550 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security
Resumo:
Mobile devices are very popular among tertiary student populations. This study looks at student use of hand-held mobile devices within the context of a first year programming unit. This research sought for ways in which an educational app on these devices could be successfully integrated into such a class's learning.
Resumo:
With the smartphone revolution, consumer-focused mobile medical applications (apps) have flooded the market without restriction. We searched the market for commercially available apps on all mobile platforms that could provide automated risk analysis of the most serious skin cancer, melanoma. We tested 5 relevant apps against 15 images of previously excised skin lesions and compared the apps' risk grades to the known histopathologic diagnosis of the lesions. Two of the apps did not identify any of the melanomas. The remaining 3 apps obtained 80% sensitivity for melanoma risk identification; specificities for the 5 apps ranged from 20%-100%. Each app provided its own grading and recommendation scale and included a disclaimer recommending regular dermatologist evaluation regardless of the analysis outcome. The results indicate that autonomous lesion analysis is not yet ready for use as a triage tool. More concerning is the lack of restrictions and regulations for these applications.
Resumo:
The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.
Resumo:
Smartphones become very critical part of our lives as they offer advanced capabilities with PC-like functionalities. They are getting widely deployed while not only being used for classical voice-centric communication. New smartphone malwares keep emerging where most of them still target Symbian OS. In the case of Symbian OS, application signing seemed to be an appropriate measure for slowing down malware appearance. Unfortunately, latest examples showed that signing can be bypassed resulting in new malware outbreak. In this paper, we present a novel approach to static malware detection in resource-limited mobile environments. This approach can be used to extend currently used third-party application signing mechanisms for increasing malware detection capabilities. In our work, we extract function calls from binaries in order to apply our clustering mechanism, called centroid. This method is capable of detecting unknown malwares. Our results are promising where the employed mechanism might find application at distribution channels, like online application stores. Additionally, it seems suitable for directly being used on smartphones for (pre-)checking installed applications.
Resumo:
This paper reports on a study that investigates the emotions elicited from appraising SMS-based mobile marketing (m-marketing) communications under three marketing conditions: product consistency, incentives and permission giving. Results from the experimental design show that appraising m-marketing communications elicits both single emotions and mixed emotions; that is, a mixture of positive and negative emotions in the same response. Additionally, the results show that the influence of specific marketing conditions may increase or reduce the intensity of the emotions elicited. This study contributes to marketing practice by examining consumer appraisals of m-marketing communications under different combinations of marketing conditions. The results provide insights into which emotions are likely to be elicited as a result, and how a specific marketing condition might influence their levels of intensity. The study contributes to marketing theory also through combining appraisal theory with Richins (1997) consumption emotion set.
Resumo:
This paper reports on a Q-methodology study on the consumption of mobile phones and opinions on SMS-marketing, extracted from interpretive interviews and focus groups. The Metaphors Q-sort, developed within a framework of Holt's (1995) four metaphors of consumption, identifies three experiential value clusters in the consumption of mobile phones: the Mobile Pragmatists, the Mobile Connectors and the Mobile Revelers. The SMS-marketing Q-sort identifies two key clusters of subjective opinions on various aspects of SMS-based mobile-marketing. By integrating the findings from these two Q-sorts, we demonstrate that while all three value clusters express positive opinions towards ‘location specific’ and ‘customer initiated contact’ SMS-marketing, there are noticeable differences in how marketers should develop their strategies to maximize the consumers’ perceived experiential value derived from the consumption of their mobile phones. Keywords: mobile phones; experiential consumption: SMS-marketing; Q-methodology