228 resultados para Using mobile phones for development
Resumo:
Mobile phones are now powerful and pervasive making them ideal information browsers. The Internet has revolutionized our lives and is a major knowledge sharing media. However, many mobile phone users cannot access the Internet (for financial or technical reasons) and so the mobile Internet has not been fully realized. We propose a novel content delivery network based on both a factual and speculative analysis of today’s technology and analyze its feasibility. If adopted people living in remote regions without Internet will be able to access essential (static) information with periodic updates.
Resumo:
Since the late 1990s, there has been great enthusiasm expressed about the positive impact that can be obtained for poor and disadvantaged people from information and communication technologies (ICTs). This school of thought among researchers and practitioners is identified as ICTs for development (ICT4D). By contrast, a growing number of researchers eschew the technologically deterministic nature of the claims being made for development progress and seek to understand the role of technology in people’s lives, primarily through ethnographic studies. This book, which focuses on mobile telephony on the African continent, fits into the latter body of literature, with several authors explicitly stating they are examining social and cultural settings and are not taking a technologically deterministic view. The book captures the diverse ways various communities are using this communication technology. It adds to the burgeoning field of mobile phone studies, in which an increasing number of studies is emerging from developing countries.
Resumo:
The impact of urban development and climate change has created the impetus to monitor changes in the environment, particularly, the behaviour, habitat and movement of fauna species. The aim of this chapter is to present the design and development of a sensor network based on smart phones to automatically collect and analyse acoustic and visual data for environmental monitoring purposes. Due to the communication and sophisticated programming facilities offered by smart phones, software tools can be developed to allow data to be collected, partially processed and sent to a remote server over the network for storage and further processing. This sensor network which employs a client-server architecture has been deployed in three applications: monitoring a rare bird species near Brisbane Airport, study of koalas behaviour at St Bees Island, and detection of fruit flies. The users of this system include scientists (e.g. ecologists, ornithologists, computer scientists) and community groups participating in data collection or reporting on the environment (e.g. students, bird watchers). The chapter focuses on the following aspects of our research: issues involved in using smart phones as sensors; the overall framework for data acquisition, data quality control, data management and analysis; current and future applications of the smart phone-based sensor network, and our future research directions.
Resumo:
The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impact their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on giving the user a hardware token that generates one-time-passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this paper, we propose a scalable OTP solution using mobile phones and based on trusted computing technology that combines enhanced usability with strong security.
Resumo:
Purpose – This study examines the nature of consumers’ perceptions of the value they derive from the everyday experiential consumption of mobile phones and how mobile marketing (m-marketing) can potentially enhance these value perceptions. Methodology – Q methodology is used to examine how consumers’ subjective perceptions and opinions are shared at a collective level. Forty participants undertook two Q sorts and the data was analysed using PQ-method. Findings – The first Q sort identified three profiles of perceived value: the Mobile Pragmatists, the Mobile Connectors and the Mobile Revellers. The second Q sort identified two profiles of perceived value of m-marketing: one emerging from the shared opinions of the Mobile Pragmatists and the Mobile Connectors, and the second from the Mobile Revellers. Implications/limitations – The findings show how consumers can be segmented based on their contextualised perceived value of consuming mobile phones and how the potential for m-marketing is perceived in ways that can enhance these value perceptions. Limitations relate to deriving statements for the Q sorts and the generalisability of the results. Practical implications – The findings highlight ways to tailor m-marketing strategies to complement consumers’ perceptions of the value offered through their mobile phones. Originality/value of paper – The study contributes to the literature through using Q methodology to examine two subjective areas of consumer behaviour, experiential consumption and consumer perceived value. Keywords mobile phones, mobile phone marketing, consumer perceived value, Q methodology, experiential consumption Classification Research paper
Exploring the opportunities and challenges of using mobile sensing for gamification and achievements
Resumo:
Gamified services delivered on smart phones, such as Foursquare, are able to utilise the sensors on the phone to capture user contexts as a means of triggering game elements. This paper identifies and discusses opportunities and challenges that exist when using mobile sensors as input for game elements. We present initial findings from a field study of a gamified mobile application made to support the university orientation event for new students using game achievements. The study showed that overall the use of context was well received by participants when compared to game elements that required no context to complete. It was also found that using context could help validate that an activity was completed however there were still technical challenges when using sensors that led to exploits in the game elements, or cheating.
