Good Intentions, Risky Inventions: A Method for Assessing the Risks and Benefits of AI in Mobile and Wearable Uses
Integrating Artificial Intelligence (AI) into mobile and wearables offers numerous benefits at
individual, societal, and environmental levels. Yet, it also spotlights concerns over emerging …
individual, societal, and environmental levels. Yet, it also spotlights concerns over emerging …
[HTML][HTML] Wearable Sensor-Based Behavioral User Authentication Using a Hybrid Deep Learning Approach with Squeeze-and-Excitation Mechanism
Behavior-based user authentication has arisen as a viable method for strengthening
cybersecurity in an age of pervasive wearable and mobile technologies. This research …
cybersecurity in an age of pervasive wearable and mobile technologies. This research …
IWTW: A Framework for IoWT Cyber Threat Analysis.
GH Jeon, H **, JH Lee, S Jeon… - … -Computer Modeling in …, 2024 - search.ebscohost.com
Abstract The Internet of Wearable Things (IoWT) or Wearable Internet of Things (WIoT) is a
new paradigm that combines IoT and wearable technology. Advances in IoT technology …
new paradigm that combines IoT and wearable technology. Advances in IoT technology …
Human-Centered Edge AI and Wearable Technology for Workplace Health and Safety in Industry 5.0
This research explores the integration of human-centered edge artificial intelligence (AI) and
wearable technology to enhance workplace health and safety within Industry 5.0. It …
wearable technology to enhance workplace health and safety within Industry 5.0. It …
Long-Range Stealth Mode Wi-Fi Surveillance and Interception System
V Pavithran, S Chandran… - 2023 14th International …, 2023 - ieeexplore.ieee.org
The ubiquitous presence of the Internet in all aspects is a necessary component of modern-
day living. It is very easy to access the Internet through free public Wi-Fi, which can be found …
day living. It is very easy to access the Internet through free public Wi-Fi, which can be found …
Data Protection—Issues and Perspectives
I Gupta - Expectations vs Realities of Information Privacy and …, 2025 - Springer
The objective is to place the data subject in focus while deciding the course of actions that
protect and prevent the misuse of personal information. Often, the data controllers or those …
protect and prevent the misuse of personal information. Often, the data controllers or those …
[PDF][PDF] Usable Privacy and Security Features in Smartwatches
M Mäkelä - 2024 - trepo.tuni.fi
Tampere University Master's Degree Program in Information and Knowledge Management
Examiners: Ilona Ilvonen and Janne Lindqvist Advisor: Amel Bourdoucen June 2024 The …
Examiners: Ilona Ilvonen and Janne Lindqvist Advisor: Amel Bourdoucen June 2024 The …
Privacy Analysis and Compliance Approach with a Focus on Children
Y Huang - 2024 - zora.uzh.ch
In recent years, with wearable technologies being brought to use, a significant number of
risks have arisen due to the collection and processing of sensitive personal information …
risks have arisen due to the collection and processing of sensitive personal information …
The Effects of Inadequate Cybersecurity Controls on Data Integrity in Wearable IoT Devices
B Abdullah - 2024 - search.proquest.com
The noticeable growth of the Internet of Things extends the phenomenal global Internet that
facilitates connections and collecting data without human intervention. The problem is that …
facilitates connections and collecting data without human intervention. The problem is that …
Urinary Incontinence Detector for MS Patients: A Blended Intensive Program Project
B Vullers, J Smid, G Pashalis, D Goutzounis… - International conference …, 2022 - Springer
The disease multiple sclerosis (MS) is causing immense stress in many lives today, and
evidence shows a lack of technological advances to effectively treat its symptoms. One of the …
evidence shows a lack of technological advances to effectively treat its symptoms. One of the …