Managing security issues and the hidden dangers of wearable technologies
"This book examines the positive and negative ramifications of emerging wearable devices and their potential threats to individuals, as well as organizations, highlighting socio-ethical issues, policy implementation, and appropriate usage"--Provided by publisher
Saved in:
| Other Authors: | Marrington, Andrew 1982- (Editor), Kerr, Don 1952- (Editor), Gammack, John 1960- (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2017]
|
| Series: | Advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.592 .M363 2017 |
Similar Items
Intelligent wearable interfaces
by: Xu
Published: (2008)
by: Xu
Published: (2008)
Designing and developing for Google Glass thinking differently for a new platform
by: Firstenberg, Allen, et al.
Published: (2015)
by: Firstenberg, Allen, et al.
Published: (2015)
Technical risk management
by: Michaels
Published: (1996)
by: Michaels
Published: (1996)
Risk analysis in engineering and economics
by: Ayyub, Bilal M.
Published: (2014)
by: Ayyub, Bilal M.
Published: (2014)
Assessment of health care technologies case studies, key concepts and strategic issues
Published: (1996)
Published: (1996)
Social Issues in Technology A format for Investigation
by: Alcorn lhPaul A.
by: Alcorn lhPaul A.
Risk modeling,assessment and management
by: Haimes
Published: (1998)
by: Haimes
Published: (1998)
Risk assessment and management handbook for environmental, health, and safety professionals
Published: (1996)
Published: (1996)
Information security and technology
by: Ponnappa, B.M
Published: (2004)
by: Ponnappa, B.M
Published: (2004)
Information security and technology
by: Ponnappa, B.M
Published: (2004)
by: Ponnappa, B.M
Published: (2004)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
ISO 31000:2018 ENTERPRISE RISK MANAGEMENT /
by: Hutchins, Greg
Published: (2018)
by: Hutchins, Greg
Published: (2018)
Creative technologies for multidisciplinary applications
Published: (2016)
Published: (2016)
The veil of circumstance technology, values, dehumanization and the future of economics and politics
by: Moller, Jorgen Ostrom
Published: (2016)
by: Moller, Jorgen Ostrom
Published: (2016)
Critical socio-technical issues surrounding mobile computing
Published: (2016)
Published: (2016)
Medical technology and society an interdisciplinary perspective
by: Bronzino, Joseph D.
Published: (1990)
by: Bronzino, Joseph D.
Published: (1990)
Technology and the future
Published: (2006)
Published: (2006)
Information systems security facing the information society of the 21st century
Published: (1996)
Published: (1996)
Defensive security handbook best practices for securing infrastructure
by: Brotherston, Lee, et al.
Published: (2017)
by: Brotherston, Lee, et al.
Published: (2017)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Technology and society A bridge to the 21st century
by: lh
by: lh
Inside the future surviving the technology revolution /
by: Lucas, Henry C.
Published: (2008)
by: Lucas, Henry C.
Published: (2008)
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018)
by: Rerup, Neil, et al.
Published: (2018)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
The social dynamics of information and communication technology
Published: (2008)
Published: (2008)
Managing in the turbulent world economy corporate performance and risk exposure
by: Oxelheim
Published: (1997)
by: Oxelheim
Published: (1997)
Strategies for risk communication evolution, evidence, experience
Published: (2008)
Published: (2008)
Environmental risk mangement
by: Pritchard
Published: (2000)
by: Pritchard
Published: (2000)
Tips for time travellers
by: Cochrane
Published: (1999)
by: Cochrane
Published: (1999)
What every engineer should know about risk engineering and management
by: Wang
Published: (2000)
by: Wang
Published: (2000)
Information technology - Security techniques - Information security management systems - Requirements (First revision )(ISO/IEC 27001:2013,IDT) (Published by Standard Malaysia in 2014) / SIRIM Berhad
Published: (2014)
Published: (2014)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Emerging trends in ICT security
Published: (2014)
Published: (2014)
Living in a technological culture human tools and human valves
by: Tiles
Published: (1995)
by: Tiles
Published: (1995)
Information technology and societal development
by: Targowski, Andrzej
Published: (2009)
by: Targowski, Andrzej
Published: (2009)
Handbook of research on digital information technologies innovations, methods, and ethical issues /
Published: (2008)
Published: (2008)
Handbook of research on digital information technologies innovations, methods, and ethical issues
Published: (2008)
Published: (2008)
Wharton on managing technologies
by: Day lhGeorge S.
by: Day lhGeorge S.
Encyclopedia of information ethics and security
Published: (2008)
Published: (2008)
Similar Items
-
Intelligent wearable interfaces
by: Xu
Published: (2008) -
Designing and developing for Google Glass thinking differently for a new platform
by: Firstenberg, Allen, et al.
Published: (2015) -
Technical risk management
by: Michaels
Published: (1996) -
Risk analysis in engineering and economics
by: Ayyub, Bilal M.
Published: (2014) -
Assessment of health care technologies case studies, key concepts and strategic issues
Published: (1996)


