401 resultados para mobile phone apps
Resumo:
Purpose This study aims to employ the Model of Goal-Directed Behaviour (MGB) to examine the consumer acceptance of technology-based self-service (TBSS) for a credence service instrumental to a social goal. Credence services are increasingly delivered via self-service technology and in social marketing, the achievement of social goals can be contingent on consumer acceptance of these services. However, little is known about the determinants of acceptance and extant marketing literature fails to account for emotional and goal influences which are likely to be important. Design/methodology/approach The authors interviewed 30 young adults with self-reported stress, anxiety or depression as potential users of a self-help mental health service delivered via mobile phone. The data were analysed deductively and inductively with the assistance of NVivo. Findings The findings generally support using the MGB to enhance understanding of consumers' acceptance of TBSS. The paper also found evidence of the importance of maintenance self-efficacy, the self-evaluation of the ability to continue using the service, and a previously ignored element of consumer level competition that arises between alternatives that achieve the same goal. Originality/value This study is the first to examine factors that influence consumers' acceptance of TBSS for credence services aimed at achieving a social goal. It builds on understanding of consumer decision making in social marketing, particularly the influence of self-efficacy and competition. It also contributes to attitudinal research by providing initial evidence for deepening and broadening the MGB in the context of TBSSs.
Resumo:
Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.
Resumo:
Background: Women with young children (under 5 years) are a key population group for physical activity intervention. Previous evidence highlights the need for individually tailored programs with flexible delivery mechanisms for this group. Our previous pilot study suggested that an intervention primarily delivered via mobile phone text messaging (MobileMums) increased self-reported physical activity in women with young children. An improved version of the MobileMums program is being compared with a minimal contact control group in a large randomised controlled trial (RCT). Methods/design: This RCT will evaluate the efficacy, feasibility and acceptability, cost-effectiveness, mediators and moderators of the MobileMums program. Primary (moderate-vigorous physical activity) and secondary (intervention implementation data, health service use costs, intervention costs, health benefits, theoretical constructs) outcomes are assessed at baseline, 3-months (end of intervention) and 9-months (following 6-month no contact: maintenance period). The trial is registered with the Australian New Zealand Clinical Trials Registry (ACTRN12611000481976; https://www.anzctr.org.au/Trial/Registration/TrialReview.aspx?id=336109).The intervention commences with a face-to-face session with a behavioural counsellor to initiate rapport and gather information for tailoring the 12-week text message program. During the program participants also have access to a: MobileMums Participant Handbook, MobileMums refrigerator magnet, MobileMums Facebook(C) group, and a MobileMums website with a searchable, on-line exercise directory. A nominated support person also receives text messages for 12-weeks encouraging them to offer their MobileMum social support for physical activity. Discussion: Results of this trial will determine the efficacy and cost-effectiveness of the MobileMums program, and the feasibility of delivering it in a community setting. It will inform the broader literature of physical activity interventions for women with young children and determine whether further investment in the translation of the program is warranted.
Promoting a more positive traffic safety culture in Australia : lessons learnt and future directions
Resumo:
Adopting a traffic safety culture approach, this paper identifies and discusses the ongoing challenge of promoting the road safety message in Australia. It is widely acknowledged that mass media and public education initiatives have played a critical role in the significant positive changes witnessed in community attitudes to road safety in the last three to four decades. It could be argued that mass media and education have had a direct influence on behaviours and attitudes, as well as an indirect influence through signposting and awareness raising functions in conjunction with enforcement. Great achievements have been made in reducing fatalities on Australia’s roads; a concept which is well understood among the international road safety fraternity. How well these achievements are appreciated by the general Australian community however, is not clear. This paper explores the lessons that can be learnt from successes in attitudinal and behaviour change in regard to seatbelt use and drink driving in Australia. It also identifies and discusses key challenges associated with achieving further positive changes in community attitudes and behaviours, particularly in relation to behaviours that may not be perceived by the community as dangerous, such as speeding and mobile phone use while driving. Potential strategies for future mass media and public education campaigns to target these challenges are suggested, including ways of harnessing the power of contemporary traffic law enforcement techniques, such as point-to-point speed enforcement and in-vehicle technologies, to help spread the road safety message.
Resumo:
Concealed texting (CT) while driving involves a conscious effort to hide one’s texting while obvious texting (OT) does not involve such efforts to conceal the behaviour. Young drivers are the most frequent users of mobile phones while driving which is associated with heightened crash risk. This study investigated the extent to which CT and OT may be discrete behaviours to ascertain whether countermeasures would need to utilise distinct approaches. An extended Theory of Planned Behaviour (TPB) including moral norm, mobile phone involvement, and anticipated regret guided the research. Participants (n = 171) were aged 17 to 25 years, owned a mobile phone, had a current driver’s licence, and resided in Queensland. A repeated measures MANOVA found significant differences between CT and OT on all standard and extended TPB constructs. Hierarchical multiple regression analyses showed the standard TPB constructs accounted for 68.7% and 54.6% of the variance in intentions to engage in CT and OT, respectively. The extended predictors contributed additional variance in intentions over and above the standard TPB constructs. Further, in the final regression model, differences emerged in the significant predictors of each type of texting. These findings provide initial evidence that CT and OT are distinct behaviours. This distinction is important to the extent that it may influence the nature of advertising countermeasures aimed at reducing/preventing young drivers’ engagement in these risky behaviours.
