دانلود رایگان مقاله امنیت فیزیکی و اطلاعات در عصر دستگاه پوشیدنی

عنوان فارسی
پوشیدن امن: امنیت فیزیکی و اطلاعات در عصر دستگاه پوشیدنی
عنوان انگلیسی
Wearing safe: Physical and informational security in the age of the wearable device
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
8
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E2518
رشته های مرتبط با این مقاله
مهندسی کامپیوتر و مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
امنیت اطلاعات
مجله
افق کسب و کار - Business Horizons
دانشگاه
دانشگاه لویولا نیواورلئان، امریکا
کلمات کلیدی
فن آوری های پوشیدنی، پوشیدنی، امنیت اطلاعات، امنیت سایبری
چکیده

Abstract


Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.

نتیجه گیری

4. Conclusion


Are wearables a real concern? Many of the situations described above sound like the material of conspiracy stories and science fiction novels. Hacking into wearables to change the reading of the wearer’s vitals is the modus operandi of a James Bond villain rather than a target any black-hat hacker would really be interested in. But such is the world we live in today–—people often violate ‘‘computer security for little reason beyond maliciousness or for personal gain’’ (Moore, 2005, p. 258). Serious vulnerabilities in several models of drug infusion pumps in hospitals have already been discovered, which allow a hacker to secretly and remotely change the amount of drugs administered to a patient (Zetter, 2015). Doing so indirectly, via wearables, is the next logical step.


بدون دیدگاه