Conclusions: Where Next for Wearables?

Conclusions: Where Next for Wearables?

ISBN13: 9781522510161|ISBN10: 1522510168|EISBN13: 9781522510178
DOI: 10.4018/978-1-5225-1016-1.ch012
Cite Chapter Cite Chapter

MLA

Kerr, Don, and John Gammack. "Conclusions: Where Next for Wearables?." Managing Security Issues and the Hidden Dangers of Wearable Technologies, edited by Andrew Marrington, et al., IGI Global, 2017, pp. 289-299. https://doi.org/10.4018/978-1-5225-1016-1.ch012

APA

Kerr, D. & Gammack, J. (2017). Conclusions: Where Next for Wearables?. In A. Marrington, D. Kerr, & J. Gammack (Eds.), Managing Security Issues and the Hidden Dangers of Wearable Technologies (pp. 289-299). IGI Global. https://doi.org/10.4018/978-1-5225-1016-1.ch012

Chicago

Kerr, Don, and John Gammack. "Conclusions: Where Next for Wearables?." In Managing Security Issues and the Hidden Dangers of Wearable Technologies, edited by Andrew Marrington, Don Kerr, and John Gammack, 289-299. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1016-1.ch012

Export Reference

Mendeley
Favorite

Abstract

This chapter provides a contemporary example of how data from wearable devices can be used for “big data” type research. It then asked the question of data policies for the use of data generated by wearable devices. This is followed by an overview of the chapters in the book and how they fit within the general theme of the book. In addition, each chapter is categorised into whether it is social research or more technical type research. The chapter also includes concluding suggestions on the possible future research agenda for privacy and security within the subject domain of the use of wearables. In addition, insights into the future of wearables in relation to ethical considerations, privacy, security and data ownership is also given.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.