550 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this study, we explore the design and evaluation of a mobile online discussion system for motivating students to share their learning experiences. The system supports interaction with peers and academic staff anytime and anywhere using mobile devices. The application introduces a set of features that enables customisation for different purposes. This paper describes the application and explains the motivation for developing the application. We describe the methods and results of a case study that explores usage of the application among a small group of localised participants. Finally, we discuss the implications of this work and outline future areas of research and development.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mobile devices are becoming indispensable personal assistants in people's daily life as these devices support work, study, play and socializing activities. The multi-modal sensors and rich features of smartphones can capture abundant information about users' life experience, such as taking photos or videos on what they see and hear, and organizing their tasks and activities using calendar, to-do lists, and notes. Such vast information can become useful to help users recalling episodic memories and reminisce about meaningful experiences. In this paper, we propose to apply autobiographical memory framework to provide an effective mechanism to structure mobile life-log data. The proposed model is an attempt towards a more complete personal life-log indexing model, which will support long term capture, organization, and retrieval. To demonstrate the benefits of the proposed model, we propose some design solutions for enabling users-driven capture, annotation, and retrieval of autobiographical multimedia chronicles tools.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Binge drinking is an important issue in Australia and worldwide. Existing studies have shown that mobile tools provide an effective method to self-monitor drink sessions, whereas social tool such as Facebook, can be used to construct social drinker identity (thus normalizing binge drinking), but if used among a peer-support that promotes the importance of responsible drinking, it potentially can be effective in moderating alcohol consumption. To combine mobile and social tool approaches, the study involves two complementary and largely qualitative studies to inform a novel design of an engaging mobile social tool for supporting responsible drinking among young women: (1) a survey of literature and mobile tools on alcohol related studies and interventions; (2) an in-depth focus group interview among young women aged 18 to 24. The results and discussions provide some valuable insights for future research and development in the field.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Despite the rapidly urbanising population, public transport usage in metropolitan areas is not growing at a level that corresponds to the trend. Many people are reluctant to travel using public transport, as it is commonly associated with unpleasant experiences such as limited services, long wait time, and crowded spaces. This study aims to explore the use of mobile spatial interactions and services, and investigate their potential to increase the enjoyment of our everyday commuting experience. The main goal is to develop and evaluate mobile-mediated design interventions to foster interactions for and among passengers, as well as between passengers and public transport infrastructures, with the aim to positively influence the experience of commuting. Ultimately, this study hopes to generate findings and knowledge towards creating a more enjoyable public transport experience, as well as to explore innovative uses of mobile technologies and context-aware services for the urban lifestyle.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The smart phones we carry with us are becoming ubiquitous with everyday life and the sensing capabilities of these devices allow us to provide context-aware services. In this paper, we discuss the development of UniNav, a context-aware mobile application that delivers personalised campus maps for universities. The application utilises university students’ details to provide information and services that are relevant and important to them. It helps students to navigate within the campus and become familiar with their university environment quickly. A study was undertaken to evaluate the acceptability and usefulness of the campus map, as well as the impact on a users’ navigation efficiency by utilising the personal and environmental contexts. The result indicates the integration of personal and environmental contexts on digital maps can improve its usefulness and navigation efficiency.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Preparing valuations is a time consuming process involving site inspections, research and report formulation. The ease of access to the internet has changed how and where valuations may be undertaken. No longer is it necessary to return to the office to finalise reports, or leave your desk in order to undertake research. This enables more streamlined service delivery and is viewed as a positive. However, it is not without negative impacts. This paper seeks to inform practitioners of the work environment changes flowing from increased access to the internet. It identifies how increased accessibility to, and use of, technology and the internet has, and will continue to, impact upon valuation service provision into the future.