550 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security
Exploring the opportunities and challenges of using mobile sensing for gamification and achievements
Resumo:
Gamified services delivered on smart phones, such as Foursquare, are able to utilise the sensors on the phone to capture user contexts as a means of triggering game elements. This paper identifies and discusses opportunities and challenges that exist when using mobile sensors as input for game elements. We present initial findings from a field study of a gamified mobile application made to support the university orientation event for new students using game achievements. The study showed that overall the use of context was well received by participants when compared to game elements that required no context to complete. It was also found that using context could help validate that an activity was completed however there were still technical challenges when using sensors that led to exploits in the game elements, or cheating.
Resumo:
In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.
Resumo:
The gathering of people in everyday life is intertwined with travelling to negotiated locations. As a result, mobile phones are often used to rearrange meetings when one or more participants are late or cannot make it on time. Our research is based on the hypothesis that the provision of location data can enhance the experience of people who are meeting each other in different locations. Disposable Maps allows users to select contacts from their phone’s address book who then receive up-to-date location data. The utilisation of peer-to-peer notifications and the application of unique URLs for location storage and presentation enable location sharing whilst ensuring users’ location privacy. In contrast to other location sharing services like Google Latitude, Disposable Maps enables ad hoc location sharing to actively selected location receivers for a fixed period of time in a specific given situation.
Resumo:
This paper examines social change following the recent introduction of mobile telephony into rural communities in Papua New Guinea (PNG). It presents the findings of substantial fieldwork conducted in 2009, and suggests ways in which the new technology is already changing people’s lives and relationships. The paper identifies the roles of mobile telephones in two communities, the changes taking place, and how villagers are responding to them. Comparison of the two villages is strategic as it highlights similarities in perceptions of mobile phones in these two very different settings. An ethnographic approach is adopted, situated within an interpretative methodology. Data collection methods include semi-structured interviews, orally-administered surveys and participant observation. The theoretical lens is focused on the ‘communicative ecology’ concept, which stems from the communication research tradition. This research is significant as it addresses changes currently occurring in the communication methods of whole communities.
Resumo:
Public transportation is an environment with great potential for applying innovative ubiquitous computing services to enhance user experiences. This paper provides the underpinning rationale for research that will be looking at how real-time passenger information system deployed by transit authorities can provide a core platform to improve commuters’ user experiences during all stages of their journey. The proposal builds on this platform to inform the design and development of innovative social media, mobile computing and geospatial information applications, with the hope to create fun and meaningful experiences for passengers during their everyday travel. Furthermore, we present the findings of our pilot study that aims to offer a better understanding of passengers’ activities and social interactions during their daily commute.
Resumo:
Nursing personnel are consistently identified as one of the occupational groups most at risk of work-related musculoskeletal disorders. During the moving and handling of bariatric patients, the weight of the patient combined with atypical body mass contributes to a significant risk of injury to the care provider and patient. This is further compounded by the shape, mobility and co-operation of the patient. The aim of this study was determine user experiences and design requirements for mobile hoists with bariatric patients. Structured interviews were conducted with six experienced injury management staff from the Manual Task Services department of three hospitals in Adelaide, South Australia. All staff had experience in patient handling, the use of patient handling equipment and the provision of patient handling training. A series of open-ended questions were structured around five main themes: 1) patient factors; 2) building/vehicle space and design; 3) equipment and furniture; 4) communication; and 5) staff issues. Questions focussed on the use of mobile hoists for lifting and transferring bariatric patients. Interviews were supplemented with a walk-through of the hospital to view the types of mobile hoists used, and the location and storage of equipment. Across the three hospitals there were differing classification systems to define bariatric patients. Ensuring patient dignity, respect and privacy were viewed as important in the management and rehabilitation of bariatric patients. Storage and space constraints were considered factors restricting the use of mobile floor hoists, with ceiling hoists being the preferred method for patient transfers. When using mobile floor hoists, the forces required to push, pull and manoeuvre, as well as sudden unstable movements of the hoist were considered important risks factors giving rise to a risk of injury to the care provider. Record keeping and purchasing policies appeared to inhibit the effective use of patient handling equipment. The moving and handling of bariatric patients presents complex and challenging issues. A co-ordinated and collaborative approach for moving and handling bariatric patients is needed across the range of care providers. Designers must consider both user and patient requirements.
Resumo:
Wikis have proved to be very effective collaboration and knowledge management tools in large variety of fields thanks to their simplicity and flexible nature. Another important development for the internet is the emergence of powerful mobile devices supported by fast and reliable wireless networks. The combination of these developments begs the question of how to extend wikis on mobile devices and how to leverage mobile devices' rich modalities to supplement current wikis. Realizing that composing and consuming through auditory channel is the most natural and efficient way for mobile device user, this paper explores the use of audio as the medium of wiki. Our work, as the first step towards this direction, creates a framework called Mobile Audio Wiki which facilitates asynchronous audio-mediated collaboration on the move. In this paper, we present the design of Mobile Audio Wiki. As a part of such design, we propose an innovative approach for a light-weight audio content annotation system for enabling group editing, versioning and cross-linking among audio clips. To elucidate the novel collaboration model introduced by Mobile Audio Wiki, its four usage modes are identified and presented in storyboard format. Finally, we describe the initial design for presentation and navigation of Mobile Audio Wiki.
