Managing security issues and the hidden dangers of wearable technologies / Andrew Marrington, Don Kerr, and John Gammack, editors.

"Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well.Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the...

Full description

Saved in:
Bibliographic Details
Other Authors: Gammack, John, 1960- (Editor), Kerr, Don, 1952- (Editor), Marrington, Andrew, 1982- (Editor)
Format: Ebook
Language:English
Published: Hershey, PA : Information Science Reference, [2017]
Subjects:
Online Access:IGI Global e-Book Collection

MARC

LEADER 00000czm a22000004i 4500
003 OCoLC
005 20230907150743.0
007 cr mn|||||n|||
008 160725s2016 pau ob 001 0 eng d
010 |z  2016033132 
011 |a BIB MATCHES WORLDCAT 
011 |a Direct Search Result 
011 |a EDS Title: Managing Security Issues and the Hidden Dangers of Wearable Technologies 
011 |a Has 16 WorldCat Holdings 
011 |a MARC Score : 10300(20450) : OK 
020 |a 1522510176  |q Internet 
020 |a 1522510184  |q Internet 
020 |a 9781522510178  |q Internet 
020 |a 9781522510185  |q Internet 
020 |z 1522510168  |q hardcover 
020 |z 1522510176  |q Internet 
020 |z 9781522510161  |q hardcover 
020 |z 9781522510178  |q Internet 
035 |a (ATU)b18911833 
035 |a (EDS)EDS11517649 
035 |a (OCoLC)958002818 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDXCP  |d OCLCO  |d BTCTA  |d ATU 
042 |a pcc 
050 0 0 |a QA76.592  |b .M36 2017 
082 0 0 |a 004.167  |2 23 
245 0 0 |a Managing security issues and the hidden dangers of wearable technologies /  |c Andrew Marrington, Don Kerr, and John Gammack, editors. 
264 1 |a Hershey, PA :  |b Information Science Reference,  |c [2017] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 0 |g 1.  |t The Promise and Perils of Wearable Technologies /  |r John Gammack, Andrew Marrington --  |g 2.  |t The Risks of Wearable Technologies to Individuals and Organizations /  |r Sarra Berrahal, Nourredine Boudriga --  |g 3.  |t Watch What You Wear: Smartwatches and Sluggish Security /  |r Joseph Ricci, Ibrahim Baggili, Frank Breitinger --  |g 4.  |t Confidential Data Storage Systems for Wearable Platforms /  |r Mingzhong Wang, Don Kerr --  |g 5.  |t Authenticity Challenges of Wearable Technologies /  |r Filipe da Costa, Filipe de Sá-Soares --  |g 6.  |t Privacy Dangers of Wearables and the Internet of Things /  |r Scott Amyx --  |g 7.  |t Security, Privacy, and Ownership Issues with the Use of Wearable Health Technologies /  |r Don Kerr, Kerryn Butler-Henderson, Tony Sahama --  |g 8.  |t Wearable Devices: Ethical Challenges and Solutions /  |r Marc L. Resnick, Alina M. Chircu --  |g 9.  |t What Can People Do with Your Spatial Data?: Socio-Ethical Scenarios /  |r Roba Abbas, Katina Michael, M. G. Michael --  |g 10.  |t Societal Implications of Wearable Technology: Interpreting “Trialability on the Run” /  |r Katina Michael, Deniz Gokyer, Samer Abbas --  |g 11.  |t Model Course Syllabus: Management of Security Issues in Wearable Technology /  |r Michelle C. Antero --  |g 12.  |t Conclusions: Where Next for Wearables? /  |r Don Kerr, John Gammack. 
520 |a "Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well.Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices."--Publisher's website. 
538 |a Mode of access: World Wide Web. 
650 0 |a Wearable technology  |x Risk assessment  |9 808521 
650 0 |a Wearable technology  |x Security measures  |9 812400 
650 0 |a Wearable technology  |x Social aspects  |9 639891 
700 1 |a Gammack, John,  |d 1960-  |e editor.  |9 432569 
700 1 |a Kerr, Don,  |d 1952-  |e editor.  |9 450140 
700 1 |a Marrington, Andrew,  |d 1982-  |e editor.  |9 432567 
856 4 0 |u https://ezproxy.aut.ac.nz/login?url=https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1016-1  |z IGI Global e-Book Collection  |x TEMPORARY ERM URL 
907 |a .b18911833  |b 01-09-21  |c 06-09-16 
942 |c EB 
998 |a none  |b 06-09-16  |c m  |d z   |e -  |f eng  |g pau  |h 0 
999 |c 1361791  |d 1361791 
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.