Resumo:
This paper presents new research methods that combine the use of location-based, social media on mobile phones with geographic information systems (GIS) to explore connections between people, place and health. It discusses the feasibility, limitations, and benefits of using these methods, which enable real-time, location-based, quantitative data to be collected on the recreation, consumption, and physical activity patterns of urban residents in Brisbane, Queensland. The study employs mechanisms already inherent in popular mobile social media applications (Facebook, Twitter and Foursquare) to collect this data. The research methods presented in this paper are innovative and potentially applicable to an increasing number of academic research areas, as well as to a growing range of service providers that benefit from monitoring consumer behaviour, and responding to emerging changes in these patterns and trends. The ability to both collect and map objective, real-time data about the consumption, leisure, recreation, and physical activity patterns amongst urban communities has direct implications for a range of research disciplines including media studies, advertising, health promotion, social marketing, public health inequalities, and urban design.
Resumo:
Could mobile telephony be harnessed for development in Papua New Guinea (PNG)? Could mobile phones be utilised to enhance the security and prosperity of rural communities? Could mobile phones be a useful tool in the achievement of the PNG 2050 Vision targets? This paper is based on literature review around use of mobile phones in development in Asia, Africa, and the Caribbean. It also draws on discussions with key players in PNG, such as NGOs, UN agencies, donor partners, telecommunication companies and the government of PNG. Anticipated benefits of mobile phone availability have not been fully realised in rural areas of PNG to date due to pricing, difficulties with recharging handset batteries in communities which do not have mains electricity supply, and also concerns about negative social changes related to mobile telephony, for example parental stress over youth forming unsuitable relationships. Nonetheless, there are manifest possible ways for mobile phone technology to change user communication patterns positively regarding economic output. In sectors as diverse as health, education and law and justice, discussions are currently underway to establish how mobile phones could be used to increase service delivery, particularly to rural and marginal communities.
Resumo:
The addition of game design elements to non-game contexts has become known as gamification. Previous research has suggested that framing tedious and non-motivating tasks as game-like can make them enjoyable and motivating (e.g., de Oliveira, et al., 2010; Fujiki, et al., 2007; Chiu, et al., 2009). Smartphone applications lend themselves to being gamified as the underlying mobile technology has the ability to sense user activities and their surrounding environment. These sensed activities can be used to implement and enforce game-like rules based around many physical activities (e.g., exercise, travel, or eating). If researchers wish to investigate this area, they first need an existing gamified application to study. However if an appropriate application does not exist then the researcher may need to create their own gamified prototype to study. Unfortunately, there is little previous research that details or explains the design and integration of game elements to non-game mobile applications. This chapter explores this gap and shares a framework that was used to add videogame-like achievements to an orientation mobile application developed for new university students. The framework proved useful and initial results are discussed from two studies. However, further development of the framework is needed, including further consideration of what makes an effective gamified experience.
Resumo:
This paper reports on the findings of an international telecollaboration study using Facebook, in which teachers studying in M. Ed programs in Australia and Greece, discussed the use of mobile phones in language classrooms. Results suggest that invisible barriers exist in the use of mobile phones in the classroom, including bans on use in schools, lack of familiarity with educational uses for mobile phones, and negative perceptions about mobile phones specifically in terms of classroom management.
Resumo:
This paper examines the issue of face, speaker and bi-modal authentication in mobile environments when there is significant condition mismatch. We introduce this mismatch by enrolling client models on high quality biometric samples obtained on a laptop computer and authenticating them on lower quality biometric samples acquired with a mobile phone. To perform these experiments we develop three novel authentication protocols for the large publicly available MOBIO database. We evaluate state-of-the-art face, speaker and bi-modal authentication techniques and show that inter-session variability modelling using Gaussian mixture models provides a consistently robust system for face, speaker and bi-modal authentication. It is also shown that multi-algorithm fusion provides a consistent performance improvement for face, speaker and bi-modal authentication. Using this bi-modal multi-algorithm system we derive a state-of-the-art authentication system that obtains a half total error rate of 6.3% and 1.9% for Female and Male trials, respectively.