Edudorm Facebook

The impact of Fitbit and Apple watches in the health and fitness sector and the security measures put in place to safeguard personal data gathered from the publi

Introduction

A transformation is happening regarding on how people handle their health matters. Mobile devices enable people to have a constant accessibility to individual health data. Wearable devices, for example, Fitbit, and Apple’s smartwatch can amass information uninterruptedly and give insights on a user’s well-being status and fitness (Ching, & Singh, 2016). Nevertheless, absence of interoperability and existence of silos hinder the users from receiving a cohesive medical and fitness information. For the sake of providing improved health results and give users a complete picture of their health status, additional information comes in handy hence begging the question if the personal information collected from the public is safe and sound and no one is using it for malicious activities. This paper explores and discusses the impact of Fitbit and Apple watches in the health and fitness sector and the security measures put in place to safeguard personal data gathered from the public.

Specific objectives

  • Exploring effects of Fitbit and Apple watches
  • To determine the security and privacy of the information collected
  • To determine the pros and cons of Fitbit and apple applications and devices

Justification of the research

Wearable Technology commonly known as wearable devices is a group of technological equipment with minimal processing competences hence the user can don the device with the objective of giving personal data and enabling accessibility to the device by a third party. The function of the third party is to assess the personal information received and then formulate a feedback to the wearable device. Examples of wearable devices are Fitbit equipment and Apple watches (Ching, & Singh, 2016). Nevertheless, wearable equipment is still at its initial stages of development and might be vulnerable to manipulation hence comprising the privacy and security of its users. Consequently, the public is reluctant thus; Fitbits and Apple watches received lukewarm reception in some parts of the society, as members of the community remain skeptical.

There exist some safety loopholes, which makes wearable devices susceptible to a cyber-attack. One of the perilous attacks criminals can launch on wearable technology is verification issues (Ching, & Singh, 2016). The minimal processing because of lower computing power of the wearable equipment hinder the developer from incorporating complex security mechanisms and set of rules for better safeguarded device.

 Fitbit devices

Fitbit is a merchandise dedicated to smart fitness bands, donned on the wrists. It is able to measure human tasks, for instance, the distance walked, quality or duration of sleep and various other individual well-being metrics such as heartbeat and physical temperature. Nevertheless, one of the glaring security weakness in Fitbit is authentication (Christovich, 2016). An estimated 17 to 19 users claimed that Fitbit devices do not have a verification on the tracker side and any assailant can gain entry into the system without the user recognizing the actions. For instance, Mahmudur made an instrument whose aim was launching numerous attacks on Fitbit devices. The technological tools were to trigger information injection assaults and drain the power supply. Mahmudur proved his point and unveiled the weakness within the devices as he gained access to personal information and then manipulate the personal health information is easy and manageable.

Literature review

            Ever since the year 2007, researchers worked closely with third party firms connecting Android applications such as Fitbit to sensors, wearable technological instruments and other server frameworks hence swapping health and fitness information Primarily, Fitbit applications  only gathered information whose origin was wireless sensors linked to mobile phones or physical entries, the phone would store the information (Christovich, 2016). Relying on the users’ feedback and opinions, one aspect remained clear: users wanted complete control of their personal information and collective information from all other sources, which previously had them.

Fitbits devices developed to meet the fitness needs of users and tailor exercises based on the needs of the users while checking biometric information such as heartbeat, and temperature. The software support various languages and are commercial available in any store. A research conducted by California institution, printed a journal, assessed information entailing an estimated 15,000 Americans, cautioning the privacy policies of wearable devices. Then, the study concluded that legislatures needed to make amendments on the existing regulations to enhance privacy and security (Christovich, 2016). Whether using Fitbit or Apple watch, information collected via the applications on these smart devices generates an enticing origin of data for more corrupt individuals More so, many expert advisors point out an impending danger if administrators and other major stakeholders fail to deal with privacy and security issues. For instance, if one totally strips off classifying personal information from smart devices, it does not protect users as much as the public would like to think. Another person can return and assemble back the data if given access to the right kind of information. For illustration, Facebook is able to collect personal data from the application on users’ mobile phones then purchase health care information from an alternative organization and then compare the two. Subsequently they would be able to match each users’ medical data with their respective names. In the end, companies may rely on the information for advertisement purposes or can sell the information to willing buyers.

 Method Design

The methodology design had 20 volunteers who worked out a minimum of four days per week (Wright, & Keith, 2014). Ten out of the 20 people wore Fitbit and the rest of the participants wore Apple watches. The two groups of ten peoples subdivided into two more groups of people of five and each person had a specific application assigned to their phones for utilization. Researchers recorded the data on a weekly basis over a period of three months and monitored the manner in which the applications stored information. Then the researchers had a time to analyze the security and privacy of each of the participants.

