401 resultados para Mobile phone distraction
Resumo:
Although mobile phones are often used in public urban places to interact with one’s geographically dispersed social circle, they can also facilitate interactions with people in the same public urban space. The PlaceTagz study investigates how physical artefacts in public urban places can be utilised and combined with mobile phone technologies to facilitate interactions. Printed on stickers, PlaceTagz are QR codes linking to a digital message board enabling collocated users to interact with each other over time resulting in a place-based digital memory. This exploratory project set out to investigate if and how PlaceTagz are used by urban dwellers in a real world deployment. We present findings from analysing content received through PlaceTagz and interview data from application users. QR codes, which do not contain any contextual information, piqued the curiosity of users wondering about the embedded link’s destination and provoked comments in regards to people, place and technology.
Resumo:
Purpose: Service research typically relates switching costs to customer loyalty, and portrays them as effective switching deterrents that engender harmful word-of-mouth (WOM). Rather than to customer loyalty, this paper aims to relate switching costs to consumer inertia, and show that while switching costs may result in customer retention, they can engender positive and negative WOM. This depends on whether the inertia stems from satisfaction or indifference. Design/methodology/approach: A mall-intercept survey investigated 518 customers' perceptions of their mobile phone service providers. Structural equation modelling fitted the data to the conceptual model. Findings: Switching costs deterred switching and engendered negative WOM, but only with low-inertia customers. With high-inertia customers, retention and WOM behaviours depended on whether the inertia stemmed from satisfaction or indifference. Satisfied customers with high switching costs tended to stay, gave more positive and less negative WOM. With indifferent customers, switching costs were unrelated to retention or WOM behaviours. Research limitations/implications: While they may be perceived negatively, switching costs can engender PWOM. Hence, research should not consider switching costs alone without considering the context that produces them. Practical implications: Service providers should segment their customers into low-inertia, high-inertia/satisfied and high-inertia/indifferent, and target each segment differently. By converting customers into the high-inertia/satisfied segment, service providers can make the best use of switching costs – not only in the traditional sense as a barrier to defection, but also as a way of generating positive WOM. Originality/value: This study is the first to consider the role of inertia with switching costs, positive WOM, and negative WOM. The findings suggest that past studies portraying switching costs as negative impediments that evoke only negative WOM might be misleading.
Resumo:
Objective To explore whether improvements in physical activity following the MobileMums intervention were mediated by changes in Social Cognitive Theory (SCT) constructs targeted in the intervention (barrier self efficacy, goal setting skills, outcome expectancy, social support, and perceived environmental opportunity for exercise). This paper also examined if the mediating constructs differed between initial (baseline to 6 weeks) and overall (baseline to 13 weeks) changes in physical activity. Methods Secondary analysis of data from a randomized controlled trial involving 88 postnatal women (<12 months postpartum). Participants were randomized to receive either the 12-week MobileMums intervention or a minimal-contact control condition. Physical activity and proposed mediators were assessed by self-report at baseline, 6 weeks, and 13 weeks. Walking for Exercise frequency was assessed using the Australian Women's Activity Survey and frequency of moderate-to-vigorous physical activity (MVPA) was assessed using a single-item question. Results Initial improvements in goal-setting skills mediated the relationship between experimental condition and initial changes in MVPA, αβ (95% CI) = 0.23(0.01, 0.59), and Walking for Exercise, αβ (95% CI) = 0.34(0.06, 0.73). Initial improvements in barrier self efficacy mediated the relationship between experimental condition and initial change in MVPA, αβ (95% CI) = 0.36(0.12, 0.65), but not Walking for Exercise. None of the SCT outcomes significantly mediated the relationship between experimental condition and overall (baseline to 13 weeks) change in frequency of MVPA or Walking for Exercise. Conclusion Future interventions with postnatal women using SCT should target barrier self-efficacy and goal setting skills in order to increase physical activity. (PsycINFO Database Record (c) 2012 APA, all rights reserved)
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: The primary objective of this review will be to assess the effect of internet and mobile phone alcohol-related interventions on reducing participants' alcohol consumption. Secondary objectives will include assessing the impact of the interventions on symptoms of alcohol-related disorders and degree of alcohol dependence, the effects on functioning, and patient acceptability. The review will also assess whether there are different outcomes for different diagnostic groups, and which intervention approaches or components (including therapeutic support) may be contributing to any positive effects.
