SlideShare a Scribd company logo
1 of 14
The Topic I choose was Wearable Sensor Technology based off
this student’s paper below.
PLEASE DO NOT USE ANY INFORMATION FROM
STUDENTS PAPER IN MY PAPER PLEASE.
Wearable Sensor Technology Draft
Wearable sensor technology is growing in the cybersecurity
industry because of its detection, prevention and documentation
aspect of the technology. Wearable sensor technology is
anything on the human body that can be worn including clothing
(Costa, Rodrigues, Silva, Isento, & Corchado, 2015). These
devices are able to prevent, detect, document and react to other
technology. They are used by different industries but can be
found mostly in the healthcare industry. These devices can
range from a smartwatch to a t-shirt that can track movements.
Wearable sensor technology can be found all over the globe
from business to being used at home to track personal fitness. A
business that conducts their research and use wearable sensor
technology has a leading edge over those that don’t.
Features and Capabilities
Wearable sensor biological technology is mostly to help the
healthcare industry. Biosensors on the wearable technology are
able to monitor vital signs of patients, athletes, children and
even the elderly (Ajami & Teimouri, 2015). The sensors are
able to read the body’s movement and send the information to
the medical team to document their health information (Raths,
2015). The Apple Watch is an example of a biometric wearable
device because it monitors steps being taken and calories
burned (Elsevier, 2014). The Apple Watch could be used in the
medical field and help patients that are in rehabilitation (Raths,
2015). Most wearable technologies have features like Wi-Fi,
GPRS (General Packet Radio Services), Bluetooth, GPS (Global
Positioning System), and third party applications (Costa et al.,
2015).
Technology interactions with people / environments / processes
Wearable sensor technology is used for patients in hospitals,
elderly in special care and athletes that are trying to track
performance. For example, the Apple Watch will monitor
someone’s steps and their movements throughout the day. Just
because it monitors their movement doesn’t mean that the
person will become healthier. Some people use this device to
fight obesity (Drury, 2014). These types of devices are used as
tools to recognize the user’s or patients abilities and
weaknesses (Drury, 2014). Biological wearable technology can
be used by anybody that is any age. These types of devices are
not subject to one kind of person or skin type. Wearable
technology is now making its way to access control points by
being able to open doors to businesses (Everett, 2015).
Costs and Benefits
Wearable sensor technology in 2015 was up to $20 billion
dollars (Ajami & Teimouri, 2015). The market is expected to
rise at least $50 billion dollars in the next ten years (Ajami &
Teimouri, 2015). Wearable technology is hard to implement
because of the high costs so most small business are not able to
afford this type of technology (Everett, 2015). There are a few
industries that are starting to use the technology more like
police officers to ensure the safety of the public and build trust.
Other benefits to wearable technology are that the technology
itself is usually small and or comfortable to wear. Most
wearable sensor technology is able to be worn for long periods
of time without irritation.
Cybersecurity Related Risks and/or Vulnerabilities
Patients are now able to log into systems to monitor their health
records on their personal computers through which causes
vulnerabilities and risks (Drury, 2014). “While Emmanuel’s
proposals are the basis of the Affordable Care Act, and include
adoption of the electronic medical record, use of social media
and other personal communication technologies, changing
reimbursement for providers from procedure to outcome based
and stringent quality of outcome measures, they don’t include
the scientific elements (Drury, 2014).” Wearable technology is
part of Internet of Things (IoT) causes security issues. For
example, researcher Barnaby Jack has been able to push a
button on his laptop could control an insulin pump within 300
feet away without knowing the identification number (Curtis,
2015). Without proper security controls on these devices they
are open to various attacks (Everett, 2015). These wearable
sensor devices can also be detected by their frequency and
hacked into (New Scientist, 2015). Hewlett Packard found that a
hundred percent of smartwaches like Apple’s Watch are
vulnerable to security attacks (Hess, 2016). University of
Illinois has hacked into smartwaches as an experiment to see if
they could get into and found it very easy (Hess, 2016). If
hackers are able to access private information they would be
able to blackmail the user wearing these types of devices
(Curtis, 2015). Cybercriminals can use code to hack into
pictures and videos that are on the devices (Curtis, 2015).
Recommendation
Wearable sensor technology is efficient and effective with
research to back it up. Wearable technology can impact people’s
health and can save lives in the field of emergency service
sector. The technology can be expensive to implement and but
can analyze data and use that data for benefits. Implementing a
new wearable device will encounter some privacy issues but as
long as they are secured properly then they are worth the risk to
implement. If wearable technology is implemented it would
gather lots of data that can be used to either prevent or detect
