IDEAS home Printed from https://ideas.repec.org/a/eee/bushor/v59y2016i6p615-622.html
   My bibliography  Save this article

Wearing safe: Physical and informational security in the age of the wearable device

Author

Listed:
  • Mills, Adam J.
  • Watson, Richard T.
  • Pitt, Leyland
  • Kietzmann, Jan

Abstract

Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.

Suggested Citation

  • Mills, Adam J. & Watson, Richard T. & Pitt, Leyland & Kietzmann, Jan, 2016. "Wearing safe: Physical and informational security in the age of the wearable device," Business Horizons, Elsevier, vol. 59(6), pages 615-622.
  • Handle: RePEc:eee:bushor:v:59:y:2016:i:6:p:615-622
    DOI: 10.1016/j.bushor.2016.08.003
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0007681316300805
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.bushor.2016.08.003?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Watson, Richard T. & Berthon, Pierre & Pitt, Leyland F. & Zinkhan, George M., 2004. "Marketing in the age of the network: From marketplace to U-space," Business Horizons, Elsevier, vol. 47(6), pages 33-40.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Lord Ferguson, Sarah & Smith, Claudia & Kietzmann, Jan, 2022. "Hands-off? Lessons from high-touch professionals about going virtual," Business Horizons, Elsevier, vol. 65(3), pages 303-313.
    2. Maltseva, Kateryna, 2020. "Wearables in the workplace: The brave new world of employee engagement," Business Horizons, Elsevier, vol. 63(4), pages 493-505.
    3. Luis Hernández-Álvarez & Juan José Bullón Pérez & Farrah Kristel Batista & Araceli Queiruga-Dios, 2022. "Security Threats and Cryptographic Protocols for Medical Wearables," Mathematics, MDPI, vol. 10(6), pages 1-17, March.
    4. Lee, In, 2021. "Cybersecurity: Risk management framework and investment cost analysis," Business Horizons, Elsevier, vol. 64(5), pages 659-671.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Grenci, Richard T. & Watts, Charles A., 2007. "Maximizing customer value via mass customized e-consumer services," Business Horizons, Elsevier, vol. 50(2), pages 123-132.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:bushor:v:59:y:2016:i:6:p:615-622. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/bushor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.