The Topic I choose was Wearable Sensor Technology based off this student’s paper below.
PLEASE DO NOT USE ANY INFORMATION FROM STUDENTS PAPER IN MY PAPER PLEASE.
Wearable Sensor Technology Draft
Wearable sensor technology is growing in the cybersecurity industry because of its detection, prevention and documentation aspect of the technology. Wearable sensor technology is anything on the human body that can be worn including clothing (Costa, Rodrigues, Silva, Isento, & Corchado, 2015). These devices are able to prevent, detect, document and react to other technology. They are used by different industries but can be found mostly in the healthcare industry. These devices can range from a smartwatch to a t-shirt that can track movements. Wearable sensor technology can be found all over the globe from business to being used at home to track personal fitness. A business that conducts their research and use wearable sensor technology has a leading edge over those that don’t.
Features and Capabilities
Wearable sensor biological technology is mostly to help the healthcare industry. Biosensors on the wearable technology are able to monitor vital signs of patients, athletes, children and even the elderly (Ajami & Teimouri, 2015). The sensors are able to read the body’s movement and send the information to the medical team to document their health information (Raths, 2015). The Apple Watch is an example of a biometric wearable device because it monitors steps being taken and calories burned (Elsevier, 2014). The Apple Watch could be used in the medical field and help patients that are in rehabilitation (Raths, 2015). Most wearable technologies have features like Wi-Fi, GPRS (General Packet Radio Services), Bluetooth, GPS (Global Positioning System), and third party applications (Costa et al., 2015).
Technology interactions with people / environments / processes
Wearable sensor technology is used for patients in hospitals, elderly in special care and athletes that are trying to track performance. For example, the Apple Watch will monitor someone’s steps and their movements throughout the day. Just because it monitors their movement doesn’t mean that the person will become healthier. Some people use this device to fight obesity (Drury, 2014). These types of devices are used as tools to recognize the user’s or patients abilities and weaknesses (Drury, 2014). Biological wearable technology can be used by anybody that is any age. These types of devices are not subject to one kind of person or skin type. Wearable technology is now making its way to access control points by being able to open doors to businesses (Everett, 2015).
Costs and Benefits
Wearable sensor technology in 2015 was up to $20 billion dollars (Ajami & Teimouri, 2015). The market is expected to rise at least $50 billion dollars in the next ten years (Ajami & Teimouri, 2015). Wearable technology is hard to implement because of the high costs so most small business are not able to aff ...
The Topic I choose was Wearable Sensor Technology based off this s.docx
1. The Topic I choose was Wearable Sensor Technology based off
this student’s paper below.
PLEASE DO NOT USE ANY INFORMATION FROM
STUDENTS PAPER IN MY PAPER PLEASE.
Wearable Sensor Technology Draft
Wearable sensor technology is growing in the cybersecurity
industry because of its detection, prevention and documentation
aspect of the technology. Wearable sensor technology is
anything on the human body that can be worn including clothing
(Costa, Rodrigues, Silva, Isento, & Corchado, 2015). These
devices are able to prevent, detect, document and react to other
technology. They are used by different industries but can be
found mostly in the healthcare industry. These devices can
range from a smartwatch to a t-shirt that can track movements.
Wearable sensor technology can be found all over the globe
from business to being used at home to track personal fitness. A
business that conducts their research and use wearable sensor
technology has a leading edge over those that don’t.
Features and Capabilities
Wearable sensor biological technology is mostly to help the
healthcare industry. Biosensors on the wearable technology are
able to monitor vital signs of patients, athletes, children and
even the elderly (Ajami & Teimouri, 2015). The sensors are
able to read the body’s movement and send the information to
the medical team to document their health information (Raths,
2015). The Apple Watch is an example of a biometric wearable
device because it monitors steps being taken and calories
burned (Elsevier, 2014). The Apple Watch could be used in the
medical field and help patients that are in rehabilitation (Raths,
2015). Most wearable technologies have features like Wi-Fi,
GPRS (General Packet Radio Services), Bluetooth, GPS (Global
Positioning System), and third party applications (Costa et al.,
2. 2015).
