Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
5108907 | Business Horizons | 2016 | 8 Pages |
Abstract
Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.
Related Topics
Social Sciences and Humanities
Business, Management and Accounting
Business and International Management
Authors
Adam J. Mills, Richard T. Watson, Leyland Pitt, Jan Kietzmann,