Managing Security Issues and the Hidden Dangers of Wearable Technologies - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781522510161, 9781522510178

Author(s):  
Katina Michael ◽  
Deniz Gokyer ◽  
Samer Abbas

This chapter presents a set of scenarios involving the GoPro wearable Point of View (PoV) camera. The scenarios are meant to stimulate discussion about acceptable usage contexts with a focus on security and privacy. The chapter provides a wide array of examples of how overt wearable technologies are perceived and how they might/might not be welcomed into society. While the scenario is based at the University of Wollongong campus in Australia, the main implications derived from the fictitious events are useful in drawing out the predicted pros and cons of the technology. The scenarios are interpreted and the main thematic issues are drawn out and discussed. An in depth analysis takes place around the social implications, the moral and ethical problems associated with such technology, and possible future developments with respect to wearable devices.


Author(s):  
Don Kerr ◽  
John Gammack

This chapter provides a contemporary example of how data from wearable devices can be used for “big data” type research. It then asked the question of data policies for the use of data generated by wearable devices. This is followed by an overview of the chapters in the book and how they fit within the general theme of the book. In addition, each chapter is categorised into whether it is social research or more technical type research. The chapter also includes concluding suggestions on the possible future research agenda for privacy and security within the subject domain of the use of wearables. In addition, insights into the future of wearables in relation to ethical considerations, privacy, security and data ownership is also given.


Author(s):  
Don Kerr ◽  
Kerryn Butler-Henderson ◽  
Tony Sahama

When considering the use of mobile or wearable health technologies to collect health data, a majority of users state security and privacy of their data is a primary concern. With users being connected 24/7, there is a higher risk today of data theft or the misappropriate use of health data. Furthermore, data ownership is often a misunderstood topic in wearable technology, with many users unaware who owns the data collected by a device, what that data can be used for and who can receive that data. Many countries are reviewing privacy governance in an attempt to clarify data privacy and ownership. But is it too late? This chapter explores the concepts of security and privacy of data from mobile and wearable technology, with specific examples, and the implications for the future.


Author(s):  
Filipe da Costa ◽  
Filipe de Sá-Soares

In this chapter the security challenges raised by wearable technologies concerning the authenticity of information and subjects are discussed. Following a conceptualization of the capabilities of wearable technology, an authenticity analysis framework for wearable devices is presented. This framework includes graphic classification classes of authenticity risks in wearable devices that are expected to improve the awareness of users on the risks of using those devices, so that they can moderate their behaviors and take into account the inclusion of controls aimed to protect authenticity. Building on the results of the application of the framework to a list of wearable devices, a solution is presented to mitigate the risk for authenticity based on digital signatures.


Author(s):  
Mingzhong Wang ◽  
Don Kerr

With the features of mobility, reality augmentation, and context sensitivity, wearable devices are widely deployed into various domains. However, the sensitivity of collected data makes security and privacy protection one of the first priority in the advancement of wearable technologies. This chapter provides a study on encryption-based confidentiality protection for data storage systems in wearable platforms. The chapter first conducts a review to storage solutions in consumer wearable products and explores a two-tier, local flash memory and remote cloud storage, storage system in wearable platforms. Then encryption-based confidentiality protection and implementation methods for both flash memory and remote cloud storage are summarized. According to the interaction and integration of these two components, a categorization of confidential storage systems in wearable platforms is proposed. In addition, the benefits and selection criteria for each category are also discussed.


Author(s):  
Michelle C. Antero

This chapter briefly introduces some historical and contemporary context before proposing a model course syllabus to implement a course in Management of Security Issues in Wearable Technology. The course syllabus is developed in line with the IS2010 curriculum recommended by the peak bodies (ACM and AIS) for a degree in Information Systems, Computer Information Systems or Management Information Systems. The design further follows the guidelines developed by the Accreditation Board of Engineering and Technology (ABET) that advocates that Course Learning Outcomes (CLOs) be developed for the list of topics covered by the material. In addition, the syllabus provides a basis for enterprise training relevant to managers and security specialists. The chapter also provides some general pedagogical guidelines on how each topic can be discussed and activities appropriate to the learners. It also uses Gluga et al.'s (2013) assessment criteria, based on Bloom's (1956) taxonomy to measure the depth of knowledge.


Author(s):  
Marc L. Resnick ◽  
Alina M. Chircu

Today, innovation in and with Information and Communication Technology (ICT) is accelerating as consumers, companies and governments become users and designers of myriad ICT solutions whose ethical implications are not yet well understood. This chapter contributes to the growing body of research on ethical implications of one popular emerging ICT - wearable devices and associated technologies. Ethical challenges stemming from the extensive prevalence and comprehensiveness of wearable devices are related not only to the device design and use but also to the device-supported data collection and analysis and the creation of derivative products and services. Drawing from theories of ICT ethics, this chapter identifies the major ethical challenges posed by wearable devices and provides several guidelines on how these challenges can be addressed through ethically-informed design interventions.


Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


Author(s):  
Joseph Ricci ◽  
Ibrahim Baggili ◽  
Frank Breitinger

There is no doubt that the form factor of devices continues to shrink as evidenced by smartphones and most recently smartwatches. The adoption rate of small computing devices is staggering and needs stronger attention from the cybersecurity and digital forensics communities. In this chapter, we dissect smartwatches. We first present a historical roadmap of smartwatches. We then explore the smartwatch marketplace and outline existing smartwatch hardware, operating systems and software. Next we elaborate on the uses of smartwatches and then discuss the security and forensic implications of smartwatches by reviewing the relevant literature. Lastly, we outline future research directions in smartwatch security and forensics.


Author(s):  
Roba Abbas ◽  
Katina Michael ◽  
M. G. Michael

Location-Based Services (LBS) provide value-added solutions to users based on location or position information and other contextual data. They enable the collection of GPS data logs or location chronicles, and may be deployed on a range of devices, many of which presently come in the form of commercially available product solutions with corresponding applications. This chapter presents the outcomes of an observational study of LBS users, which was designed to gauge user perspectives in relation to LBS socio-ethical dilemmas. The focus is on the outcomes of a spatial analysis exercise, which resulted in the development of a series of scenarios (in map format) that demonstrate varying LBS usability contexts. The scenarios range across various risk levels, and can be used as further input into consultative practices that are centered on the socio-ethical implications of LBS usage. Additionally, the results of the LBS observational study can be utilized to inform the need for LBS regulation. Future research directions are proposed, allowing for the study to be extended to wider contexts.


Sign in / Sign up

Export Citation Format

Share Document