Resumo:
Sustainable property practices will be essential for Australia’s future. The various levels of government offer incentives aimed at encouraging residents to participate in sustainable practices. Many of these programmes however are only accessible by owner occupiers, or landlords and tenants with long term tenancies. Improving security of tenure for tenants, to enable longer term tenancies, would positively impact upon property practices. This article explains what security of tenure is and identifies how a lack of security of tenure adversely impacts property practices. By comparison with Genevan property practices, it concludes by making suggestions as to how security of tenure can be reinforced.
Resumo:
This paper presents new research methods that combine the use of location-based, social media on mobile phones with geographic information systems (GIS) to explore connections between people, place and health. It discusses the feasibility, limitations, and benefits of using these methods, which enable real-time, location-based, quantitative data to be collected on the recreation, consumption, and physical activity patterns of urban residents in Brisbane, Queensland. The study employs mechanisms already inherent in popular mobile social media applications (Facebook, Twitter and Foursquare) to collect this data. The research methods presented in this paper are innovative and potentially applicable to an increasing number of academic research areas, as well as to a growing range of service providers that benefit from monitoring consumer behaviour, and responding to emerging changes in these patterns and trends. The ability to both collect and map objective, real-time data about the consumption, leisure, recreation, and physical activity patterns amongst urban communities has direct implications for a range of research disciplines including media studies, advertising, health promotion, social marketing, public health inequalities, and urban design.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
A distributed fuzzy system is a real-time fuzzy system in which the input, output and computation may be located on different networked computing nodes. The ability for a distributed software application, such as a distributed fuzzy system, to adapt to changes in the computing network at runtime can provide real-time performance improvement and fault-tolerance. This paper introduces an Adaptable Mobile Component Framework (AMCF) that provides a distributed dataflow-based platform with a fine-grained level of runtime reconfigurability. The execution location of small fragments (possibly as little as few machine-code instructions) of an AMCF application can be moved between different computing nodes at runtime. A case study is included that demonstrates the applicability of the AMCF to a distributed fuzzy system scenario involving multiple physical agents (such as autonomous robots). Using the AMCF, fuzzy systems can now be developed such that they can be distributed automatically across multiple computing nodes and are adaptable to runtime changes in the networked computing environment. This provides the opportunity to improve the performance of fuzzy systems deployed in scenarios where the computing environment is resource-constrained and volatile, such as multiple autonomous robots, smart environments and sensor networks.
Resumo:
The iPhone represents an important moment in both the short history of mobile media and the long history of cultural technologies. Like the Walkman of the 1980s, it marks a juncture in which notions about identity, individualism, lifestyle and sociality require rearticulation. This book explores not only the iPhone’s particular characteristics, uses and "affects," but also how the "iPhone moment" functions as a barometer for broader patterns of change. In the iPhone moment, this study considers the convergent trajectories in the evolution of digital and mobile culture, and their implications for future scholarship. Through the lens of the iPhone—as a symbol, culture and a set of material practices around contemporary convergent mobile media—the essays collected here explore the most productive theoretical and methodological approaches for grasping media practice, consumer culture and networked communication in the twenty-first century.
Resumo:
Book Description: The iPhone represents an important moment in both the short history of mobile media and the long history of cultural technologies. Like the Walkman of the 1980s, it marks a juncture in which notions about identity, individualism, lifestyle and sociality require rearticulation. this book explores not only the iPhone’s particular characteristics, uses and "affects," but also how the "iPhone moment" functions as a barometer for broader patterns of change. In the iPhone moment, this study considers the convergent trajectories in the evolution of digital and mobile culture, and their implications for future scholarship. Through the lens of the iPhone—as a symbol, culture and a set of material practices around contemporary convergent mobile media—the essays collected here explore the most productive theoretical and methodological approaches for grasping media practice, consumer culture and networked communication in the twenty-first century.
Resumo:
In this paper, we present an account of children's interactions with a mobile technology prototype within the school context. The noise detectives trial was conducted in a school setting with the aim of better understanding the role of mobile resources as mediators within science and environmental learning activities. Over 80 children, aged between 10 and 12, completed an outdoor data-gathering activity, using a mobile learning prototype that included paper and software components. They measured and recorded noise levels in various locations throughout the school. We analysed the activity to determine how the components of the prototype were integrated into the learning activity, and to identify differences in behaviour that resulted from using these components. We present design implications that resulted from observed differences in prototype use and appropriation.