Technology interactions with people / environments / processes
Wearable sensor technology is used for patients in hospitals,
elderly in special care and athletes that are trying to track
performance. For example, the Apple Watch will monitor
someone’s steps and their movements throughout the day. Just
because it monitors their movement doesn’t mean that the
person will become healthier. Some people use this device to
fight obesity (Drury, 2014). These types of devices are used as
tools to recognize the user’s or patients abilities and
weaknesses (Drury, 2014). Biological wearable technology can
be used by anybody that is any age. These types of devices are
not subject to one kind of person or skin type. Wearable
technology is now making its way to access control points by
being able to open doors to businesses (Everett, 2015).
Costs and Benefits
Wearable sensor technology in 2015 was up to $20 billion
dollars (Ajami & Teimouri, 2015). The market is expected to
rise at least $50 billion dollars in the next ten years (Ajami &
Teimouri, 2015). Wearable technology is hard to implement
because of the high costs so most small business are not able to
afford this type of technology (Everett, 2015). There are a few
industries that are starting to use the technology more like
police officers to ensure the safety of the public and build trust.
Other benefits to wearable technology are that the technology
itself is usually small and or comfortable to wear. Most
wearable sensor technology is able to be worn for long periods
of time without irritation.
Cybersecurity Related Risks and/or Vulnerabilities
Patients are now able to log into systems to monitor their health
records on their personal computers through which causes
vulnerabilities and risks (Drury, 2014). “While Emmanuel’s
proposals are the basis of the Affordable Care Act, and include
adoption of the electronic medical record, use of social media
3. and other personal communication technologies, changing
reimbursement for providers from procedure to outcome based
and stringent quality of outcome measures, they don’t include
the scientific elements (Drury, 2014).” Wearable technology is
part of Internet of Things (IoT) causes security issues. For
example, researcher Barnaby Jack has been able to push a
button on his laptop could control an insulin pump within 300
feet away without knowing the identification number (Curtis,
2015). Without proper security controls on these devices they
are open to various attacks (Everett, 2015). These wearable
sensor devices can also be detected by their frequency and
hacked into (New Scientist, 2015). Hewlett Packard found that a
hundred percent of smartwaches like Apple’s Watch are
vulnerable to security attacks (Hess, 2016). University of
Illinois has hacked into smartwaches as an experiment to see if
they could get into and found it very easy (Hess, 2016). If
hackers are able to access private information they would be
able to blackmail the user wearing these types of devices
(Curtis, 2015). Cybercriminals can use code to hack into
pictures and videos that are on the devices (Curtis, 2015).
Recommendation
Wearable sensor technology is efficient and effective with
research to back it up. Wearable technology can impact people’s
health and can save lives in the field of emergency service
sector. The technology can be expensive to implement and but
can analyze data and use that data for benefits. Implementing a
new wearable device will encounter some privacy issues but as
long as they are secured properly then they are worth the risk to
implement. If wearable technology is implemented it would
gather lots of data that can be used to either prevent or detect
and document. This technology can replace the pencil-and-paper
method which can reduce materials costs. It could also replace
data entry software that may require some type of licensing.
Conclusion
Wearable sensor technology can prevent injuries, detect
movement, show someone’s reaction time, and document all the
4. information. Lots of industries can use wearable technology to
provide availability to their employees and patients. With all
types of technology they come with risks but if the risks are
mitigated with security controls then they are worth
implemented. Wearable technology has been in effect and there
has been lots of research to prove that their uses are worth
implementing.
References
Ajami, S., & Teimouri, F. (2015). Features and application of
wearable biosensors in medical
care. Journal Of Research In Medical Sciences, 20(12), 1208-
1215. doi:10.4103/1735-1995.172991
Costa, S., Rodrigues, J., Silva, B., Isento, J., & Corchado, J. (7
September 2015). Integration of
Wearable
Solution
s in AAL Environments with Mobility Support. Journal of
Medical Systems, 39(184), 1-8. doi: 10.1007/s10916-015-0342-
z
Curtis, S. (25 June 2014). Wearable tech: how hackers could
5. turn your most private data against
You. The Telegraph. Retrieved from
http://www.telegraph.co.uk/technology/internet-
security/10925223/Wearable-tech-how-hackers-could-turn-your-
most-private-data-against-you.html
Drury, R. L. (2014). Wearable biosensor systems and resilience:
A perfect storm in health care?