and document. This technology can replace the pencil-and-paper
method which can reduce materials costs. It could also replace
data entry software that may require some type of licensing.
Conclusion
Wearable sensor technology can prevent injuries, detect
movement, show someone’s reaction time, and document all the
information. Lots of industries can use wearable technology to
provide availability to their employees and patients. With all
types of technology they come with risks but if the risks are
mitigated with security controls then they are worth
implemented. Wearable technology has been in effect and there
has been lots of research to prove that their uses are worth
implementing.
References
Ajami, S., & Teimouri, F. (2015). Features and application of
wearable biosensors in medical
care. Journal Of Research In Medical Sciences, 20(12), 1208-
1215. doi:10.4103/1735-1995.172991
Costa, S., Rodrigues, J., Silva, B., Isento, J., & Corchado, J. (7
September 2015). Integration of
Wearable
Solution
s in AAL Environments with Mobility Support. Journal of
Medical Systems, 39(184), 1-8. doi: 10.1007/s10916-015-0342-
z
Curtis, S. (25 June 2014). Wearable tech: how hackers could
turn your most private data against
You. The Telegraph. Retrieved from
http://www.telegraph.co.uk/technology/internet-
security/10925223/Wearable-tech-how-hackers-could-turn-your-
most-private-data-against-you.html
Drury, R. L. (2014). Wearable biosensor systems and resilience:
A perfect storm in health care?
Frontiers In Psychology, 5, 1-5.
Elsevier (2014). Apple Watch Set to Drive Wearables into the
Mainstream? Biometric
Technology Today, 2014(9), 1. doi:10.1016/S0969-
4765(14)70131-6.
Everett, C. (2015). Wearable technology proves its business
case. Computer Weekly, 24.
Retrieved from
http://www.computerweekly.com/feature/Wearable-technology-
proves-business-value-hands-free-and-in-the-field
Hess, P. (9 January 2016). How to Secure Your Smart Watch
[Blog]? ScienceLine. Retrieved
from http://scienceline.org/2016/01/how-secure-is-your-smart-
watch/
New Scientist. (14 March 2015). Apple Watch is just half the
story,225 (3012), 7.
Raths, D. (2015). The Disruption Pipeline. Government
Technology, 28(5), 20-24.
Identified an appropriate technology and provided an overview
of the technology
5 points
Provided an introduction that contains an excellent overview of
an emerging technology or emerging application of technology.
The overview appropriately used information from the survey of
the professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
Addressed security issues using standard terms (e.g.5 Pillars IA,
5 Pillars Information Security)
5 points
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.
Explained the evaluation methodology
15 points
Provided an excellent overview of the evaluation methodology
that will be used to evaluate the emerging technology or
emerging application of technology. The overview appropriately
used information from the authoritative sources in the
professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites
Listed and explained the research questions to be answered by
the study
10 points
Identified three or more research questions for the study.
Provided an excellent discussion of those research questions
using the characteristics of the emerging technology or
emerging application of technology. The discussion
appropriately used information from the survey of the
professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
Explained specific design elements for study
15 points
Provided an excellent discussion of the study design
(methodology). The discussion appropriately used information
from the survey of the professional literature in addition to
information from other sources, i.e. news articles, industry or
government white papers and authoritative Web sites.
15 points
Provided an excellent discussion of the security considerations
that must be incorporated into the study design (methodology).
This includes steps that must be taken to ensure the
confidentiality of the study and the integrity and availability of
the resources required to support the study. Discussion also
included authentication and non-repudiation requirements for
the execution of the study. The discussion appropriately used
information from the survey of the professional literature in
addition to information from other sources, i.e. news articles,
industry or government white papers and authoritative Web
sites.
Explained the limitations or special considerations affecting the
implementation of the study
10 points
Identified and provided an excellent discussion of 3 or more
limitations or special considerations (e.g. risk factors) which
could affect the implementation of the study plan. Briefly
discussed how these risk factors should be managed. The
discussion appropriately used information from the survey of
the professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
Provided a notional timeline for the study. Citations not
required for this element.
5 points
Provided a detailed and attractively designed graphic showing a
notional timeline expressed in days after start date. Notional
timeline includes steps, phases, and/or milestones for the study.
Timeline has annotations to briefly explain each major element
and shows “days after start” for each.
Technology Evaluation Study Plan – Detailed Assignment
Description
This assignment is the third and final part Analysis of
Alternatives exercise.
Choose one of the student-written Technology Selection papers
