• Title/Summary/Keyword: Wearable device & service

Search Result 55, Processing Time 0.024 seconds

Strategic Approach to Privacy Calculus of Wearable Device User Regarding Information Disclosure and Continuance Intention

  • Cho, Ji Yeon;Ko, Daesun;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3356-3374
    • /
    • 2018
  • The healthcare and fitness wearable-device market is considered as the driving force of the entire wearable device market. However, there are concerns with respect to information privacy because wearable devices constantly collect sensitive data such as individuals' health information. Thus, there is a need for a comprehensive understanding from the perspective of information privacy concerns and related behavior. This study investigates factors considered in the privacy calculus of wearable fitness devices, and verifies differences obtained by the privacy calculus process according to the frequency of exercise. The results obtained from a survey of 248 undergraduate students in Korea revealed that service providers should consider users' interests and exercise characteristics in order to mitigate their privacy concerns and encourage continuous use of wearable devices. This study provides useful insights pertaining to users of wearable fitness devices, and targets researchers and practitioners.

Service Infrastructure of Wearable Computing (웨어러블 컴퓨팅을 위한 서비스 인프라 구조)

  • Han, Dong-Won;Park, Jun-Seok;Cho, Il-Yeon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.24 no.1
    • /
    • pp.43-46
    • /
    • 2005
  • The future information technologies and service paradigm will move from PC, the general purpose desktop computing environment, to the next-generation PC that provides information any where, any time, and any device. The next-generation PC such as wearable computers are specialized to the human-centric functionalities and always-on connected services. In this study, service infrastructure of wearable computing with WBAN(Wearable Body Area Network) was suggested for the ubiquitous computing environment.

Artificial intelligence wearable platform that supports the life cycle of the visually impaired (시각장애인의 라이프 사이클을 지원하는 인공지능 웨어러블 플랫폼)

  • Park, Siwoong;Kim, Jeung Eun;Kang, Hyun Seo;Park, Hyoung Jun
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.20-28
    • /
    • 2020
  • In this paper, a voice, object, and optical character recognition platform including voice recognition-based smart wearable devices, smart devices, and web AI servers was proposed as an appropriate technology to help the visually impaired to live independently by learning the life cycle of the visually impaired in advance. The wearable device for the visually impaired was designed and manufactured with a reverse neckband structure to increase the convenience of wearing and the efficiency of object recognition. And the high-sensitivity small microphone and speaker attached to the wearable device was configured to support the voice recognition interface function consisting of the app of the smart device linked to the wearable device. From experimental results, the voice, object, and optical character recognition service used open source and Google APIs in the web AI server, and it was confirmed that the accuracy of voice, object and optical character recognition of the service platform achieved an average of 90% or more.

  • PDF

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

Protocol Design for Opportunistic Direct M2M Communication in Wearable Computing Environment (웨어러블 단말과 이웃 단말 간 기회기반 직접 사물통신 프로토콜 설계)

  • Oh, Young-Ho;Lee, Jae-Shin;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.151-163
    • /
    • 2014
  • The recent wearable device's applications concentrates on providing diverse services such as location based service, context aware service to the users. These various services are implemented by the interactions between the wearable device and the user. In the legacy system, the interaction requires certain explicit configuration from the user. If the user is unfamiliar with the IT technology, it will be impossible to get the wanted service. Therefore, a new autonomous communication concept among neighbor devices is essential for people who is unfamiliar with the IT technology. The implicit human computer interface enables the user to acquire the services, even though the user don't know the IT technology. In this paper, we propose two BLE based protocols (B-LIDx protocol, B-PniP). B-LIDx protocol is the protocol for locationing the mobile device in indoor. B-PniP is a zero-configure opportunistic direct M2M communication protocol between neighbor devices to achieve the autonomous communication concept with zero-configuration. The protocol's evaluations are performed by measuring the time for finding the location of a mobile device in actual environment and aligning the time spent in services using the B-PniP.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.

Deduction of Humanistic Metaphor based on Searching, Participation, Sharing and Analysis of Wearable Device (웨어러블 디바이스의 검색, 참여, 공유, 분석을 통한 인문학적 메타포 도출)

  • Lee, Won-Tae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.125-130
    • /
    • 2014
  • According to the lunching of Google glass, the interest for wearable computer is increasing. This paper is about how to apply humanity or humanist metaphor to the development and application of wearable computer. Humanity is consisted of dream, imagination and desire of human mind. However the software development methodology and application design of engineering part are consisted of the logical language and also they are testable. In this paper the different academics are combined and researched to develop the human-friendly application which are the design of humanities-applying wearable computer and the service scenarios. This paper shows the specific examples of services to search, share and analyze the information with wearable computer also presents what kinds of humanistic metaphor is able to apply in this process.

Wearable Device based Discrimination Algorithm for Dangerous Situation (웨어러블 디바이스 기반 위험상황 식별 알고리즘)

  • Yu, Dong-Gyun;Cho, Kwang-Hee;Hwang, Jong-Sun;Kim, Han-Kil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.605-606
    • /
    • 2016
  • Recently utilizing various wearable device has been going research to provide new services. Conventional wearable devices provide a service to a user by measuring the biological information. However, by measuring the biometric information such a situation the value of the algorithm, the user state and insufficient technology. In this paper, by utilizing an acceleration sensor and the rate sensor set a threshold for measuring the biological information, and heart rate and movement in order to solve this problem. And it proposes an algorithm to cope with the user's status and identifying emergency situations.

  • PDF