Results

            The ten participants who used Apple watches experienced better security and privacy than participants who utilized Fitbits. In terms of features, the researchers observed that the participants with Apple watches had a passcode for unlocking the device, similar to an iPhone passcode (Wright, & Keith, 2014). This fundamental security trait deters any other person from possessing the watch and accessing its personal information and manipulating the personal data. Suppose a participant lost his or her watch, the first course of action is to take the iPhone, click on the Apple watch application. Select the apple watch from the tariff and click the find button. This trait will permit the user to find his or her apple watch based on the map. Alternatively, one can locate an apple watch through iCloud found on the web browser. The browser has the finding features as the menu.

            If any of the participants activate lost mode, the entire Apple pay card on the Apple watch inactivated hence thieves cannot access financial information (Wright, & Keith, 2014). Even if thieves gain access to the device, erase all information, the device will be useless to them due to Apple ID and passcode.

            One of the most crucial traits of the Apple watch is the linking the iPhone and the Apple watch hence a user can clearly see as notifications reach on the iPhone (Wright, & Keith, 2014). To some people this comprises privacy as anything on the iPhone appears on the Apple watch thus increasing the person for

Apple’s key also known as, notification privacy enables users to access notifications but does not display the particulars until one presses the alert on the watch (Brown, 2016). These mechanisms enhance privacy issues and keep information private for the sake of the users.

The as observed from the participants using the Apple watches, the particulars Apple watches are unique (Brown, 2016). For the people working out for more than 45 minutes, the apple watch was able to calculate the body temperature, heartbeat and give accurate feedback on various aspects that needed improving.

 As stated earlier, the apple watch device has a GPS system attached to it hence the smartwatch hence Apple tracking technology is able to track vital aspects and record metric information generated by the user (Brown, 2016). More so, the watch depends on the iPhone for better interlock features, which in turn increase the security framework of the watch and safeguard personal information.

Fitbit

 On the other side of the spectrum, ten out of the twenty participants used Fitbit watches during their workouts. One challenge that everyone had with Fitbit devices is the longevity of the Fitbit wrists. The battery drained quickly and was not sustainable at all. Therefore keeping track of their fitness was a great challenge and the loss of information was eminent due to the switch off caused by battery. One would think that a company specializing in fitness devices would pay close attention an elongated battery life but this was not the case with Fitbit devices according to the observations recorded from the device. Some users claimed that calling it fitness trackers was not a proper term for the device, as it equals improper advertisement. A tracker should be a device that meets all the needs of the user and reliable (Addonizio, 2017). In spite of the weakness, the device can store and track information of the participants as they went about their workout. Considering its ability to only track the physical activities, the tracker is able to track the progress uninterruptedly.

Security analysis

Fitbit was one of the wearable devices and it facilitated the development of the wearable technology. There are minimal investigation results pointing to the susceptibility of security and privacy issues on Apple and Fitbit watches. For example, the Fitbit device lacks sufficient PIN framework for authentication measures to take proper effect. Besides verification matters, the research unveiled, that privacy of the users may be at risk and the developers need to change the entire system used for safeguarding personal information (Addonizio, 2017). More so, evidence from the personal data. For example, engineers at security institutions claim that severe security weaknesses on the manner in which the devices deduce information cods may breach privacy and comprise the privacy of the users. Therefore, the need to change the entire system and program another system to cater to the security needs of the users.

 Recommendations

            All users donning wearable devices should be well aware of the potential risks associated with the devices. Even though Apple devices have good security measures, users should be well aware of the aspects that might endanger their security (Addonizio, 2017). In order to formulate recommendations, experts, or developers should identify points of weakness and create new ways of closing the loopholes causing insecurity and initiating sustainable measures encrypted in the device.

There are insufficient major predicaments facing the wearable technology namely: batter life, message mechanisms, design constraints, and safety and confidentiality matters. Likewise, the key predicaments and the solutions might align or match the challenges. First step is increasing the battery life (Islam, et.al, 2015). The battery for wearable devices should last for more than two days so the device remains operational and prevent any hacking activities that might take place when the device is inactive. Secondly, communication mechanisms of the devices must be narrow to increases power storage and limit wireless hacking from nearby devices. More so, the design has to cater to the needs of people while at the same time offering protection to the users.

Big data management as a means of improving wearable device

Regardless of the type of  wearable one is operating, an entrepreneur needs to make use of valued data and ideals, which assists in good marketing skills, isolating the target audience, understanding the needs of the market, preferences hence making it easy tailor the business based on the client requirements (Islam, et.al, 2015). In order to do all of the above, one needs big data. Big data plays a central role in any business entity.

            According to already available, reliable information the elements of big data strategy relies on effective application and strategy of big data relies on cloud. This is due to the fact that external data exists outside the business than inside the business and its confines. Hence, the dependence on external data especially with the ever growing amounts of data streaming in from various sources (Peppet, 2014). The best ways of storing big data is through the cloud systems. Cloud systems have no limit or a given capacity.

