend, “Bring Your Own Device” (BYOD), are discussed. In addition, as in the cloud computing area, needed and necessary supportive legal frameworks have not yet fully addressed the new wearable computing technology. In the light of recent developments regarding global intelligence gathering, security and privacy concerns must be given careful consideration. Different alignment concepts for managing security challenges and legal aspects related to wearable computing, such as cultivation, care, hospitality, and care with hospitality, are discussed in the chapter.


2018 ◽  
Vol 28 (6) ◽  
pp. 1855-1864
Author(s):  
Olga Zoric ◽  
Katarina Jonev ◽  
Ivan Rancic

The author starts from the informational dimension of the operational environment in a strategic reality and deal with the problem of defining informational power from the theoretical and practical aspect of information warfare.The deliberations in the work are aimed to initiate a procedure for auditing of the security documents in order to create a legal basis for the operationalization of the content of information security, as one of the aspects of integral security of the Republic of Serbia. The paper deals with the conceptual determinations and importance of information, information warfare and information operations, as well as the content of information warfare, pointing out the strategic and doctrinal definitions of the information warfare of the United States of America, the Russian Federation and the Republic of Serbia. It is necessary to accurately and objectively observe world achievements in the field of national security and the relation of the most powerful world powers to the problem of information warfare. Based on a comparative analysis of world trends and the state of the theoretical and practical aspects of information security of the Republic of Serbia, the focus is on work, where measures are proposed to improve the security function in the fourth unit of work.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2012 ◽  
Vol 10 (2) ◽  
pp. 1-15 ◽  
Author(s):  
Suresh Sood

Startup employees led by the entrepreneur are masters of embracing complexity. This means the startup team understands cause and effect follow a non-linear relationship with the subtlest of changes potentially resultant in producing chaotic behavior and surprise. For the startup, this means counterintuitive thinking wins the day. In light of this, small expenditures can have a greater impact on developing new business. The startup employee prefers not to be constrained by desktop or the old broadcast model of email; instead exploiting social technologies anywhere. A startup is a learning organization improving processes and results on an ongoing basis mirroring entrepreneurship as a learning process. Startup employees realize success goes beyond consideration of product functionality or a track record built on an existing base of customers. With major technology disruptions during 2012-2014, the potential to launch a “startup-in-a-box” integrating social, mobile, and wearable computing technology is a reality and essential. Only through a combination of social technologies can startups and founding employees maintain pace with the changing business landscape and generate a rapid amount of knowledge to sustain sufficient advantage in the market. Furthermore, the forthcoming death of social media and rise of S-commerce as convergence with E-commerce progresses to help generate revenues from newfound knowledge perfectly complements startup employees.


Author(s):  
Viacheslav Politanskyi ◽  
Dmytro Lukianov ◽  
Hanna Ponomarova ◽  
Oleh Gyliaka

The article examines the characteristics of the functioning of information security in the e-government system, a phenomenon that is only possible based on the development of the information security infrastructure. The authors analyze information security as a key element of the concept of e-government, as well as various interpretations and ways of explaining the concept of information security. The research team's approach to the definition of the concept of information security is formed from the deep understanding of this concept, in terms of general theoretical analysis. Topics, objects, functions, types, principles, forms, levels of provision and structural elements of information security are studied. It is concluded that the organization of modern computer security of the State is undoubtedly a complex, systemic and multilevel phenomenon, whose state, dynamics, and perspectives are directly influenced by many external and internal factors, the most important being the political situation. In the world the presence of possible external and internal threats; state and level of development of information and communication of the country and internal political situation, among other aspects.


2017 ◽  
Vol 13 ◽  
pp. 1253-1260 ◽  
Author(s):  
T. Pereira ◽  
L. Barreto ◽  
A. Amaral

Author(s):  
W. K. Hamoudi ◽  
Nadia M. G. Al-Saidi

Information security can provide confidentiality, integrity, and availability for society to benefit efficiently from data storage and open networks. Free space communication networks suffer from adversaries who interfere with data on networked computers. Inventing new protection techniques has arisen to ensure integrity and authenticity of digital information. This chapter introduces Nano and Bio techniques in cryptography to enhance the information security systems. Tasks unfeasible on a classical computer can now be performed by quantum computers, yielding a big impact on online security. Threats of exponentially fast quantum algorithms on business transactions could be overcome by this new technology. Based on biological observations, the exploration of biometric cryptography and authentication to determine individuals' authenticity can be done through numeric measurements. This provides very reliable automated verification and strong protection against biometric system attacks.


Sign in / Sign up

Export Citation Format

Share Document