A user perspective on the vulnerabilities of smart watches: is security a concernu
Nowadays, we are witnessing a serious gain in popularity of the wearable smart things. A triumphalist language referring to their benefits can be noticed in mass media, revealing the hype in their adoption. Multiple advantages are perceived by the consumers, and work as positive drivers in the wearables market. Yet, there is little awareness regarding their privacy and security – such concerns are constantly expressed by academia, but usually ignored by buyers and manufacturers. Therefore, the purpose of this paper is to provide some preliminary insights into how do the users perceive vulnerabilities as interferences, frequent disconnections, hardware and software malfunctions, improper/difficult configuration etc. of hand worn devices. The analysis was realized by means of netnography, using emag.ro, the oldest and largest ecommerce site in Romania as online source. Inspired by a similar study conducted by (Genaro Motti & Caine, 2016), we selected and reviewed 931 comments posted by the buyers of the ten most popular smart watches, in order to identify the hardware, software and connectivity problems they faced while using the devices and to assess the awareness of the buyers to security and privacy issues. Also, an overview of the privacy and security policies published by selected smart watches’ manufactures was made, and some conclusion regarding the recommended future actions for wearable buyers, sellers and manufacturers were presented.
Bauer, D., Wutzke, R., & Bauernhanls, T. (2016). Wear@Work – A new approach for data acquisition using wearables. Procedia CIRP 50 (pp. 529 – 534 ). Elsevier B.V.
Beltramelli, T. (2015). Deep-Spying: Spying using Smartwatch and Deep Learning. Copenhagen, Denmark: IT University of Copenhagen.
Biamino, G. (2012). A Semantic Model for Socially Aware Objects. Advances in Internet of Things, 2(3), 47-55.
Coorevits, L., & Coenen, T. (2016). The Rise and Fall of Wearable Fitness Trackers . Academy of Management.
De Arriba-Pérez, F., Caeiro-Rodríguez, M., & Santos-Gago, J. M. (2016, September 21). Collection and Processing of Data from Wrist Wearables Devices in Heterogeneous and Multiple-User Scenarios. Sensors, 16(1538), 1-31.
Dehghani, M., & Dangelico, R. M. (2017). Smart wearable technologies: Current status and market orientation through a patent analysis. In IEEE (Ed.), Conference on Industrial Technology (ICIT). Toronto.
Emrich, T. (2017, February 9). 12 wearables predictions for 2017. Retrieved April 3, 2017, from betakit.com: http://betakit.com/12-wearables-predictions-for-2017/
Genaro Motti, V., & Caine, K. (2016). Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX in Wrist Worn Interaction. SIGDOC '16 Proceedings of the 34th ACM International Conference on the Design of Communication (pp. 1-10). Silver Spring, MD, USA : ACM.
Guo, A., & Ma, J. (2017, February 8). Context-Aware Scheduling in Personal Data Collection From Multiple Wearable Devices. (IEEE, Ed.) IEEE Access, 5, 2169-3536.
Haselton, T. (2017, June 21). Smart clothing and smartwatches will help double wearable market by 2021: IDC. Retrieved from CNBC: https://www.cnbc.com/2017/06/21/idc-wearables-market-to-double-by-2021.html
Hughes, A. (2014). Threat assessment of wearable technology . Ann Arbor : ProQuest.
Kim, K. J., & Shin, D.-H. (2015). An acceptance model for smart watches Implications for the adoption of future wearable technology. Internet Research, 25(4), 527 - 541.
Kolamunna, H., Chauhan, J., Hu, Y., Perino, D., Thilakarathna, K., Makaroff, D., & Seneviratne, A. (2015, August). Are wearable devices ready for HTTPS?Measuring the cost of secure communication protocols onwearable devices. Retrieved from http://www.cornell.edu/: https://arxiv.org/abs/1608.04180
Lee, L. N., Egelman, S., Lee, J. H., & Wagner, D. (2015, April 22). Risk Perceptions for Wearable Devices. Retrieved from https://arxiv.org: https://arxiv.org/pdf/1504.05694v1.pdf
Madakam, S. (2015, August). Internet of Things: Smart Things. International Journal of Future Computer and Communication, 4(4), 250-253.
marketsandmarkets.com. (2017). Wearable Technology Market by Product (Wristwear, Headwear/Eyewear, Footwear, Neckwear, Bodywear), Type (Smart Textile, Non-Textile), Application (Consumer Electronics, Healthcare, Enterprise & Industrial), and Geography - Global Forecast to 2022.
Mittelstadt, B. (2017, July 04). Ethics of the health-related internet of things: a narrative review. Ethics and Information Technology.
Olson, P. (2016, November 16). Fitbit Data Now Being Used in the Courtroom. Retrieved January 11, 2017, from Forbes Tech: http://www.forbes.com/sites/ parmyolson/2014/11/16/fitbit-datacourt-room-personal-injury-claim
Oprea, D. (2007). Protectia si securitatea informatiilor. Iasi: Polirom.
Poladian, C. (2017, February 23). 5 New Marketing Trends Brought to Us Via Wearables: 2017 Edition. Retrieved from skyword.com: https://www.skyword.com/contentstandard/creativity/5-new-marketing-trends-brought-to-us-via-wearables-2017-edition/
Thierer, A. D. (2015). The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation. Richmond Journal of Law & Technology, XXI(2). Retrieved from http://jolt.richmond.edu/jolt-archive/v21i2/article6.pdf
Tomico, O., & Wilde, D. (2016). Soft, embodied, situated & connected: enriching interaction with soft wearables. The Journal of Mobile User Experience, 5(3), 1-17.
Williams, J. L. (2015). Privacy in the Age of the Internet of Things. Human Rights, 14-16.
(CC BY-NC-ND 3.0) (Since 2014)