            Business enterprises have huge amounts of data at their convenience. The only challenge is deriving any meaning from the vast data resources and then interpreting knowledge into actionable strategy (Peppet, 2014). Some companies adopted advanced analytics to manage wearable devices. The ability of changing learning culture or acknowledging culture from traditions depend on simple data or analog systems is an uphill task thus the need of applying technology and data.

 One of the tools of managing data is the charter of an institute, the policies, and functions, interaction of the firm with the market, structure, and forms of operations within the organization, which will in turn give people a solid framework for safeguarding information (Islam, et.al, 2015). All of the above will help one designate data according to relevant functions, align goals to the subject matter of the company for the sake of gaining need, and achieve short and long-term goals effectively. In short, management of big data and channeling all the effort through big data interpretation and management gives accomplishes project goals.

Benefits of wearable technology devices

Technology comes with simplified means of conducting activities. There is no sector in the life of human not touched or influenced by technology. From the brightest minds in the Silicon Valley to a cave man, if there is any in the 21st century, all acknowledge the power of technology (Islam, et.al, 2015). Technology will not slow down anytime form now. One of the distinct benefits is in the health sector. With emerging equipment, come better diagnosis of diseases and accurate treatment of t the disease. This prolongs the life of humans and gives them a chance to live happier and healthier lives.

It changed the society by turning it into a global village. Internet is the most powerful advancements in the world of technology. The connectivity   that comes with it changes many things (Sehgal et.al, 2015). The convention way of doing business entirely altered due to internet .Initially, advertisements existed only on print media, but the presence of internet makes it possible to advertise products anywhere. In addition, social media makes sharing of information easier and cheaper. One can communicate with other people from faraway places

The work environment changed corresponding to the dynamic technological world. Technology led to the emergence of online working and teleconferencing (Sehgal et.al, 2015). This means that one does not need to be physically in the office, as traditionally expected.

How can society manage emerging technology?

Technology is expanding at an alarming rate than and if one cannot contain it through management; it can wreak havoc within the society. Emerging technology has come with lack cybercrime and destruction of the environment due to the natural resources consumed in their manufacture (Sehgal et.al, 2015). Companies need to come up with policies that will enable them come up with strategies to safe guard people from other criminals that might steal their information .Obviously tech companies have stipulations that protect the consumer but the measures should extend to other service providers such as salespersons. Moreover, tech companies can raise awareness on the ways one can manage technology and use it for the good of the society.

 Conclusion

 The research’s aim was to explore the privacy and challenges facing Fitbit and Apple watches users. Wearable devices have the ability to measure metric information and then submit feedback based on the information received. Wearable devices have low processing capabilities hence exposing the technology to hackers and other cybercriminal activities. More so, organizations making the devices may sell the information to other companies that might convert the personal information for monetary gain. Fitbit devices have favorable devices but the battery longevity is poor hence the device does not remain operational for along time. Fitbits devices developed to meet the fitness needs of users and tailor exercises based on the needs of the users while checking biometric information such as heartbeat, and temperature. The software support various languages and are commercial available in any store. A research conducted by California institution, printed a journal, assessed information entailing an estimated 15,000 Americans, cautioning the privacy policies of wearable devices. On the other side, Apple watches have various features which enhance. For instance, finger prints and scanning technology increases the security around and privacy. Fitbit is comfortable and only needs to access simple personal information in order to tailor the needs of the people based on the information revealed. In the past years expert observed that the data generated during the usage of the wearable devices is vulnerable and the companies can use it for different purposes without the knowledge of users.

 

 

References

 

Addonizio, G. (2017). The privacy risks surrounding consumer health and fitness apps, associated wearable devices, and HIPAA’s limitations.

Brown, E. A. (2016). The Fitbit fault line: two proposals to protect health and fitness data at work. Yale J. Health Pol'y L. & Ethics, 16, 1.

Ching, K. W., & Singh, M. M. (2016). Wearable technology devices security and privacy vulnerability analysis. Int. J. Netw. Secur. Appl, 8(3), 19-30.

Christovich, M. M. (2016). Why Should We Care What Fitbit Shares-A Proposed Statutroy Solution to Protect Sensative Personal Fitness Information. Hastings Comm. & Ent. LJ, 38, 91.

Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak, K. S. (2015). The internet of things for health care: a comprehensive survey. IEEE Access, 3, 678-708.

Peppet, S. R. (2014). Regulating the internet of things: first steps toward managing discrimination, privacy, security and consent. Tex. L. Rev., 93, 85.

Sehgal, V. K., Patrick, A., Soni, A., & Rajput, L. (2015). Smart human security framework using internet of things, cloud and fog computing. In Intelligent distributed computing (pp. 251-263). Springer, Cham.

Wright, R., & Keith, L. (2014). Wearable technology: If the tech fits, wear it. Journal of Electronic Resources in Medical Libraries, 11(4), 204-216.

3038 Words  11 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...