CFP last date
01 April 2024
Reseach Article

Wearable Technology for Enhanced Security

by Agbaje M. Olugbenga
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 10
Year of Publication: 2016
Authors: Agbaje M. Olugbenga
10.5120/cae2016652382

Agbaje M. Olugbenga . Wearable Technology for Enhanced Security. Communications on Applied Electronics. 5, 10 ( Sep 2016), 7-12. DOI=10.5120/cae2016652382

@article{ 10.5120/cae2016652382,
author = { Agbaje M. Olugbenga },
title = { Wearable Technology for Enhanced Security },
journal = { Communications on Applied Electronics },
issue_date = { Sep 2016 },
volume = { 5 },
number = { 10 },
month = { Sep },
year = { 2016 },
issn = { 2394-4714 },
pages = { 7-12 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume5/number10/656-2016652382/ },
doi = { 10.5120/cae2016652382 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:55:49.242125+05:30
%A Agbaje M. Olugbenga
%T Wearable Technology for Enhanced Security
%J Communications on Applied Electronics
%@ 2394-4714
%V 5
%N 10
%P 7-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wearable's comprise of sensors and have computational ability. Gadgets such as wristwatches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. Nigerian faced with several kidnapping in schools, homes and abduction for ransomed collection and other unlawful acts necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.

References
  1. Hadi, S., Emily M., & Nirusan, R. (2014).Wearable Tech: Leveraging Canadian Innovation to Improve Health, Pg 1-45.
  2. Lexinnova (2016).Wearable technology: patent landscape analysis, pg1-18.
  3. Janice, P., & Lin, G.(2015), Privacy, Security, and Wearable Technology, ABA Section of Intellectual Property Law, Published in Landslide, Volume 8, Number 2, ©2015 by the American Bar Association.pg1-8.
  4. Abowd, G. D. (2012). What next, ubicomp? : celebrating an intellectual disappearing act. Paper presented at the Proceedings of the 2012 ACM Conference on Ubiquitous Computing.
  5. Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3),94-104
  6. Andrew, S. (2014).Mind-blowing Uses of Wearable Technology.
  7. Krumm, J. (2009). Ubiquitous Computing Fundamentals, Taylor & Francis.
  8. Mann, S. (1999). Definition of a Wearable Computer. From http://wearcomp.org/wearcompdef.html
  9. Maidment, D. (2014). Advanced Architectures and Technologies for the Development of Wearable Devices
  10. Mehdi & Alharby(2016):.Purpose, Scope, and Technical Considerations of Wearable Technologies, Information Resources Management (IRM) proceedings,DOI: 10.4018/978-1-5225-0069-8.ch001
  11. PSFK (2016) .The Future of Wearable Tech: Key Trends Driving The Form And Function Of Personal Devices, www.psfk.com/future-of-wearable-tech /iq.intel.com/future-of-wearable-tech downloaded(13-4-16)
  12. Zalud, B. (2015). "The Age of Wearables Is on Us". SDM: 72–73.
  13. Eichorn, K. & Ross, E. ( 2014). "U.S. Consumers Predict Unprecedented Connectivity in 2025, but Security and Privacy Concerns Linger" – via ProQuest
  14. Duncan, S.(2009).The Rise of the Virtual Trainer . Product Design and Development
  15. Simon, J.(2013) In pro sports, wearabletech is already mainstream. Wearable Tech Watch.
  16. Martin K. Et al (2013). An ultra – lightweight design for imperceptible plastic electronics. Nature. doi 10.1038/nature 12314
Index Terms

Computer Science
Information Sciences

Keywords

Computing electronics IoT privacy software ubiquitous wearable.