Managing security issues and the hidden dangers of wearable technologies / Andrew Marrington, Don Kerr, and John Gammack, editors.
"Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well.Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the...
Saved in:
Other Authors: | , , |
---|---|
Format: | Ebook |
Language: | English |
Published: |
Hershey, PA :
Information Science Reference,
[2017]
|
Subjects: | |
Online Access: | IGI Global e-Book Collection |
MARC
LEADER | 00000czm a22000004i 4500 | ||
---|---|---|---|
003 | OCoLC | ||
005 | 20230907150743.0 | ||
007 | cr mn|||||n||| | ||
008 | 160725s2016 pau ob 001 0 eng d | ||
010 | |z 2016033132 | ||
011 | |a BIB MATCHES WORLDCAT | ||
011 | |a Direct Search Result | ||
011 | |a EDS Title: Managing Security Issues and the Hidden Dangers of Wearable Technologies | ||
011 | |a Has 16 WorldCat Holdings | ||
011 | |a MARC Score : 10300(20450) : OK | ||
020 | |a 1522510176 |q Internet | ||
020 | |a 1522510184 |q Internet | ||
020 | |a 9781522510178 |q Internet | ||
020 | |a 9781522510185 |q Internet | ||
020 | |z 1522510168 |q hardcover | ||
020 | |z 1522510176 |q Internet | ||
020 | |z 9781522510161 |q hardcover | ||
020 | |z 9781522510178 |q Internet | ||
035 | |a (ATU)b18911833 | ||
035 | |a (EDS)EDS11517649 | ||
035 | |a (OCoLC)958002818 | ||
040 | |a DLC |b eng |e rda |c DLC |d YDXCP |d OCLCO |d BTCTA |d ATU | ||
042 | |a pcc | ||
050 | 0 | 0 | |a QA76.592 |b .M36 2017 |
082 | 0 | 0 | |a 004.167 |2 23 |
245 | 0 | 0 | |a Managing security issues and the hidden dangers of wearable technologies / |c Andrew Marrington, Don Kerr, and John Gammack, editors. |
264 | 1 | |a Hershey, PA : |b Information Science Reference, |c [2017] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |g 1. |t The Promise and Perils of Wearable Technologies / |r John Gammack, Andrew Marrington -- |g 2. |t The Risks of Wearable Technologies to Individuals and Organizations / |r Sarra Berrahal, Nourredine Boudriga -- |g 3. |t Watch What You Wear: Smartwatches and Sluggish Security / |r Joseph Ricci, Ibrahim Baggili, Frank Breitinger -- |g 4. |t Confidential Data Storage Systems for Wearable Platforms / |r Mingzhong Wang, Don Kerr -- |g 5. |t Authenticity Challenges of Wearable Technologies / |r Filipe da Costa, Filipe de Sá-Soares -- |g 6. |t Privacy Dangers of Wearables and the Internet of Things / |r Scott Amyx -- |g 7. |t Security, Privacy, and Ownership Issues with the Use of Wearable Health Technologies / |r Don Kerr, Kerryn Butler-Henderson, Tony Sahama -- |g 8. |t Wearable Devices: Ethical Challenges and Solutions / |r Marc L. Resnick, Alina M. Chircu -- |g 9. |t What Can People Do with Your Spatial Data?: Socio-Ethical Scenarios / |r Roba Abbas, Katina Michael, M. G. Michael -- |g 10. |t Societal Implications of Wearable Technology: Interpreting “Trialability on the Run” / |r Katina Michael, Deniz Gokyer, Samer Abbas -- |g 11. |t Model Course Syllabus: Management of Security Issues in Wearable Technology / |r Michelle C. Antero -- |g 12. |t Conclusions: Where Next for Wearables? / |r Don Kerr, John Gammack. |
520 | |a "Advances in mobile computing have provided numerous innovations that make people’s daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks increase as well.Managing Security Issues and the Hidden Dangers of Wearable Technologies examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations. Highlighting socio-ethical issues, policy implementation, and appropriate usage, this book is a pivotal reference source for professionals, policy makers, academics, managers, and students interested in the security and privacy implications of wearable digital devices."--Publisher's website. | ||
538 | |a Mode of access: World Wide Web. | ||
650 | 0 | |a Wearable technology |x Risk assessment |9 808521 | |
650 | 0 | |a Wearable technology |x Security measures |9 812400 | |
650 | 0 | |a Wearable technology |x Social aspects |9 639891 | |
700 | 1 | |a Gammack, John, |d 1960- |e editor. |9 432569 | |
700 | 1 | |a Kerr, Don, |d 1952- |e editor. |9 450140 | |
700 | 1 | |a Marrington, Andrew, |d 1982- |e editor. |9 432567 | |
856 | 4 | 0 | |u https://ezproxy.aut.ac.nz/login?url=https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-1016-1 |z IGI Global e-Book Collection |x TEMPORARY ERM URL |
907 | |a .b18911833 |b 01-09-21 |c 06-09-16 | ||
942 | |c EB | ||
998 | |a none |b 06-09-16 |c m |d z |e - |f eng |g pau |h 0 | ||
999 | |c 1361791 |d 1361791 |