منوی کاربری
  • پشتیبانی: ۴۲۲۷۳۷۸۱ - ۰۴۱
  • سبد خرید

دانلود رایگان مقاله پوشیدنی ایمن: امنیت فیزیکی و اطلاعاتی در عصر دستگاه پوشیدنی

عنوان فارسی
پوشیدنی ایمن: امنیت فیزیکی و اطلاعاتی در عصر دستگاه پوشیدنی
عنوان انگلیسی
Wearing safe: Physical and informational security in the age of the wearable device
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
8
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E4740
رشته های مرتبط با این مقاله
مدیریت، مهندسی فناوری اطلاعات و مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
مخابرات سیار
مجله
افق های تجارت - Business Horizons
دانشگاه
دانشگاه لویولا نیواورلئان،امریکا
کلمات کلیدی
فناوری پوشیدنی؛ Wearables؛ امنیت اطلاعات؛ امنیت سایبری
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.

نتیجه گیری

4. Conclusion: Are wearables a real concern?


Many of the situations described above sound like the material of conspiracy stories and science fiction novels. Hacking into wearables to change the reading of the wearer’s vitals is the modus operandi of a James Bond villain rather than a target any black-hat hacker would really be interested in. But such is the world we live in today–—people often violate ‘‘computer security for little reason beyond maliciousness or for personal gain’’ (Moore, 2005, p. 258). Serious vulnerabilities in several models of drug infusion pumps in hospitals have already been discovered, which allow a hacker to secretly and remotely change the amount of drugs administered to a patient (Zetter, 2015). Doing so indirectly, via wearables, is the next logical step.


بدون دیدگاه