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We conducted a randomized controlled trial to test whether a Brief Mobile Treatment (BMT) intervention could improve outcomes relative to usual care among suicide attempters. The intervention included training in problem solving therapy, meditation, a brief intervention to increase social support as well as advice on alcohol and other drugs, and mobile phone follow-up. The effect of the intervention was measured in terms of a reduction in suicidal ideation, depression and self-harm at Baseline, six and 12 months. A wait-list control group received usual care. A total of 68 participants was recruited from a Sri Lankan hospital following a suicide attempt. Participants who received the intervention were found to achieve significant improvements in reducing suicidal ideation and depression than those receiving usual care. The BMT group also experienced a significant improvement of social support when compared to the control group. However, the BMT group did not demonstrate a significant effect in reducing actual self-harm and most substance use, and differential effects on alcohol use were restricted to men. Although the present study was limited in revealing which component of the intervention was more effective in preventing suicide, it showed its efficacy in reducing suicide as a whole.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks. Traditional centralised network security is difficult to implement in such a network, therefore distributed security solutions are more desirable in DTN implementations. Establishing effective trust in distributed systems with no centralised Public Key Infrastructure (PKI) such as the Pretty Good Privacy (PGP) scheme usually requires human intervention. Our aim is to build and compare different de- centralised trust systems for implementation in autonomous DTN systems. In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN’s. We compare this system with two other methods of autonomously establishing initial trust by introducing a malicious node and measuring the distribution of malicious and fake keys. Our results show that the new trust system not only mitigates the distribution of fake malicious keys by 40% at the end of the simulation, but it also improved key distribution between nodes. This paper contributes a comparison of three de-centralised trust systems that can be employed in autonomous DTN systems.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

NeSSi (network security simulator) is a novel network simulation tool which incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Its capabilities such as profile-based automated attack generation, traffic analysis and support for detection algorithm plug-ins allow it to be used for security research and evaluation purposes. NeSSi has been successfully used for testing intrusion detection algorithms, conducting network security analysis and developing overlay security frameworks. NeSSi is built upon the agent framework JIAC, resulting in a distributed and extensible architecture. In this paper, we provide an overview of the NeSSi architecture as well as its distinguishing features and briefly demonstrate its application to current security research projects.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Collaborative methods are promising tools for solving complex security tasks. In this context, the authors present the security overlay framework CIMD (Collaborative Intrusion and Malware Detection), enabling participants to state objectives and interests for joint intrusion detection and find groups for the exchange of security-related data such as monitoring or detection results accordingly; to these groups the authors refer as detection groups. First, the authors present and discuss a tree-oriented taxonomy for the representation of nodes within the collaboration model. Second, they introduce and evaluate an algorithm for the formation of detection groups. After conducting a vulnerability analysis of the system, the authors demonstrate the validity of CIMD by examining two different scenarios inspired sociology where the collaboration is advantageous compared to the non-collaborative approach. They evaluate the benefit of CIMD by simulation in a novel packet-level simulation environment called NeSSi (Network Security Simulator) and give a probabilistic analysis for the scenarios.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

“Our students have changed radically. Today’s students are no longer the people our educational system was designed to teach” (Prensky, 2001, p. 1). The influx of available new technology has helped to democratise knowledge, transforming when, where and how learning takes place, and changing perceptions of traditional learning landscapes (JISC, 2006; Neary et al., 2010). Mobile computers combined with wireless technology, have completely transformed the educational world; students have turned nomad[ic], engaging in conversations and thinking across traditional campus spaces (Alexander, 2004; Fisher, 2005). In this workshop we will be attempting to de-mystify a facet of mobile learning, by working in small groups to set up and kick start a number of social media sites, which can be used for collaboration and information exchange, in the design studio.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Climate change and land use pressures are making environmental monitoring increasingly important. As environmental health is degrading at an alarming rate, ecologists have tried to tackle the problem by monitoring the composition and condition of environment. However, traditional monitoring methods using experts are manual and expensive; to address this issue government organisations designed a simpler and faster surrogate-based assessment technique for consultants, landholders and ordinary citizens. However, it remains complex, subjective and error prone. This makes collected data difficult to interpret and compare. In this paper we describe a work-in-progress mobile application designed to address these shortcomings through the use of augmented reality and multimedia smartphone technology.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.