from the list posted by your instructor in the Week 7
conference.
Read your chosen Technology Selection paper to learn more
about the selected technology. Next, consider what type of
formal evaluation study could be used to learn more about this
technology and how it is likely to interact with people,
processes, and technologies. Then, design a formal evaluation
study which could be used to obtain more information about one
or more of the following:
· characteristics (features and capabilities) of the technology
· interactions among technologies, people, environments, and
processes (use cases or scenarios)
· risks or vulnerabilities associated with adoption of this
technology
· costs and benefits associated with adoption of this technology
CHOOSE YOUR EVALUATION METHOD
Your evaluation study design must use one of the following:
· Case Study
· Delphi Study (panel of subject matter experts)
· Quasi-Experiment (e.g. penetration testing or pilot testing in a
controlled environment)
· Pilot Implementation (in a demonstration environment)
See the Technology Evaluation Methods module in the Week 2
conference for detailed descriptions of each of these types of
evaluation methods.
DESIGN YOUR STUDY
Identify the specific questions that your formal evaluation study
will address. These questions must be security-focused (review
the Pillars of Information Security and Pillars of Information
Assurance for ideas). Your design should include a description
of the specific security issues which will be tested or security
capabilities which will be evaluated. Use standard terminology
when writing about security issues (see the rubric).
DEVELOP YOUR EVALUATION STUDY PLAN
Use your study design to prepare a high-level plan for your
evaluation study. Your plan must include the following:
· Introduction
· description of the emerging technology and justification for
including it in an evaluation study
· Research Question(s)
· These must be security focused. Use the Five Pillars of
Information Assurance and / or the Five Pillars of Information
Security.
· Use “how” or “what” questions (writing good “why” questions
is beyond the scope of this course).
· Examples
· What vulnerabilities exist that could be attacked to
compromise confidentiality?
· How could an attacker compromise availability?
· For each research question, provide a brief description of a
scenario or use case which could be used to answer the
question. Your description should be one paragraph (no longer).
· Methods
· high level design of the study (focus upon the evaluation
model and your research questions)
· description of how the technology will be incorporated or used
in the study (including specific security issues which will be
tested or security capabilities which will be evaluated)
· notional system or network architecture diagram showing the
pilot test environment (only if you are doing a pilot study)
· Limitations or Special Considerations
· any special considerations or security concerns which must be
addressed (e.g. “clean room,” test data sanitization, or isolation
environment to prevent the pilot study from causing harm to
operational systems)
· Timeline of Events (Notional)
· A notional timeline (expressed in days or months after start
date) for your study
NOTIONAL TIMELINE OF EVENTS
The notional timeline of events (stated in days or months after
start) that provides an estimate of how long you expect your
evaluation study to take. For a Delphi Method study, your study
could take as little as a day or two. For a Delphi Method Study,
include the number of “rounds” and how long each round will
be (the time allotted for experts to consider information and
reply back with their opinion on the questions or issues). For a
case study, quasi-experimental, or pilot implementation design,
your study may span several months; in this case, divide your
timeline into phases (setup, testing, reporting).
COST ESTIMATE IS NOT REQUIRED
Normally, an evaluation study plan will include a cost estimate.
For this course, we will NOT be including cost elements in our
evaluation study plans as the information required to develop
these items is not readily available to students. If you wish to
address this area of a study plan, limit your discussion to a brief
listing of the cost elements (people, technologies, facilities) and
state that a cost estimate will be provided separately.
DOCUMENT YOUR PLAN
Your Technology Evaluation Study Plan should be at least three
pages in length but no more than ten pages (excluding the title
page and references page). This should be a high level design
that can be read quickly. Your study plan must contain the five
major sections defined above and comply with the formatting
guidance provided by your instructor.
GRADING
Grading Rubric: Consult the grading rubric for specific content
and formatting requirements for this assignment.
APA Formatting: Consult the sample papers and paper template
provided under Content > Course Documents > APA Resources.
All papers in this course must comply with APA Style for
references and citations. You are expected to write
grammatically correct English in every assignment that you
submit for grading. Do not turn in any work without (a) using
spell check, (b) using grammar check, (c) verifying that your
punctuation is correct and (d) reviewing your work for correct
word usage and correctly structured sentences and paragraphs.
These items are graded under Professionalism and constitute
20% of the assignment grade.
The Topic I choose was Wearable Sensor Technology based off this s.docx