Resumo:
Background: Despite important implications for the budgets, statistical power and generalisability of research findings, detailed reports of recruitment and retention in randomised controlled trials (RCTs) are rare. The NOURISH RCT evaluated a community-based intervention for first-time mothers that promoted protective infant feeding practices as a primary prevention strategy for childhood obesity. The aim of this paper is to provide a detailed description and evaluation of the recruitment and retention strategies used. Methods: A two stage recruitment process designed to provide a consecutive sampling framework was used. First time mothers delivering healthy term infants were initially approached in postnatal wards of the major maternity services in two Australian cities for consent to later contact (Stage 1). When infants were about four months old mothers were re-contacted by mail for enrolment (Stage 2), baseline measurements (Time 1) and subsequent random allocation to the intervention or control condition. Outcomes were assessed at infant ages 14 months (Time 2) and 24 months (Time 3). Results: At Stage 1, 86% of eligible mothers were approached and of these women, 76% consented to later contact. At Stage 2, 3% had become ineligible and 76% could be recontacted. Of the latter, 44% consented to full enrolment and were allocated. This represented 21% of mothers screened as eligible at Stage 1. Retention at Time 3 was 78%. Mothers who did not consent or discontinued the study were younger and less likely to have a university education. Conclusions: The consent and retention rates of our sample of first time mothers are comparable with or better than other similar studies. The recruitment strategy used allowed for detailed information from non-consenters to be collected; thus selection bias could be estimated. Recommendations for future studies include being able to contact participants via mobile phone (particular text messaging), offering home visits to reduce participant burden and considering the use of financial incentives to support participant retention.
Resumo:
Background To describe the iterative development process and final version of ‘MobileMums’: a physical activity intervention for women with young children (<5 years) delivered primarily via mobile telephone (mHealth) short messaging service (SMS). Methods MobileMums development followed the five steps outlined in the mHealth development and evaluation framework: 1) conceptualization (critique of literature and theory); 2) formative research (focus groups, n= 48); 3) pre-testing (qualitative pilot of intervention components, n= 12); 4) pilot testing (pilot RCT, n= 88); and, 5) qualitative evaluation of the refined intervention (n= 6). Results Key findings identified throughout the development process that shaped the MobileMums program were the need for: behaviour change techniques to be grounded in Social Cognitive Theory; tailored SMS content; two-way SMS interaction; rapport between SMS sender and recipient; an automated software platform to generate and send SMS; and, flexibility in location of a face-to-face delivered component. Conclusions The final version of MobileMums is flexible and adaptive to individual participant’s physical activity goals, expectations and environment. MobileMums is being evaluated in a community-based randomised controlled efficacy trial (ACTRN12611000481976).
Resumo:
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.
Resumo:
A technologically innovative study was undertaken across two suburbs in Brisbane, Australia, to assess socioeconomic differences in women's use of the local environment for work, recreation, and physical activity. Mothers from high and low socioeconomic suburbs were instructed to continue with usual daily routines, and to use mobile phone applications (Facebook Places, Twitter, and Foursquare) on their mobile phones to ‘check-in’ at each location and destination they reached during a one-week period. These smartphone applications are able to track travel logistics via built-in geographical information systems (GIS), which record participants’ points of latitude and longitude at each destination they reach. Location data were downloaded to Google Earth and excel for analysis. Women provided additional qualitative data via text regarding the reasons and social contexts of their travel. We analysed 2183 ‘check-ins’ for 54 women in this pilot study to gain quantitative, qualitative, and spatial data on human-environment interactions. Data was gathered on distances travelled, mode of transport, reason for travel, social context of travel, and categorised in terms of physical activity type – walking, running, sports, gym, cycling, or playing in the park. We found that the women in both suburbs had similar daily routines with the exception of physical activity. We identified 15% of ‘check-ins’ in the lower socioeconomic group as qualifying for the physical activity category, compared with 23% in the higher socioeconomic group. This was explained by more daily walking for transport (1.7kms to 0.2kms) and less car travel each week (28.km to 48.4kms) in the higher socioeconomic suburb. We ascertained insights regarding the socio-cultural influences on these differences via additional qualitative data. We discuss the benefits and limitations of using new technologies and Google Earth with implications for informing future physical and social aspects of urban design, and health promotion in socioeconomically diverse cities.
Resumo:
OBJECTIVE: Recent increases in youth mobile phone ownership and usage may provide a unique and innovative opportunity for engagement by health promoters, via a familiar and immediately accessible medium. This study investigated adolescents’ and their parents’ preferences for promoting physical activity via means of SMS messaging. METHODS: Adolescents (36 males and 76 females) and their parents (37 males 75 females) were recruited from two non-denominational same-sex private schools, in Brisbane, Australia. The mean age and standard deviation (SD) for adolescents and parents was 14.03 (0.58) and 47.18 (4.65) respectively. Participants responded to a series of questions regarding mobile phone ownership, and preferences for physical activity, school-based physical activity programs, and programs invovling SMS messaging. Data analysis included descriptive statistics and frequency distributions. T-tests were employed to measure gender effect. RESULTS: Overall, 47 (42%) parents desired their child to be more physically active, and were interested for their child to participate in a school-based physical activity program. Of those parents, 16 (34%) parents were interested in their child participating in an SMS-based physical activity program, with 21 (45%) not interested, and 10 (21%) neutral. One hundred and four (95%) adolescents owned a mobile phone, with 84 (82%) of those adolescents wanting to be more physically active. Of those adolescents, 14 (17%) were interested in participating in an SMS-based physical activity program, with 40 (48%) not interested, and 30 (36%) neutral. There was no significant gender effect. CONCLUSIONS: Although SMS messaging may provide an innovative method for youth physical activity promotion, low levels of interest are concerning. These results differ from other studies utilising SMS messaging for the purpose of health promotion, where more positive feedback from participants were reported. A screening process to gauge interest prior to the implementation of any SMS-based health promotion program may prove invaluable toward the success of the program.