Resumo:
Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers’ intentions and subsequent behaviour. Participants (n = 171) were aged 17 to 25 years, owned a mobile phone, and had a current driver’s licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers’ intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers’ self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour.
Resumo:
Digital creatives are spread widely across the economy, and growing rapidly in number. New industries such as mobile applications (apps) development are creating new occupations and services, and transforming some older ones. Digital creatives are driving innovation and economic growth in these industries and service sectors. Digital technologies and processes are becoming increasingly important in virtually all spheres of creative work, as they are across the economy. And yet there is no broad agreement either in Australia or worldwide about the constitution of the digital creative grouping, and only limited understanding of both the role of creatives in the digital economy and innovation, and of the issues and challenges they face. Who are they? Where are they working? Where are their numbers growing? The answers to these questions will help to inform the development of policy and the fostering of an environment that promotes digital content and creativity.
Resumo:
Background Managing large student cohorts can be a challenge for university academics, coordinating these units. Bachelor of Nursing programmes have the added challenge of managing multiple groups of students and clinical facilitators whilst completing clinical placement. Clear, time efficient and effective communication between coordinating academics and clinical facilitators is needed to ensure consistency between student and teaching groups and prompt management of emerging issues. Methods This study used a descriptive survey to explore the use of text messaging via a mobile phone, sent from coordinating academics to off-campus clinical facilitators, as an approach to providing direction and support. Results The response rate was 47.8% (n = 22). Correlations were found between the approachability of the coordinating academic and clinical facilitator perception that, a) the coordinating academic understood issues on clinical placement (r = 0.785, p < 0.001), and b) being part of the teaching team (r = 0.768, p < 0.001). Analysis of responses to qualitative questions revealed three themes: connection, approachability and collaboration. Conclusions This study demonstrates that use of regular text messages improves communication between coordinating academics and clinical facilitators. Findings suggest improved connection, approachability and collaboration between the coordinating academic and clinical facilitation staff.
Resumo:
Every motorised jurisdiction mandates legal driving behaviour which facilitates driver mobility and road user safety through explicit road rules that are enforced by regulatory authorities such as the Police. In road safety, traffic law enforcement has been very successfully applied to modify road user behaviour, and increasingly technology is fundamental in detecting illegal road user behaviour. Furthermore, there is also sound evidence that highly visible and/or intensive enforcement programs achieve long-term deterrent effects. To illustrate, in Australia random breath testing has considerably reduced the incidence and prevalence of driving whilst under the influence of alcohol. There is, however, evidence that many road rules continue to be broken, including speeding and using a mobile phone whilst driving, and there are many instances where drivers are not detected or sufficiently sanctioned for these transgressions. Furthermore, there is a growing body of evidence suggesting that experiences of punishment avoidance – that is, successful attempts at avoiding punishment such as drivers talking themselves out of a ticket, or changing driving routes to evade detection –are associated with and predictive of the extent of illegal driving behaviour and future illegal driving intentions. Therefore there is a need to better understand the phenomenon of punishment avoidance to enhance our traffic law enforcement procedures and therefore safety of all road users. This chapter begins with a review of the young driver road safety problem, followed by an examination of contemporary deterrence theory to enhance our understanding of both the experiences and implications of punishment avoidance in the road environment. It is noteworthy that in situations where detection and punishment remain relatively rare, such as on extensive road networks, the research evidence suggests that experiences of punishment avoidance may have a stronger influence upon risky driving behaviour than experiences of punishment. Finally, data from a case study examining the risky behaviour of young drivers will be presented, and the implications for ‘getting away with it’ will be discussed.