More Related Content

Similar to The Topic I choose was Wearable Sensor Technology based off this s.docx

Can Wearable Technology Transform The Healthcare Sector?
Can Wearable Technology Transform The Healthcare Sector?Can Wearable Technology Transform The Healthcare Sector?
Can Wearable Technology Transform The Healthcare Sector?Pixel Crayons
 
AI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion SystemAI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion SystemIJAEMSJORNAL
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
AIC_2020_Presentation_Slides.pdf
AIC_2020_Presentation_Slides.pdfAIC_2020_Presentation_Slides.pdf
AIC_2020_Presentation_Slides.pdfsifatzubaira
 
Internet of Things IoT IoT in Healthcare
Internet of Things IoT IoT in HealthcareInternet of Things IoT IoT in Healthcare
Internet of Things IoT IoT in Healthcareijtsrd
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
IRJET- Virtual Assistant for Medical Emergency
IRJET-  	  Virtual Assistant for Medical EmergencyIRJET-  	  Virtual Assistant for Medical Emergency
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxcowinhelen
 
Sensors-on-the-Go: The Growing World of Wearables
Sensors-on-the-Go: The Growing World of WearablesSensors-on-the-Go: The Growing World of Wearables
Sensors-on-the-Go: The Growing World of Wearablesgrowingworldofwearables
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxjeanettehully
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxtodd521
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025jsscot07
 
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare IIJSRJournal
 
towardsATheoryOfSH16- IA
towardsATheoryOfSH16- IAtowardsATheoryOfSH16- IA
towardsATheoryOfSH16- IAIan Aitken
 

Similar to The Topic I choose was Wearable Sensor Technology based off this s.docx (20)

Can Wearable Technology Transform The Healthcare Sector?
Can Wearable Technology Transform The Healthcare Sector?Can Wearable Technology Transform The Healthcare Sector?
Can Wearable Technology Transform The Healthcare Sector?
 
AI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion SystemAI-Chronic Disease Suggestion System
AI-Chronic Disease Suggestion System
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
AIC_2020_Presentation_Slides.pdf
AIC_2020_Presentation_Slides.pdfAIC_2020_Presentation_Slides.pdf
AIC_2020_Presentation_Slides.pdf
 
Internet of Things IoT IoT in Healthcare
Internet of Things IoT IoT in HealthcareInternet of Things IoT IoT in Healthcare
Internet of Things IoT IoT in Healthcare
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
IRJET- Virtual Assistant for Medical Emergency
IRJET-  	  Virtual Assistant for Medical EmergencyIRJET-  	  Virtual Assistant for Medical Emergency
IRJET- Virtual Assistant for Medical Emergency
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
Sensors-on-the-Go: The Growing World of Wearables
Sensors-on-the-Go: The Growing World of WearablesSensors-on-the-Go: The Growing World of Wearables
Sensors-on-the-Go: The Growing World of Wearables
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025Communication Technology in the Medical Field in 2025
Communication Technology in the Medical Field in 2025
 
