73 resultados para app store malware

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Android is a new generation of an open operating system directed at mobile devices that are carried every day. The openness of this architecture is leading to new applications and opportunities including a host of multimedia services, new interfaces and browsers, multitasking including support for wireless local, personal and wide area networking services. Security with mobility and wireless connectivity thus becomes even more important with all these exciting developments. Vital security issues such as leakage of private information, file stealing and spambots abound in networks in practice and Android networks continue to be subject to these same families of vulnerabilities. This paper provides a demonstration of such vulnerabilities in spite of the best efforts of designers and implementers. In particular it describes examples of data leakage and file stealing (address books, contact lists, SMS messages, pictures) as well as demonstrating how Android devices can create spambots. © 2013 IEEE.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mobile applications (in short: mobile apps) are software applications designed to run on mobile devices such as smart phones and tablet computers. These technologies have come a long way since the opening of the Apple App Store in 2008, especially in their applications for business, information, communication, health and gaming. Most mobile devices are capable of processing and disseminating information in an efficient way. Smart devices, such as the iPhone or iPad, are equipped with innovative functionalities and unique features for easy delivery of content, information sharing, and collaborative work over the Internet. This is the basis for the use of these technologies in the education industry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background: Internet websites and smartphone apps have become a popular resource to guide parents in their children’s feeding and nutrition. Given the diverse range of websites and apps on infant feeding, the quality of information in these resources should be assessed to identify whether consumers have access to credible and reliable information.

Objective: This systematic analysis provides perspectives on the information available about infant feeding on websites and smartphone apps.

Methods: A systematic analysis was conducted to assess the quality, comprehensibility, suitability, and readability of websites and apps on infant feeding using a developed tool. Google and Bing were used to search for websites from Australia, while the App Store for iOS and Google Play for Android were used to search for apps. Specified key words including baby feeding, breast feeding, formula feeding and introducing solids were used to assess websites and apps addressing feeding advice. Criteria for assessing the accuracy of the content were developed using the Australian Infant Feeding Guidelines.

Results: A total of 600 websites and 2884 apps were screened, and 44 websites and 46 apps met the selection criteria and were analyzed. Most of the websites (26/44) and apps (43/46) were noncommercial, some websites (10/44) and 1 app were commercial and there were 8 government websites; 2 apps had university endorsement. The majority of the websites and apps were rated poor quality. There were two websites that had 100% coverage of information compared to those rated as fair or poor that had low coverage. Two-thirds of the websites (65%) and almost half of the apps (47%) had a readability level above the 8th grade level.

Conclusions: The findings of this unique analysis highlight the potential for website and app developers to merge user requirements with evidence-based content to ensure that information on infant feeding is of high quality. There are currently no apps available to consumers that address a variety of infant feeding topics. To keep up with the rapid turnover of the evolving technology, health professionals need to consider developing an app that will provide consumers with a credible and reliable source of information about infant feeding, using quality assessment tools and evidence-based content.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

BACKGROUND: There has been a recent proliferation in the development of smartphone applications (apps) aimed at modifying various health behaviours. While interventions that incorporate behaviour change techniques (BCTs) have been associated with greater effectiveness, it is not clear to what extent smartphone apps incorporate such techniques. The purpose of this study was to investigate the presence of BCTs in physical activity and dietary apps and determine how reliably the taxonomy checklist can be used to identify BCTs in smartphone apps.

METHODS: The top-20 paid and top-20 free physical activity and/or dietary behaviour apps from the New Zealand Apple App Store Health & Fitness category were downloaded to an iPhone. Four independent raters user-tested and coded each app for the presence/absence of BCTs using the taxonomy of behaviour change techniques (26 BCTs in total). The number of BCTs included in the 40 apps was calculated. Krippendorff's alpha was used to evaluate interrater reliability for each of the 26 BCTs.

RESULTS: Apps included an average of 8.1 (range 2-18) techniques, the number being slightly higher for paid (M = 9.7, range 2-18) than free apps (M = 6.6, range 3-14). The most frequently included BCTs were "provide instruction" (83% of the apps), "set graded tasks" (70%), and "prompt self-monitoring" (60%). Techniques such as "teach to use prompts/cues", "agree on behavioural contract", "relapse prevention" and "time management" were not present in the apps reviewed. Interrater reliability coefficients ranged from 0.1 to 0.9 (Mean 0.6, SD = 0.2).