Resumo:
Access to dietetic care is important in chronic disease management and innovative technologies assists in this purpose. Photographic dietary records (PhDR) using mobile phones or cameras are valid and convenient for patients. Innovations in providing dietary interventions via telephone and computer can also inform dietetic practice. Three studies are presented. A mobile phone method was validated by comparing energy intake (EI) to a weighed food record and a measure of energy expenditure (EE) obtained using the doubly labelled water technique in 10 adults with T2 diabetes. The level of agreement between mean (±sd) energy intake mobile phone (8.2±1.7 MJ) and weighed record (8.5±1.6 MJ) was high (p=0.392), however EI/EE for both methods gave similar levels of under-reporting (0.69 and 0.72). All subjects preferred using the mobile phone vs. weighed record. Nineteen individuals with Parkinsons disease kept 3-day PhDRs on three occasions using point-and-shoot digital cameras over a 12 week period. The camera was rated as easy to use by 89%, keeping a PhDR was considered acceptable by 94% and none would rather use a “pen and paper” method. Eighty-three percent felt confident to use the camera again to record intake. An interactive, automated telephone system designed to coach people with T2 diabetes to adopt and maintain diabetes self-care behaviours, including nutrition, showed trends for improvements in total fat, saturated fat and vegetable intake of the intervention group compared to control participants over 6 months. Innovative technologies are acceptable to patients with chronic conditions and can be incorporated into dietetic care.
Resumo:
Making a conscious effort to hide the fact that one is texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened crash risk from engaging in this behaviour. First, several small focus group discussions (N = 12) were carried out to elicit the underlying salient beliefs regarding this behaviour, in accordance with the Theory of Planned Behaviour (TPB). Findings from these discussions, in conjunction with available prior evidence regarding general mobile phone use while driving, then informed questionnaire items that assessed young peoples’ beliefs regarding this behaviour, as well as intention to engage in this behaviour in the next week. In the questionnaire phase of the study, participants (N = 171) were aged 17–25 years, owned a mobile phone, and held a current driver’s licence. Results showed that there were significant differences between low and high intenders (to engage in concealed texting while driving) on the behavioural, normative, and control beliefs investigated. Specifically, high intenders were more likely to believe that concealed texting while driving would result in sharing information with others, using time effectively, and were less likely to think that free-flowing traffic would prevent their engagement in this behaviour. By targeting these beliefs, these findings may potentially inform the development of advertising and other public intervention strategies, aimed at ensuring young drivers reconsider their engagement in this risky behaviour.
Resumo:
Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis.
Resumo:
The study examines how, during an economic downturn, the perceived importance of the value offering of retail store categories, as identified by a major international mall operator based in Australia, influences the relationship between consumers’ shopping attitudes and likelihood of purchasing in those categories. The findings show variance in the importance pertaining to retail store categories between those that have and those that have not altered their shopping behaviour. Different mediating effects were found in the major, mini-major, leisure, apparel, and mobile phone categories, suggestive of each group having differing levels of self-interest in the value offerings of each category, thus, symptomatic of dissimilar decision-making strategies for each group. Contributions to theory and practice are discussed.
Resumo:
Information and Communication Technology (ICT) has been embraced with hope and optimism in both developing and developed countries. While in the developed countries most citizens have access to one or many of the devices which utilize this technology (e.g. desktop, laptop, tablet, mobile phone), in developing countries this “luxury” can only be afforded by a privileged few. The use of these technologies in primary schools in developing countries is low. This is due to the fact that there are other bigger issues that some of these countries have to grapple with such as meeting the basic health and education needs of its citizens. Quality primary education and global development partnerships are two of the eight Millennium Development Goals of the United Nations (UNDP, 2012). Many Governments, NGO’s, service organizations, and individuals in developing countries are always looking at ways in which the disparity (not just in terms of ICT) can be narrowed. There has to be a greater collaboration between stakeholders in developing and developed countries (Mutonyi & Norton, 2007). How do stakeholders from developed countries engage with partners in developing countries to deliver meaningful and relevant outcomes for primary school students using ICT? As a first step getting the key stakeholders on side is critical. In the Fijian context, schools are managed and run by committees who are members of the community. Therefore, getting the committee on side together with the head-teachers and teachers is critical. Conversations about teaching and learning with technology can then follow with greater ease. The sustainability of any innovative approaches is also an essential element of this equation. Through this lens, this chapter investigates how ICT can be implemented in primary schools in Fiji. It proposes a three-layered approach which focuses on: (1) the community, school leadership, and teachers; (2) content, pedagogy, and technology, and (3) sustainability.
Resumo:
In this paper we describe the use and evaluation of CubIT, a multi-user, very large-scale presentation and collaboration framework. CubIT is installed at the Queensland University of Technology’s (QUT) Cube facility. The “Cube” is an interactive visualisation facility made up of five very large-scale interactive multi-panel wall displays, each consisting of up to twelve 55-inch multi-touch screens (48 screens in total) and massive projected display screens situated above the display panels. The paper outlines the unique design challenges, features, use and evaluation of CubIT. The system was built to make the Cube facility accessible to QUT’s academic and student population. CubIT enables users to easily upload and share their own media content, and allows multiple users to simultaneously interact with the Cube’s wall displays. The features of CubIT are implemented via three user interfaces, a multi-touch interface working on the wall displays, a mobile phone and tablet application and a web-based content management system. The evaluation reveals issues around the public use and functional scope of the system.