Call for Paper
CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.
Wearable Technology for Enhanced Security
Agbaje M Olugbenga. Wearable Technology for Enhanced Security. Communications on Applied Electronics 5(10):7-12, September 2016. BibTeX
@article{10.5120/cae2016652382, author = {Agbaje M. Olugbenga}, title = {Wearable Technology for Enhanced Security}, journal = {Communications on Applied Electronics}, issue_date = {September 2016}, volume = {5}, number = {10}, month = {Sep}, year = {2016}, issn = {2394-4714}, pages = {7-12}, numpages = {6}, url = {http://www.caeaccess.org/archives/volume5/number10/656-2016652382}, doi = {10.5120/cae2016652382}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Wearable's comprise of sensors and have computational ability. Gadgets such as wristwatches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. Nigerian faced with several kidnapping in schools, homes and abduction for ransomed collection and other unlawful acts necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
References
- Hadi, S., Emily M., & Nirusan, R. (2014).Wearable Tech: Leveraging Canadian Innovation to Improve Health, Pg 1-45.
- Lexinnova (2016).Wearable technology: patent landscape analysis, pg1-18.
- Janice, P., & Lin, G.(2015), Privacy, Security, and Wearable Technology, ABA Section of Intellectual Property Law, Published in Landslide, Volume 8, Number 2, ©2015 by the American Bar Association.pg1-8.
- Abowd, G. D. (2012). What next, ubicomp? : celebrating an intellectual disappearing act. Paper presented at the Proceedings of the 2012 ACM Conference on Ubiquitous Computing.
- Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3),94-104
- Andrew, S. (2014).Mind-blowing Uses of Wearable Technology.
- Krumm, J. (2009). Ubiquitous Computing Fundamentals, Taylor & Francis.
- Mann, S. (1999). Definition of a Wearable Computer. From http://wearcomp.org/wearcompdef.html
- Maidment, D. (2014). Advanced Architectures and Technologies for the Development of Wearable Devices
- Mehdi & Alharby(2016):.Purpose, Scope, and Technical Considerations of Wearable Technologies, Information Resources Management (IRM) proceedings,DOI: 10.4018/978-1-5225-0069-8.ch001
- PSFK (2016) .The Future of Wearable Tech: Key Trends Driving The Form And Function Of Personal Devices, www.psfk.com/future-of-wearable-tech /iq.intel.com/future-of-wearable-tech downloaded(13-4-16)
- Zalud, B. (2015). "The Age of Wearables Is on Us". SDM: 72–73.
- Eichorn, K. & Ross, E. ( 2014). "U.S. Consumers Predict Unprecedented Connectivity in 2025, but Security and Privacy Concerns Linger" – via ProQuest
- Duncan, S.(2009).The Rise of the Virtual Trainer . Product Design and Development
- Simon, J.(2013) In pro sports, wearabletech is already mainstream. Wearable Tech Watch.
- Martin K. Et al (2013). An ultra – lightweight design for imperceptible plastic electronics. Nature. doi 10.1038/nature 12314
Keywords
Computing, electronics,IoT, privacy , software, ubiquitous,wearable.