You are previewing Managing Security Issues and the Hidden Dangers of Wearable Technologies.
O'Reilly logo
Managing Security Issues and the Hidden Dangers of Wearable Technologies

Book Description

Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well. Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Preface
    1. ORGANIZATION OF THE BOOK
    2. USING THIS BOOK
    3. REFERENCES
  7. Chapter 1: The Promise and Perils of Wearable Technologies
    1. ABSTRACT
    2. INTRODUCTION
    3. THE WEARABLES SPACE
    4. ISSUES AND CONCERNS
    5. CONCLUSION
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
    8. ENDNOTES
  8. Chapter 2: The Risks of Wearable Technologies to Individuals and Organizations
    1. ABSTRACT
    2. PROMISES AND CHALLENGES OF WEARABLE TECHNOLOGIES TO INDIVIDUALS AND ORGANIZATIONS
    3. ATTACKS TARGETING WEARABLE TECHNOLOGIES
    4. SECURING WEARABLE TECHNOLOGIES
    5. SECURING DATA PRIVACY
    6. INVESTIGATING WEARABLE TECHNOLOGIES BASED INCIDENTS
    7. CASE STUDY
    8. TECHNIQUES FOR INDIVIDUAL SAFETY IN HAZARDOUS ENVIRONMENTS
    9. CONCLUSION
    10. PERSPECTIVES ON WEARABLE TECHNOLOGIES
    11. QUESTIONS
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  9. Chapter 3: Watch What You Wear
    1. ABSTRACT
    2. INTRODUCTION
    3. THE ROAD TO SMARTWATCHES (HISTORY)
    4. SMARTWATCH MARKET
    5. SMARTWATCH HARDWARE, OPERATING SYSTEMS, AND SOFTWARE
    6. SMARTWATCH USES
    7. SMALL FORM FACTOR SECURITY AND FORENSICS
    8. FUTURE RESEARCH DIRECTIONS
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
    12. ENDNOTES
  10. Chapter 4: Confidential Data Storage Systems for Wearable Platforms
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. STORAGE IN CONSUMER WEARABLE DEVICES
    5. CONFIDENTIAL DISK AND CLOUD STORAGE
    6. TWO-LAYER CONFIDENTIAL STORAGE SYSTEMS
    7. SOLUTIONS AND RECOMMENDATIONS
    8. FUTURE RESEARCH DIRECTIONS
    9. CONCLUSION
    10. DISCUSSION POINTS
    11. QUESTIONS
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  11. Chapter 5: Authenticity Challenges of Wearable Technologies
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. AUTHENTICITY ANALYSIS FRAMEWORK FOR WEARABLE DEVICES
    5. SOLUTIONS AND RECOMMENDATIONS
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. DISCUSSION POINTS
    9. QUESTIONS
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
    12. ENDNOTES
  12. Chapter 6: Privacy Dangers of Wearables and the Internet of Things
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. ISSUES, CONTROVERSIES, AND PROBLEMS
    5. ENTERPRISE SOLUTIONS TO PRIVACY CONCERNS
    6. FALLOUT FROM SECURITY BREACHES
    7. SOLUTIONS AND RECOMMENDATIONS
    8. DATA STORAGE
    9. FUTURE RESEARCH DIRECTIONS
    10. CONCLUSION
    11. DISCUSSION POINTS
    12. QUESTIONS
    13. REFERENCES
    14. ADDITIONAL READING
    15. KEY TERMS AND DEFINITIONS
    16. ENDNOTES
  13. Chapter 7: Security, Privacy, and Ownership Issues with the Use of Wearable Health Technologies
    1. ABSTRACT
    2. INTRODUCTION
    3. HISTORY OF WEARABLE TECHNOLOGY
    4. THE CURRENT SITUATION ACCORDING TO PUBLIC FORUMS
    5. SECURITY AND PRIVACY
    6. OWNERSHIP
    7. PROTECTING HEALTH DATA
    8. OPTING OUT AND DELETING THE DATA STORED ON THE CLOUD
    9. SOCIAL MEDIA AND THE WEARABLE TECHNOLOGY
    10. TRUST OF COMPASSION WITH THE ONLINE COMPANION
    11. TIME TO MARKET AND USER CONCERNS
    12. HEALTH APPLICATIONS AS AN EXAMPLE OF THE URGENT NEED FOR SECURITY IN COMMUNICATIONS
    13. HEALTHCARE INFORMATION TECHNOLOGY (HIT)
    14. EMPOWERING DATA USERS
    15. CONCLUSION
    16. DISCUSSION POINTS
    17. QUESTIONS
    18. REFERENCES
    19. KEY TERMS AND DEFINITIONS
  14. Chapter 8: Wearable Devices
    1. ABSTRACT
    2. INTRODUCTION
    3. THEORETICAL BACKGROUND
    4. ETHICAL CHALLENGES OF WEARABLE TECHNOLOGIES
    5. SOLUTIONS AND RECOMMENDATIONS
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. DISCUSSION POINTS
    9. QUESTIONS
    10. ACKNOWLEDGMENT
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  15. Chapter 9: What Can People Do with Your Spatial Data?
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND: WILLINGNESS TO DISCLOSE LOCATION INFORMATION
    4. OBSERVATIONAL STUDY OF LBS USERS: SUMMARY OF THEMATIC FINDINGS
    5. OBSERVATIONAL STUDY OF LBS USERS: SOCIO-ETHICAL FINDINGS AND SPATIAL SCENARIOS
    6. SOCIO-ETHICAL SCENARIOS
    7. SOLUTIONS AND RECOMMENDATIONS
    8. FUTURE RESEARCH DIRECTIONS
    9. CONCLUSION
    10. DISCUSSION POINTS
    11. QUESTIONS
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
    14. ENDNOTE
    15. APPENDIX: DISCUSSION PAPER
  16. Chapter 10: Societal Implications of Wearable Technology
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. TRIALABILITY ON THE RUN
    5. POSSIBLE FUTURE IMPLICATIONS DRAWN FROM SCENARIOS
    6. DISCUSSION POINTS
    7. QUESTIONS
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  17. Chapter 11: Model Course Syllabus
    1. ABSTRACT
    2. INTRODUCTION
    3. WEARABLE TECHNOLOGY AND ITS SECURITY AND PRIVACY RISKS
    4. MODELING THE COURSE SYLLABUS
    5. COURSE MAPPING
    6. RECOMMENDED ACTIVITIES
    7. EVALUATION CRITERIA
    8. CHALLENGES AND FUTURE DIRECTIONS TO MODIFY THE COURSE SYLLABUS
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
    11. APPENDIX: ACRONYMS
  18. Chapter 12: Conclusions
    1. ABSTRACT
    2. INTRODUCTION
    3. SUMMARY OF THE CHAPTERS AND THEIR CONTRIBUTION
    4. WHAT HAVE WE LEARNED?
    5. WHERE NEXT FOR WEARABLES?
    6. REFERENCES
  19. Compilation of References
  20. About the Contributors