Security Challenges and Selected Legal Aspects for Wearable Computing

نویسندگان

  • John Lindström
  • Claas Hanken
چکیده

This paper discusses information security challenges encountered during the wearIT@work project and selected legal aspects of wearable computing. Wearable computing will offer interesting opportunities to improve and reengineer work processes in organizations, but can at the same introduce alignment problems as users in organizations may adopt the new technology before organizations are prepared. In addition, needed supportive legal frameworks have not yet fully addressed the new wearable computing technology. Different alignment concepts for how such challenges can be managed are discussed in the paper. DOI: 10.4018/jitr.2012010104 Journal of Information Technology Research, 5(1), 68-87, January-March 2012 69 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. powerful computers, greater personal mobility and increasing personalization of devices. Closely related to each other are ubiquitous computing, which is introduced by Weiser (1991), and pervasive computing, which refers to the vision where computers are integrated in the environment and the usage is completely transparent to the user. Wearable computing may thus fall under the category of pervasive computing. Lyytinen and Yoo (2002) argue that pervasive computing services require more effort regarding design and maintenance compared to ubiquitous ones, making the availability and usefulness of pervasive computing services limited. However, we think that the recent advances within context awareness-, localization-, and cloud services make this previous gap small today. Wearable computing is also introduced by the wearIT@work project2 as follows: “Wearable mobile computing can empower professionals to higher levels of productivity by providing more seamless and effective forms of access to knowledge at the point of work, collaboration and communication. The new technology of wearable mobile computing will meet the need of many individual professionals for acting more flexibly, effectively and efficiently in the increasingly complicated and challenging European work environment. It can be used to enhance jobs in industry and services to make them both more rewarding and effective and re-elevate the role of the professional at work...” As wearable computers and systems for different business mature, they can be used in a lot of work areas where there is at present very little or no IT-support. Wearable computers will most likely be used more and more, not only at work but also during leisure time. This is due to the fact that wearables, being very small, integrated into clothing and able to interact intelligently with the surrounding environment as well as detect other computing devices (Lyytinen & Yoo, 2002), will be brought almost everywhere. This exposure to a variety of unsecure or hostile network environments will require a higher level of information security to protect personal integrity and privacy, confidential information and communications. At the same time, the legal frameworks need to adapt to the use of wearables, as they put new requirements on the protection of personal integrity and privacy as well as information security. However, one of the problems with legal frameworks and IT is that the pace of development of IT is so fast that the adaption and development of the legal frameworks is almost always a couple of years or more behind, often forcing the frameworks to be very general.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Security challenges for wearable computing a case study

This paper discusses ITand information security challenges for wearable computing encountered during the WearIT@work project. The following novel ideas are introduced in this paper: authorization by proximity using dynamic context information to enable transfer of authorization from one party to another, a wearable pairing mechanism to use devices on other wearables, and a more intelligent mana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JITR

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012