Frontiers In Psychology, 5, 1-5.
Elsevier (2014). Apple Watch Set to Drive Wearables into the
Mainstream? Biometric
Technology Today, 2014(9), 1. doi:10.1016/S0969-
4765(14)70131-6.
Everett, C. (2015). Wearable technology proves its business
case. Computer Weekly, 24.
Retrieved from
http://www.computerweekly.com/feature/Wearable-technology-
proves-business-value-hands-free-and-in-the-field
Hess, P. (9 January 2016). How to Secure Your Smart Watch
[Blog]? ScienceLine. Retrieved
from http://scienceline.org/2016/01/how-secure-is-your-smart-
watch/
New Scientist. (14 March 2015). Apple Watch is just half the
story,225 (3012), 7.
Raths, D. (2015). The Disruption Pipeline. Government
Technology, 28(5), 20-24.
6. Identified an appropriate technology and provided an overview
of the technology
5 points
Provided an introduction that contains an excellent overview of
an emerging technology or emerging application of technology.
The overview appropriately used information from the survey of
the professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
Addressed security issues using standard terms (e.g.5 Pillars IA,
5 Pillars Information Security)
5 points
Demonstrated excellence in the use of standard cybersecurity
terminology to support discussion of the technology.
Appropriately used terminology from five or more pillars of
IA/IS.
Explained the evaluation methodology
15 points
Provided an excellent overview of the evaluation methodology
7. that will be used to evaluate the emerging technology or
emerging application of technology. The overview appropriately
used information from the authoritative sources in the
professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites
Listed and explained the research questions to be answered by
the study
10 points
Identified three or more research questions for the study.
Provided an excellent discussion of those research questions
using the characteristics of the emerging technology or
emerging application of technology. The discussion
appropriately used information from the survey of the
professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
Explained specific design elements for study
15 points
Provided an excellent discussion of the study design
(methodology). The discussion appropriately used information
from the survey of the professional literature in addition to
information from other sources, i.e. news articles, industry or
government white papers and authoritative Web sites.
8. 15 points
Provided an excellent discussion of the security considerations
that must be incorporated into the study design (methodology).
This includes steps that must be taken to ensure the
confidentiality of the study and the integrity and availability of
the resources required to support the study. Discussion also
included authentication and non-repudiation requirements for
the execution of the study. The discussion appropriately used
information from the survey of the professional literature in
addition to information from other sources, i.e. news articles,
industry or government white papers and authoritative Web
sites.
Explained the limitations or special considerations affecting the
implementation of the study
10 points
Identified and provided an excellent discussion of 3 or more
limitations or special considerations (e.g. risk factors) which
could affect the implementation of the study plan. Briefly
discussed how these risk factors should be managed. The
discussion appropriately used information from the survey of
the professional literature in addition to information from other
sources, i.e. news articles, industry or government white papers
and authoritative Web sites.
Provided a notional timeline for the study. Citations not
required for this element.
9. 5 points
Provided a detailed and attractively designed graphic showing a
notional timeline expressed in days after start date. Notional
timeline includes steps, phases, and/or milestones for the study.
Timeline has annotations to briefly explain each major element
and shows “days after start” for each.
Technology Evaluation Study Plan – Detailed Assignment
Description
This assignment is the third and final part Analysis of
Alternatives exercise.
Choose one of the student-written Technology Selection papers
from the list posted by your instructor in the Week 7
conference.
