IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Watch What You Wear: Smartwatches and Sluggish Security

Watch What You Wear: Smartwatches and Sluggish Security
View Sample PDF
Author(s): Joseph Ricci (University of New Haven, USA), Ibrahim Baggili (University of New Haven, USA) and Frank Breitinger (University of New Haven, USA)
Copyright: 2018
Pages: 21
Source title: Wearable Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-5484-4.ch067

Purchase

View Watch What You Wear: Smartwatches and Sluggish Security on the publisher's website for pricing and purchasing information.

Abstract

There is no doubt that the form factor of devices continues to shrink as evidenced by smartphones and most recently smartwatches. The adoption rate of small computing devices is staggering and needs stronger attention from the cybersecurity and digital forensics communities. In this chapter, we dissect smartwatches. We first present a historical roadmap of smartwatches. We then explore the smartwatch marketplace and outline existing smartwatch hardware, operating systems and software. Next we elaborate on the uses of smartwatches and then discuss the security and forensic implications of smartwatches by reviewing the relevant literature. Lastly, we outline future research directions in smartwatch security and forensics.

Related Content

Mehtab Mehdi, Abdulrahman Alharby. © 2018. 19 pages.
Byron Havard, Megan Podsiad. © 2018. 10 pages.
Mike S. Butler, Paul E. Luebbers. © 2018. 21 pages.
John Gammack, Andrew Marrington. © 2018. 13 pages.
Mingzhong Wang, Don Kerr. © 2018. 19 pages.
Michelle C. Antero. © 2018. 17 pages.
Bradley S. Barker, Gwen Nugent, Neal Grandgenett, Jennifer Keshwani, Carl A. Nelson, Ben Leduc-Mills. © 2018. 27 pages.
Body Bottom