EconPapers    
Economics at your fingertips  
 

Wearing safe: Physical and informational security in the age of the wearable device

Adam J. Mills, Richard T. Watson, Leyland Pitt and Jan Kietzmann

Business Horizons, 2016, vol. 59, issue 6, 615-622

Abstract: Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.

Keywords: Wearable technology; Wearables; Information security; Cybersecurity (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (4)

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0007681316300805
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:bushor:v:59:y:2016:i:6:p:615-622

DOI: 10.1016/j.bushor.2016.08.003

Access Statistics for this article

Business Horizons is currently edited by C. M. Dalton

More articles in Business Horizons from Elsevier
Bibliographic data for series maintained by Catherine Liu ().

 
Page updated 2025-03-19
Handle: RePEc:eee:bushor:v:59:y:2016:i:6:p:615-622