Read your chosen Technology Selection paper to learn more
about the selected technology. Next, consider what type of
formal evaluation study could be used to learn more about this
technology and how it is likely to interact with people,
processes, and technologies. Then, design a formal evaluation
study which could be used to obtain more information about one
or more of the following:
10. · characteristics (features and capabilities) of the technology
· interactions among technologies, people, environments, and
processes (use cases or scenarios)
· risks or vulnerabilities associated with adoption of this
technology
· costs and benefits associated with adoption of this technology
CHOOSE YOUR EVALUATION METHOD
Your evaluation study design must use one of the following:
· Case Study
· Delphi Study (panel of subject matter experts)
· Quasi-Experiment (e.g. penetration testing or pilot testing in a
controlled environment)
· Pilot Implementation (in a demonstration environment)
See the Technology Evaluation Methods module in the Week 2
conference for detailed descriptions of each of these types of
evaluation methods.
DESIGN YOUR STUDY
Identify the specific questions that your formal evaluation study
will address. These questions must be security-focused (review
the Pillars of Information Security and Pillars of Information
Assurance for ideas). Your design should include a description
of the specific security issues which will be tested or security
capabilities which will be evaluated. Use standard terminology
when writing about security issues (see the rubric).
DEVELOP YOUR EVALUATION STUDY PLAN
11. Use your study design to prepare a high-level plan for your
evaluation study. Your plan must include the following:
· Introduction
· description of the emerging technology and justification for
including it in an evaluation study
· Research Question(s)
· These must be security focused. Use the Five Pillars of
Information Assurance and / or the Five Pillars of Information
Security.
· Use “how” or “what” questions (writing good “why” questions
is beyond the scope of this course).
· Examples
· What vulnerabilities exist that could be attacked to
compromise confidentiality?
· How could an attacker compromise availability?
· For each research question, provide a brief description of a
scenario or use case which could be used to answer the
question. Your description should be one paragraph (no longer).
· Methods
· high level design of the study (focus upon the evaluation
model and your research questions)
· description of how the technology will be incorporated or used
in the study (including specific security issues which will be
tested or security capabilities which will be evaluated)
· notional system or network architecture diagram showing the
12. pilot test environment (only if you are doing a pilot study)
· Limitations or Special Considerations
· any special considerations or security concerns which must be
addressed (e.g. “clean room,” test data sanitization, or isolation
environment to prevent the pilot study from causing harm to
operational systems)
· Timeline of Events (Notional)
· A notional timeline (expressed in days or months after start
date) for your study
NOTIONAL TIMELINE OF EVENTS
The notional timeline of events (stated in days or months after
start) that provides an estimate of how long you expect your
evaluation study to take. For a Delphi Method study, your study
could take as little as a day or two. For a Delphi Method Study,
include the number of “rounds” and how long each round will
be (the time allotted for experts to consider information and
reply back with their opinion on the questions or issues). For a
case study, quasi-experimental, or pilot implementation design,
your study may span several months; in this case, divide your
timeline into phases (setup, testing, reporting).
COST ESTIMATE IS NOT REQUIRED
Normally, an evaluation study plan will include a cost estimate.
For this course, we will NOT be including cost elements in our
evaluation study plans as the information required to develop
these items is not readily available to students. If you wish to
13. address this area of a study plan, limit your discussion to a brief
listing of the cost elements (people, technologies, facilities) and
state that a cost estimate will be provided separately.
DOCUMENT YOUR PLAN
Your Technology Evaluation Study Plan should be at least three
pages in length but no more than ten pages (excluding the title
page and references page). This should be a high level design
that can be read quickly. Your study plan must contain the five
major sections defined above and comply with the formatting
guidance provided by your instructor.
GRADING
Grading Rubric: Consult the grading rubric for specific content
and formatting requirements for this assignment.
APA Formatting: Consult the sample papers and paper template
provided under Content > Course Documents > APA Resources.
All papers in this course must comply with APA Style for
references and citations. You are expected to write
grammatically correct English in every assignment that you
submit for grading. Do not turn in any work without (a) using
spell check, (b) using grammar check, (c) verifying that your
punctuation is correct and (d) reviewing your work for correct
word usage and correctly structured sentences and paragraphs.
These items are graded under Professionalism and constitute
20% of the assignment grade.