Privacy Issues Surrounding Wearable Technology

Tom Page*
Senior Lecturer, Loughborough Design School, United Kingdom.
Periodicity:September - November'2015
DOI : https://doi.org/10.26634/jit.4.4.3643

Abstract

Wearable devices give people the ability to track almost every facet of the lives through being embedded with a multitude of sensors. The collection of data through the use of these sensors is called 'personal metrics' - the quantification of everyday activity in order to change, improve or understand human behaviour. In order to deliver meaningful insight to the user, these personal metrics need to be sent to companies for analysis. This collection of data from companies ultimately causes complex concerns for consumer's privacy, most notably among young consumers, who are widely reported as having an increased acceptance for the sharing of their data. The study was achieved through first gaining-an understanding into the research area through reviewing literature, and then conducting primary research through an online survey. Overall, it was found that education into app privacy regulation and companies' use of data alone didn't have much effect on young adult consumer's behaviours. Furthermore, it was concluded that, young adult consumers appear to have an acceptance for the loss of their privacy, however some behaviours appear to show a level of concern. Nonetheless, due to limitations in the methodology of the research undertaken, it was concluded that further studies would be required in order to ensure the validity of the data.

Keywords

Wearable Technology, Privacy Concerns, Big Data.

How to Cite this Article?

Page. T (2015). Privacy Issues Surrounding Wearable Technology. i-manager’s Journal on Information Technology, 4(4), 1-16. https://doi.org/10.26634/jit.4.4.3643

References

[1]. Abelson, H., Ledeen, K. and Lewis, H., (2008). Blown to bits: your life, liberty, and happiness after the digital explosion,. 1st ed. s.l.:Addison-Wesley Professional.
[2]. Accenture, (2014). “Racing Towards a Complete Digital Lifestyle: Digital Consumers Crave More”: Accentrue Digital Consumer Survey, s.l.: s.n.
[3]. Ackerman, L., (2013). Mobile Health and Fitness Applications and Information Privacy, San Diego: Privacy Right Clearinghouse.
[4]. Barcena, M. B., Wueest, C. and Lau, H., (2014). “Security Response: How safe is your quantified self?”, s.l.: Symantec.
[5]. Becker, B. W. (2014). “The Quantified Self: Balancing Privacy and Personal”. Behavioural and Social Sciences Librarian, Vol. 33, No. 4, pp. 212-215.
[6]. Buchanan, T. et al., (2007). “Internet users' perceptions of 'privacy concerns' and 'privacy actions”. International Journal of Human-Computer Studies, Vol. 65, pp. 526- 536.
[7]. Common Sense Media, (2009). Digital Literacy and Citizenship, in the 21st century. s.l.:s.n.
[8]. Cortez, N., (2013). The Mobile Health revolution?, UC Davis Law Review, Volume 47.
[9]. Davies, N., (2003). “Security and Privacy”. Persuasive Computing IEEE, Vol. 2(1), pp. 20.
[10]. Executive office of the President, (2014). Big Data: Seizing opportunities, Preserving values, Washington: The White House.
[11]. Gavison, R. E., (1980). “Privacy and the Limits of Law”. The Yale Law Journal, Vol. 89, No. 3, pp. 421-471.
[12]. Hawkins, N. et al., (2010). “Assessing the Privacy Risks of Data Sharing in Genomics”. Public Health Genomics, Vol. 14, No. 1, pp. 17-25.
[13]. Ho, J.-J., Novick, S. and Yeung, C., (2014). A Snapshot of Data Sharing by Select Health and Fitness Apps, s.l.:Federal Trade Commission.
[14]. Hoofnagle, C., King, J., Li, S. and Turow, J., (2010). “How different are young adults from older adults when it come to information attitudes and policies?” s.l.:s.n.
[15]. Jones, D. and Paton, B., (2014). What Price? The currency of Privacy,. Sydney : Reactive.
[16]. Khan, M. Y., Darwish, A. & Tyagi, S., (2014). “Managing computing infrastructure for IoT Data”. Advances in Internet of Things, Vol.4, pp. 29-35.
[17]. Mann, S., (2014). The Encyclopedia of Human- Computer Interaction,. 2nd ed. Aarhus: The Interaction Design Foundation.
[18]. May, T., (2011). Social Research. 4th ed. Maidenhead: Open University Press.
[19]. McGivern, Y., (2008). The practice of market research: An introduction,. s.l.:Pearson Education .
[20]. Park, S. and Jayaraman, S., (2014). “A Transdisciplinary Approach to Wearables”, Big Data and Quality of Life. IEEE, pp. 4155-4158.
[21]. Pricewaterhousecoopers, (2014). The Wearable Future, s.l.: s.n.
[22]. Ribble, M. S., Bailey, G. D. and Ross, T. W., (2004). “Digital citizenship: Addressing Appropriate Technology Behaviour”. Learning and Leading with Technology, Vol. 32, pp. 6-11.
[23]. Robson, C., (2002). Real World Research,. 2nd ed. Oxford: Blackwell Publishing.
[24]. Shilton, K., (2009). “Four Billion Little Brothers: Privacy, mobile phones and ubiquitous data collection”. Communication of the ACM, Vol. 52, No. 11, pp. 49-53.
[25]. Shin, D.-H., (2010). “The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption”. Interacting with Computers, Vol. 22, No. 5, pp. 428-438.
[26]. Solove, D. J., (2008). Understanding Privacy,. s.l.:Harvard University Press.
[27]. Spiekermann, S. and Novotny, A., (2015). “A vision for global privacy bridges: Technical and legal measures for international data markets”. Computer Law and Security Review, Vol. 31, No. 2, pp. 181-200.
[28]. Thierer, A. (2014a). “The Internet of things and Wearable technology”, Arlington: Mercatus Centre.
[29]. Thierer, A. (2014b). “Privacy Law's Precautionary Principle Problem”. Maine Law Review, Vol. 66, No. 2, pp.482-486.
[30]. Walters, R., (2014). Cyber attacks on US Companies in 2014, s.l.: The Heritage Foundation.
[31]. Weintraub, K., (2013). “Quantified self: The techbased route to a better life?”. [Online]. Retrieved from: http://scripts.mit.edu/~schull/nds/wp-content/uploads/2013/01/bbc.pdf[Accessed 21/08/2015].
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.