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
 
towardsATheoryOfSH16- IA
towardsATheoryOfSH16- IAtowardsATheoryOfSH16- IA
towardsATheoryOfSH16- IA
 

More from christalgrieg

Please read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxPlease read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxchristalgrieg
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxchristalgrieg
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxchristalgrieg
 
Please read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxPlease read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxchristalgrieg
 
Please read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxPlease read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxchristalgrieg
 
Please read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxPlease read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxchristalgrieg
 
Please Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxPlease Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxchristalgrieg
 
Please read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxPlease read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxchristalgrieg
 
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxPLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxchristalgrieg
 
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxPlease read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxchristalgrieg
 
Please Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxPlease Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxchristalgrieg
 
Please react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxPlease react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxchristalgrieg
 
Please provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxPlease provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxchristalgrieg
 
Please proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxPlease proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxchristalgrieg
 
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxPlease prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxchristalgrieg
 
Please prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxPlease prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxchristalgrieg
 
Please prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxPlease prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxchristalgrieg
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxchristalgrieg
 
Please provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxPlease provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxchristalgrieg
 
Please provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxPlease provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxchristalgrieg
 

More from christalgrieg (20)

Please read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxPlease read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docx
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docx
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
 
Please read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxPlease read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docx
 
Please read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxPlease read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docx
 
Please read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxPlease read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docx
 
Please Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxPlease Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docx
 
Please read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxPlease read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docx
 
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxPLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
 
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxPlease read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
 
Please Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxPlease Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docx
 
Please react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxPlease react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docx
 
Please provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxPlease provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docx
 
Please proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxPlease proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docx
 
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxPlease prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
 
Please prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxPlease prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docx
 
Please prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxPlease prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docx
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docx
 
Please provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxPlease provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docx
 
Please provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxPlease provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docx
 

Recently uploaded

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 

Recently uploaded (20)

TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 

The Topic I choose was Wearable Sensor Technology based off this s.docx

  • 1. The Topic I choose was Wearable Sensor Technology based off this student’s paper below. PLEASE DO NOT USE ANY INFORMATION FROM STUDENTS PAPER IN MY PAPER PLEASE. Wearable Sensor Technology Draft Wearable sensor technology is growing in the cybersecurity industry because of its detection, prevention and documentation aspect of the technology. Wearable sensor technology is anything on the human body that can be worn including clothing (Costa, Rodrigues, Silva, Isento, & Corchado, 2015). These devices are able to prevent, detect, document and react to other technology. They are used by different industries but can be found mostly in the healthcare industry. These devices can range from a smartwatch to a t-shirt that can track movements. Wearable sensor technology can be found all over the globe from business to being used at home to track personal fitness. A business that conducts their research and use wearable sensor technology has a leading edge over those that don’t. Features and Capabilities Wearable sensor biological technology is mostly to help the healthcare industry. Biosensors on the wearable technology are able to monitor vital signs of patients, athletes, children and even the elderly (Ajami & Teimouri, 2015). The sensors are able to read the body’s movement and send the information to the medical team to document their health information (Raths, 2015). The Apple Watch is an example of a biometric wearable device because it monitors steps being taken and calories burned (Elsevier, 2014). The Apple Watch could be used in the medical field and help patients that are in rehabilitation (Raths, 2015). Most wearable technologies have features like Wi-Fi, GPRS (General Packet Radio Services), Bluetooth, GPS (Global Positioning System), and third party applications (Costa et al.,
  • 2. 2015). Technology interactions with people / environments / processes Wearable sensor technology is used for patients in hospitals, elderly in special care and athletes that are trying to track performance. For example, the Apple Watch will monitor someone’s steps and their movements throughout the day. Just because it monitors their movement doesn’t mean that the person will become healthier. Some people use this device to fight obesity (Drury, 2014). These types of devices are used as tools to recognize the user’s or patients abilities and weaknesses (Drury, 2014). Biological wearable technology can be used by anybody that is any age. These types of devices are not subject to one kind of person or skin type. Wearable technology is now making its way to access control points by being able to open doors to businesses (Everett, 2015). Costs and Benefits Wearable sensor technology in 2015 was up to $20 billion dollars (Ajami & Teimouri, 2015). The market is expected to rise at least $50 billion dollars in the next ten years (Ajami & Teimouri, 2015). Wearable technology is hard to implement because of the high costs so most small business are not able to afford this type of technology (Everett, 2015). There are a few industries that are starting to use the technology more like police officers to ensure the safety of the public and build trust. Other benefits to wearable technology are that the technology itself is usually small and or comfortable to wear. Most wearable sensor technology is able to be worn for long periods of time without irritation. Cybersecurity Related Risks and/or Vulnerabilities Patients are now able to log into systems to monitor their health records on their personal computers through which causes vulnerabilities and risks (Drury, 2014). “While Emmanuel’s proposals are the basis of the Affordable Care Act, and include adoption of the electronic medical record, use of social media
  • 3. and other personal communication technologies, changing reimbursement for providers from procedure to outcome based and stringent quality of outcome measures, they don’t include the scientific elements (Drury, 2014).” Wearable technology is part of Internet of Things (IoT) causes security issues. For example, researcher Barnaby Jack has been able to push a button on his laptop could control an insulin pump within 300 feet away without knowing the identification number (Curtis, 2015). Without proper security controls on these devices they are open to various attacks (Everett, 2015). These wearable sensor devices can also be detected by their frequency and hacked into (New Scientist, 2015). Hewlett Packard found that a hundred percent of smartwaches like Apple’s Watch are vulnerable to security attacks (Hess, 2016). University of Illinois has hacked into smartwaches as an experiment to see if they could get into and found it very easy (Hess, 2016). If hackers are able to access private information they would be able to blackmail the user wearing these types of devices (Curtis, 2015). Cybercriminals can use code to hack into pictures and videos that are on the devices (Curtis, 2015). Recommendation Wearable sensor technology is efficient and effective with research to back it up. Wearable technology can impact people’s health and can save lives in the field of emergency service sector. The technology can be expensive to implement and but can analyze data and use that data for benefits. Implementing a new wearable device will encounter some privacy issues but as long as they are secured properly then they are worth the risk to implement. If wearable technology is implemented it would gather lots of data that can be used to either prevent or detect and document. This technology can replace the pencil-and-paper method which can reduce materials costs. It could also replace data entry software that may require some type of licensing. Conclusion Wearable sensor technology can prevent injuries, detect movement, show someone’s reaction time, and document all the
  • 4. information. Lots of industries can use wearable technology to provide availability to their employees and patients. With all types of technology they come with risks but if the risks are mitigated with security controls then they are worth implemented. Wearable technology has been in effect and there has been lots of research to prove that their uses are worth implementing. References Ajami, S., & Teimouri, F. (2015). Features and application of wearable biosensors in medical care. Journal Of Research In Medical Sciences, 20(12), 1208- 1215. doi:10.4103/1735-1995.172991 Costa, S., Rodrigues, J., Silva, B., Isento, J., & Corchado, J. (7 September 2015). Integration of Wearable Solution s in AAL Environments with Mobility Support. Journal of Medical Systems, 39(184), 1-8. doi: 10.1007/s10916-015-0342- z Curtis, S. (25 June 2014). Wearable tech: how hackers could
