Victorian Institute: Wearable Device Security Report

Verified

Added on  2022/08/24

|4
|460
|21
Report
AI Summary
This report examines the emerging field of wearable computing devices, highlighting their increasing adoption and the associated security and privacy challenges. It delves into the vulnerabilities of data transfer from IoT devices to master systems, emphasizing potential cyber-security threats. The research addresses critical questions regarding data privacy, ethical considerations, and safety measures for secure data sharing within organizations. The report explores challenges such as security loopholes, data privacy regulations, and the impact of wearable technology on user involvement. The study also covers the ethical implications of IoT wearable devices and proposes strategies to protect data from cybercrime, providing valuable insights into the development of secure and private wearable technologies. The report also includes an abstract, research questions and references.
Document Page
Running Head: Advance Research Topic
ADVANCE RESEARCH TOPIC
Name of the Student
Name of the University
Authors Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1Advance Research Topic
Abstract
The wearable computing device is swiftly emerging and reaching out to people as a wide-
context technology device worldwide. These wearable devices are innovative, small captive
device with a sensor that enables in collecting information from the surrounding then process it
and then transfer it to a distant location for farther evaluation (Revadigar et al. 2016). This IoT
enhances the possibilities of new development of the social network into another level of the
internet of things. The wearable Internet of Thing device having minimal processing capability,
which enhances the user to access the ease of sharing information from to master device by
pairing it like a smartwatch, Google Glass, and many more (Yang et al. 2017). The paper throws
the light on the various types of security and its loopholes of internet of thing wearable devices
which needs immediate attention and also discussing the regulations and policies and particular
challenges concerning data privacy. The influence of such IoT wearable technology has become
crucial when the involvement of people is enhanced in such wearable computing devices.
Though such wearable technology is not developed in terms of the security of the device and the
privacy undertakings of the public (Shah, 2019). Transferring data from the IoT device to the
master system is very sensitive and might face specific cyber-security challenges.
Research Question
What are the challenges of data privacy and security faced by an organization while
sharing data and connecting to other device?
What type of ethical issues might arise from Internet of Thing wearable device in
organization?
Document Page
2Advance Research Topic
What safety measures are taken for secure data transferring and sharing to protect data
from cyber-crime?
Document Page
3Advance Research Topic
Reference
Revadigar, G., Javali, C., Xu, W., Hu, W., & Jha, S. (2016, March). Secure key generation and
distribution protocol for wearable devices. In 2016 IEEE International Conference on
Pervasive Computing and Communication Workshops (PerCom Workshops) (pp. 1-4).
IEEE.
Shah, K. T. (2019). Privacy and Security Issues of Wearables in Healthcare (Doctoral
dissertation, Flinders University, College of Science and Engineering.).
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in
Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]