دانلود رایگان مقاله لاتین امنیت فیزیک دستگاه پوشیدنی از سایت الزویر


عنوان فارسی مقاله:

پوشیدنی ایمن: امنیت فیزیکی و اطلاعاتی در عصر دستگاه پوشیدنی


عنوان انگلیسی مقاله:

Wearing safe: Physical and informational security in the age of the wearable device


سال انتشار : 2016



برای دانلود رایگان مقاله امنیت فیزیک دستگاه پوشیدنی اینجا کلیک نمایید.





بخشی از مقاله انگلیسی:


2. Why wearable device security is 

different While security is obviously important to all information systems, in the case of wearable devices the nature of the security challenge is sufficiently different and warrants special attention. First, wearables are by far the most personal computing devices. While the settings might be slightly different, it is easy for one person to use the desktop or laptop computer of another. Indeed, it turned out that the personal computer wasn’t nearly as personal as other devices. While mobile phones, for instance, are a lot more customized to the individual, itisstill relatively easy for one person to use the smartphone or tablet of another. However, most wearables are, or will be, unique (e.g., Watson, Pitt, Berthon, & Zinkhan, 2002, 2004) to the wearer. They are close and personal, intimate devices that will fit the particular wearer’s anatomy. These devices monitor, control, and in many cases optimize tasks ideally and only for that individual. They become part of the anatomy, as in the case of the diabetic contact lenses, or robotic arms that afford the wearer far greater lifting strength. Second, because people will wear these devices, fashion becomes very important. One of the major criticisms of Google’s Glass spectacles was that they made wearers look like geeks and behave like ‘glassholes.’ Fashion comes at a price, however. Expensive wearables that are worn visibly might represent attractive targets for thieves. For example, the Brikk’s Lux Watch Omni costs $114,995. It is an 18-karat gold Apple Watch with multiple rows of 11.30-carat diamonds around the face, buttons, and strap clasps. Third, wearables are the first category of IT devices where there is not only danger to data, but also the real potential to cause physical harm to the wearer. Hacking a person’s PC or laptop, or their smartphone, might enable a wrongdoer to steal data, or in some way impede the device’s ability to function. However, it is unlikely that this could result in physical injury to the owner. Mischievous or malicious hacking of a wearable device can have consequencesthat might vary from annoying to severe. A smart watch might be programmed to emit a series of irritating but meaningless pulses for no reason at all. Hacking a diabetic’s smart contact lenses to give erroneous readings could cause the wearer to either not receive warning signals or to overreact to exaggerated readings of glucose levels. This might not only have serious consequences, but it could also prove fatal. In the following section we suggest two frameworks that IS decision makers can use to consider the issues surrounding wearable device security. 3. Wearable device security: Questions and frameworks The unique nature of wearables and the implications this has forsecurity discussed above require that the manager consider three distinct, but related sets of issues. The first question pertains to who or what is threatened: The wearer or the wearable? This question is addressed by means of the 4D grid discussed below. The second question considers whether the wearable device focuses on the wearer’s physical or mental capacities, and specifically what abilities of the wearer the device enhances. Managers and security professionals can explore the different roles that wearables can play, and how wearable technology security can be breached by using the 4M matrix, introduced later. The third question concerns how managers can develop a security strategy to address the potential vulnerabilities of wearables. We suggest the McCumber cube as a suitable device for achieving this.



برای دانلود رایگان مقاله امنیت فیزیک دستگاه پوشیدنی اینجا کلیک نمایید.






کلمات کلیدی:

Wearing Safe: Physical and Informational Security in the Age of the ... fernfortuniversity.com/hbr/case.../19369-wearing-safe--physical-and-informa.php Custom Wearing Safe: Physical and Informational Security in the Age of the Wearable Device Harvard Business (HBR) Case Study Analysis & Solution for $11. Physical and informational security in the age of the ... - Academia.edu www.academia.edu/.../Wearing_safe_Physical_and_informational_security_in_the_ag... Business Horizons (2016) 59, 615—622 Available online at www.sciencedirect.com ScienceDirect www.elsevier.com/locate/bushor Wearing safe: Physical and ... Searches related to Physical and informational security physical security examples types of physical security threats what is physical security and why is it important physical security measures for computers importance of physical security to an organization physical security threats and vulnerabilities what are the primary threats to physical security types of physical security controls