  • 5. turn your most private data against You. The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/internet- security/10925223/Wearable-tech-how-hackers-could-turn-your- most-private-data-against-you.html Drury, R. L. (2014). Wearable biosensor systems and resilience: A perfect storm in health care? Frontiers In Psychology, 5, 1-5. Elsevier (2014). Apple Watch Set to Drive Wearables into the Mainstream? Biometric Technology Today, 2014(9), 1. doi:10.1016/S0969- 4765(14)70131-6. Everett, C. (2015). Wearable technology proves its business case. Computer Weekly, 24. Retrieved from http://www.computerweekly.com/feature/Wearable-technology- proves-business-value-hands-free-and-in-the-field Hess, P. (9 January 2016). How to Secure Your Smart Watch [Blog]? ScienceLine. Retrieved from http://scienceline.org/2016/01/how-secure-is-your-smart- watch/ New Scientist. (14 March 2015). Apple Watch is just half the story,225 (3012), 7. Raths, D. (2015). The Disruption Pipeline. Government Technology, 28(5), 20-24.
  • 6. Identified an appropriate technology and provided an overview of the technology 5 points Provided an introduction that contains an excellent overview of an emerging technology or emerging application of technology. The overview appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Addressed security issues using standard terms (e.g.5 Pillars IA, 5 Pillars Information Security) 5 points Demonstrated excellence in the use of standard cybersecurity terminology to support discussion of the technology. Appropriately used terminology from five or more pillars of IA/IS. Explained the evaluation methodology 15 points Provided an excellent overview of the evaluation methodology
  • 7. that will be used to evaluate the emerging technology or emerging application of technology. The overview appropriately used information from the authoritative sources in the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites Listed and explained the research questions to be answered by the study 10 points Identified three or more research questions for the study. Provided an excellent discussion of those research questions using the characteristics of the emerging technology or emerging application of technology. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Explained specific design elements for study 15 points Provided an excellent discussion of the study design (methodology). The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites.
  • 8. 15 points Provided an excellent discussion of the security considerations that must be incorporated into the study design (methodology). This includes steps that must be taken to ensure the confidentiality of the study and the integrity and availability of the resources required to support the study. Discussion also included authentication and non-repudiation requirements for the execution of the study. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Explained the limitations or special considerations affecting the implementation of the study 10 points Identified and provided an excellent discussion of 3 or more limitations or special considerations (e.g. risk factors) which could affect the implementation of the study plan. Briefly discussed how these risk factors should be managed. The discussion appropriately used information from the survey of the professional literature in addition to information from other sources, i.e. news articles, industry or government white papers and authoritative Web sites. Provided a notional timeline for the study. Citations not required for this element.
  • 9. 5 points Provided a detailed and attractively designed graphic showing a notional timeline expressed in days after start date. Notional timeline includes steps, phases, and/or milestones for the study. Timeline has annotations to briefly explain each major element and shows “days after start” for each. Technology Evaluation Study Plan – Detailed Assignment Description This assignment is the third and final part Analysis of Alternatives exercise. Choose one of the student-written Technology Selection papers from the list posted by your instructor in the Week 7 conference. Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:
  • 10. · characteristics (features and capabilities) of the technology · interactions among technologies, people, environments, and processes (use cases or scenarios) · risks or vulnerabilities associated with adoption of this technology · costs and benefits associated with adoption of this technology CHOOSE YOUR EVALUATION METHOD Your evaluation study design must use one of the following: · Case Study · Delphi Study (panel of subject matter experts) · Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment) · Pilot Implementation (in a demonstration environment) See the Technology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods. DESIGN YOUR STUDY Identify the specific questions that your formal evaluation study will address. These questions must be security-focused (review the Pillars of Information Security and Pillars of Information Assurance for ideas). Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric). DEVELOP YOUR EVALUATION STUDY PLAN
  • 11. Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following: · Introduction · description of the emerging technology and justification for including it in an evaluation study · Research Question(s) · These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security. · Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course). · Examples · What vulnerabilities exist that could be attacked to compromise confidentiality? · How could an attacker compromise availability? · For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer). · Methods · high level design of the study (focus upon the evaluation model and your research questions) · description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated) · notional system or network architecture diagram showing the
  • 12. pilot test environment (only if you are doing a pilot study) · Limitations or Special Considerations · any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems) · Timeline of Events (Notional) · A notional timeline (expressed in days or months after start date) for your study NOTIONAL TIMELINE OF EVENTS The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of “rounds” and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues). For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting). COST ESTIMATE IS NOT REQUIRED Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to develop these items is not readily available to students. If you wish to
  • 13. address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately. DOCUMENT YOUR PLAN Your Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor. GRADING Grading Rubric: Consult the grading rubric for specific content and formatting requirements for this assignment. APA Formatting: Consult the sample papers and paper template provided under Content > Course Documents > APA Resources. All papers in this course must comply with APA Style for references and citations. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade.