Authenticity Challenges of Wearable Technologies

Authenticity Challenges of Wearable Technologies

Filipe da Costa, Filipe de Sá-Soares
ISBN13: 9781522510161|ISBN10: 1522510168|EISBN13: 9781522510178
DOI: 10.4018/978-1-5225-1016-1.ch005
Cite Chapter Cite Chapter

MLA

da Costa, Filipe, and Filipe de Sá-Soares. "Authenticity Challenges of Wearable Technologies." Managing Security Issues and the Hidden Dangers of Wearable Technologies, edited by Andrew Marrington, et al., IGI Global, 2017, pp. 98-130. https://doi.org/10.4018/978-1-5225-1016-1.ch005

APA

da Costa, F. & de Sá-Soares, F. (2017). Authenticity Challenges of Wearable Technologies. In A. Marrington, D. Kerr, & J. Gammack (Eds.), Managing Security Issues and the Hidden Dangers of Wearable Technologies (pp. 98-130). IGI Global. https://doi.org/10.4018/978-1-5225-1016-1.ch005

Chicago

da Costa, Filipe, and Filipe de Sá-Soares. "Authenticity Challenges of Wearable Technologies." In Managing Security Issues and the Hidden Dangers of Wearable Technologies, edited by Andrew Marrington, Don Kerr, and John Gammack, 98-130. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1016-1.ch005

Export Reference

Mendeley
Favorite

Abstract

In this chapter the security challenges raised by wearable technologies concerning the authenticity of information and subjects are discussed. Following a conceptualization of the capabilities of wearable technology, an authenticity analysis framework for wearable devices is presented. This framework includes graphic classification classes of authenticity risks in wearable devices that are expected to improve the awareness of users on the risks of using those devices, so that they can moderate their behaviors and take into account the inclusion of controls aimed to protect authenticity. Building on the results of the application of the framework to a list of wearable devices, a solution is presented to mitigate the risk for authenticity based on digital signatures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.