مشخصات مقاله | |
عنوان مقاله | Wearing safe: Physical and informational security in the age of the wearable device |
ترجمه عنوان مقاله | پوشیدنی ایمن: امنیت فیزیکی و اطلاعاتی در عصر دستگاه پوشیدنی |
فرمت مقاله | |
نوع مقاله | ISI |
سال انتشار | |
تعداد صفحات مقاله | 8 صفحه |
رشته های مرتبط | مدیریت، مهندسی فناوری اطلاعات و مهندسی کامپیوتر |
گرایش های مرتبط | مخابرات سیار |
مجله | افق های تجارت – Business Horizons |
دانشگاه | دانشگاه لویولا نیواورلئان،امریکا |
کلمات کلیدی | فناوری پوشیدنی؛ Wearables؛ امنیت اطلاعات؛ امنیت سایبری |
کد محصول | E4740 |
تعداد کلمات | 5147 کلمه |
نشریه | نشریه الزویر |
لینک مقاله در سایت مرجع | لینک این مقاله در سایت الزویر (ساینس دایرکت) Sciencedirect – Elsevier |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
بخشی از متن مقاله: |
1. The rise of wearables
In 1903 at the Royal Institution in London, physicist John Ambrose Fleming was preparing the setup of a primitive projection device intended to display Morse code messages from his colleague Guglielmo Marconi, the inventor of wireless telegraphy. Supposedly, this method of transmitting information was secure. Yet before the demonstration had even started, the audience was surprised, baffled, and amused to hear a series of messages being tapped out. The first messages were simply the word ‘‘rats’’ being tapped, but what followed was more complex and insulting to Marconi. A limerick began, ‘‘There was a young fellow of Italy, who diddled the public quite prettily. . . ’’ The damage had been done; wireless telegraphy was clearly nowhere near as secure as Marconi had claimed. A few days later, the magician and inventor Nevil Maskelyne claimed responsibility for this first recorded instance of the hacking of an information system (IS) (Marks, 2011). Whether for mischief or for malice, no system has ever been completely immune from hacking or compromise since Maskelyne’s trick. In the 1960s, John Draper (aka Captain Crunch) used a toy whistle from a Cap’n Crunch cereal box to trick AT&T’s telephone system into allowing him to place free long distance calls. In 1965, the Compatible Time-Sharing System on IBM’s 7094 machine was hacked for the first time. Mainframe systems were targeted from then on, and the first PC virus, Brain, was accidentally created by Pakistani programmers Basit and Amjad Farooq Alvi in 1986. Keeping systems, networks, and individual devices secure became a critical part of the IS professional’s role. These cybersecurity issues have escalated at an exponential rate as massive data breaches at firms such as Target and Sony grabbed headlines, identity theft became a nightmare for thousands of individuals, and the security of smartphones also came under threat. Even technologies traditionally regarded as ‘not IT’ showed their vulnerability: distraught parents found their baby monitoring devices were exposed, and hackers brought a Jeep Cherokee to a standstill on a highway by remotely compromising its control systems. Now the most personal information technologies of all are under threat; we have entered the age of the wearable computer |