Resumo:
This thesis analysed the theoretical and ontological issues of previous scholarship concerning information technology and indigenous people. As an alternative, the thesis used the framework of actor-network-theory, especially through historiographical and ethnographic techniques. The thesis revealed an assemblage of indigenous/digital enactments striving for relevance and avoiding obsolescence. It also recognised heterogeneities- including user-ambivalences, oscillations, noise, non-coherences and disruptions - as part of the milieu of the daily digital lives of indigenous people. By taking heterogeneities into account, the thesis ensured that the data “speaks for itself” and that social inquiry is not overtaken by ideology and ontology.
Resumo:
This thesis examined the determinants of consumers’ use of emerging mental health services delivered via mobile phone technology, which promise to provide cost-effective psychotherapeutic support where and when needed. It builds on the Model of Goal-Directed Behaviour by recognising the role that competition between behavioural alternatives plays in influencing consumers’ decision to use these services. The research employed a three-study, mixed-methodological approach.
Resumo:
This paper reports on an adaptation of Callon and Law’s (1995) hybrid collectif derived from research conducted on the usage of mobile phones and internet technologies among the iTadian indigenous people of the Cordillera region, northern Philippines. Results brings to light an indigenous digital collectif—an emergent effect from the translation of both human and non-human heterogeneous actors as well as pre-existent networks, such as: traditional knowledge and practices, kinship relations, the traditional exchange of goods, modern academic requisites, and advocacies for indigenous rights. This is evinced by the iTadian’s enrolment of internet and mobile phone technologies. Examples include: treating these technologies as an efficient communicative tool, an indicator of well-being, and a portable extension of affective human relationships. Alternatively, counter-enrolment strategies are also at play, which include: establishing rules of acceptable use on SMS texting and internet access based on traditional notions of discretion, privacy, and the customary treatment of the dead. Within the boundaries of this digital collectif reveal imbrications of pre-existing networks like traditional customs, the kinship system across geophysical boundaries, the traditional exchange of mail and other goods, and the advocacy of indigenous rights. These imbrications show that the iTadian digital collectif fluently configures itself to a variety of networked ontologies without losing its character.
Resumo:
CubIT is a multi-user, large-scale presentation and collaboration framework installed at the Queensland University of Technology’s (QUT) Cube facility, an interactive facility made up 48 multi-touch screens and very large projected display screens. The CubIT system allows users to upload, interact with and share their own content on the Cube’s display surfaces. This paper outlines the collaborative features of CubIT which are implemented via three user interfaces, a large-screen multi-touch interface, a mobile phone and tablet application and a web-based content management system. Each of these applications plays a different role and supports different interaction mechanisms supporting a wide range of collaborative features including multi-user shared workspaces, drag and drop upload and sharing between users, session management and dynamic state control between different parts of the system.
Resumo:
Purpose This study aims to employ the Model of Goal-Directed Behaviour (MGB) to examine the consumer acceptance of technology-based self-service (TBSS) for a credence service instrumental to a social goal. Credence services are increasingly delivered via self-service technology and in social marketing, the achievement of social goals can be contingent on consumer acceptance of these services. However, little is known about the determinants of acceptance and extant marketing literature fails to account for emotional and goal influences which are likely to be important. Design/methodology/approach The authors interviewed 30 young adults with self-reported stress, anxiety or depression as potential users of a self-help mental health service delivered via mobile phone. The data were analysed deductively and inductively with the assistance of NVivo. Findings The findings generally support using the MGB to enhance understanding of consumers' acceptance of TBSS. The paper also found evidence of the importance of maintenance self-efficacy, the self-evaluation of the ability to continue using the service, and a previously ignored element of consumer level competition that arises between alternatives that achieve the same goal. Originality/value This study is the first to examine factors that influence consumers' acceptance of TBSS for credence services aimed at achieving a social goal. It builds on understanding of consumer decision making in social marketing, particularly the influence of self-efficacy and competition. It also contributes to attitudinal research by providing initial evidence for deepening and broadening the MGB in the context of TBSSs.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.