Wearing safe: Physical and informational security in the age of the wearable device
Adam J. Mills,
Richard T. Watson,
Leyland Pitt and
Jan Kietzmann
Business Horizons, 2016, vol. 59, issue 6, 615-622
Abstract:
Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.
Keywords: Wearable technology; Wearables; Information security; Cybersecurity (search for similar items in EconPapers)
Date: 2016
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (4)
Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0007681316300805
Full text for ScienceDirect subscribers only
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eee:bushor:v:59:y:2016:i:6:p:615-622
DOI: 10.1016/j.bushor.2016.08.003
Access Statistics for this article
Business Horizons is currently edited by C. M. Dalton
More articles in Business Horizons from Elsevier
Bibliographic data for series maintained by Catherine Liu ().