Call for Paper

CAE solicits original research papers for the August 2021 Edition. Last date of manuscript submission is July 31, 2021.

Read More

Wearable Technology for Enhanced Security

Agbaje M. Olugbenga. Published in Security.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Agbaje M. Olugbenga
10.5120/cae2016652382

Agbaje M Olugbenga. Wearable Technology for Enhanced Security. Communications on Applied Electronics 5(10):7-12, September 2016. BibTeX

@article{10.5120/cae2016652382,
	author = {Agbaje M. Olugbenga},
	title = {Wearable Technology for Enhanced Security},
	journal = {Communications on Applied Electronics},
	issue_date = {September 2016},
	volume = {5},
	number = {10},
	month = {Sep},
	year = {2016},
	issn = {2394-4714},
	pages = {7-12},
	numpages = {6},
	url = {http://www.caeaccess.org/archives/volume5/number10/656-2016652382},
	doi = {10.5120/cae2016652382},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Wearable's comprise of sensors and have computational ability. Gadgets such as wristwatches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. Nigerian faced with several kidnapping in schools, homes and abduction for ransomed collection and other unlawful acts necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.

References

  1. Hadi, S., Emily M., & Nirusan, R. (2014).Wearable Tech: Leveraging Canadian Innovation to Improve Health, Pg 1-45.
  2. Lexinnova (2016).Wearable technology: patent landscape analysis, pg1-18.
  3. Janice, P., & Lin, G.(2015), Privacy, Security, and Wearable Technology, ABA Section of Intellectual Property Law, Published in Landslide, Volume 8, Number 2, ©2015 by the American Bar Association.pg1-8.
  4. Abowd, G. D. (2012). What next, ubicomp? : celebrating an intellectual disappearing act. Paper presented at the Proceedings of the 2012 ACM Conference on Ubiquitous Computing.
  5. Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3),94-104
  6. Andrew, S. (2014).Mind-blowing Uses of Wearable Technology.
  7. Krumm, J. (2009). Ubiquitous Computing Fundamentals, Taylor & Francis.
  8. Mann, S. (1999). Definition of a Wearable Computer. From http://wearcomp.org/wearcompdef.html
  9. Maidment, D. (2014). Advanced Architectures and Technologies for the Development of Wearable Devices
  10. Mehdi & Alharby(2016):.Purpose, Scope, and Technical Considerations of Wearable Technologies, Information Resources Management (IRM) proceedings,DOI: 10.4018/978-1-5225-0069-8.ch001
  11. PSFK (2016) .The Future of Wearable Tech: Key Trends Driving The Form And Function Of Personal Devices, www.psfk.com/future-of-wearable-tech /iq.intel.com/future-of-wearable-tech downloaded(13-4-16)
  12. Zalud, B. (2015). "The Age of Wearables Is on Us". SDM: 72–73.
  13. Eichorn, K. & Ross, E. ( 2014). "U.S. Consumers Predict Unprecedented Connectivity in 2025, but Security and Privacy Concerns Linger" – via ProQuest
  14. Duncan, S.(2009).The Rise of the Virtual Trainer . Product Design and Development
  15. Simon, J.(2013) In pro sports, wearabletech is already mainstream. Wearable Tech Watch.
  16. Martin K. Et al (2013). An ultra – lightweight design for imperceptible plastic electronics. Nature. doi 10.1038/nature 12314

Keywords

Computing, electronics,IoT, privacy , software, ubiquitous,wearable.