CONCLUSIONS: Presence of BCTs varied by app type and price; however, BCTs associated with increased intervention effectiveness were in general more common in paid apps. The taxonomy checklist can be used by independent raters to reliably identify BCTs in physical activity and dietary behaviour smartphone apps.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The internal environment within an unconditioned wine barrel store, constructed from insulated concrete panels and located in south-eastern Australia, has been investigated during a summer and winter month. Average temperatures inside the store were found to be 13.7°C and 22.8°C in the winter and summer month respectively. A validated mathematical model of the store was used to investigate the contribution of the concrete walls, insulation and the wine itself to the internal thermal environment. The concrete walls were found to be the least influential.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study is about store names as brand signals. Using the framework of Erdem and Swait (1998), hypotheses are developed regarding the effects of store names on consumers' expected product utility. It is relevant to study store names as brand signals because store names can act as additional signals in the consumer purchase decision process. The study focuses in particular on the effects of store name credibility on perceived risk, information costs and perceived product quality. The hypotheses will be tested on data that are currently being collected in a survey among two hundred students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study is about store names as brand signals. It focuses on the effects of store name investments on store name credibility and perceived store quality. Using the theoretical framework of Erdem and Swait (1998), hypotheses are developed vis-à-vis the effects of store name investments on consumers’ perceived store quality. The proposed hypotheses are empirically tested on data collected from a sample of students. The study is part of a project that looks at how store name and brand name credibility affect consumers’ expected utility.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research was to provide an alternative perspective for retailers to develop relationships and loyalty. This study suggests that traditional trust and commitment theories are somewhat imperfect in predicting future store choice. Through path modelling, we introduce two additional constructs of store functional loyalty and relationship worth. These constructs together with commitment are powerful predictors of future store choice. Furthermore, the study examines the antecedents of relationships, loyalty and future store choice. We conclude with new insights and practical suggestions for retailers to build relationships, loyalty and influence customers' future store choice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

After a decade of research there is still much to understand about the relationship between loyalty programs and whether they deliver on their promise of building customer loyalty towards a store and understanding the mediating role of store satisfaction. Our results suggest that loyalty program as a summary construct, explains a significant proportion of the variance in store satisfaction and store loyalty. However, disaggregation of the construct into hard versus soft attributes, promotes greater specificity, precision and accuracy in uncovering the differential impact on store satisfaction and store loyalty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The proliferation of malware is a serious threat to computer and information systems throughout the world. Antimalware companies are continually challenged to identify and counter new malware as it is released into the wild. In attempts to speed up this identification and response, many researchers have examined ways to efficiently automate classification of malware as it appears in the environment. In this paper, we present a fast, simple and scalable method of classifying Trojans based only on the lengths of their functions. Our results indicate that function length may play a significant role in classifying malware, and, combined with other features, may result in a fast, inexpensive and scalable method of malware classification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the proliferation of theoretical developments in the area of western consumer behaviour, to date the likelihood of Asian variants to existing consumer behavioural models has not been explored in any detail. Based on prior research in the field of retail attribute testing this empirical study investigates the influence of supermarket store attributes on Chinese (Macau) customer satisfaction moderated by the biographical factors of age and income. The results indicate that the store attributes of distance and speed of check out were significant for age, and that delivery, service and price reductions were significant by income. Total independent variable rankings indicated store location, price and product variety were perceived by Chinese respondents as being the most important store attributes influencing satisfaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The formal study of kinship was introduced to the South Pacific Islands and the Australian colonies by Methodist missionary Lorimer Fison who distributed schedules and collected kinship data from around the region in collaboration with the founder of Anthropology in America, Lewis Henry Morgan. This article is a sequel to H. Gardner, 2008 'The origins of kinship in Oceania', Oceania, 78:2, 137-150. It traces Lorimer Fison's return to the Australian colonies from his mission post in Fiji and the subsequent spread of kinship schedules to settlers, missionaries and administrators around Australia. Based on unpublished correspondence, the article investigates Fison's gradual disillusionment with Morgan's evolutionist hypothesis of the development of the human family and his disdain for the speculation of much metropolitan anthropology in the 1870s.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anti-malware software producers are continually challenged to identify and counter new malware as it is released into the wild. A dramatic increase in malware production in recent years has rendered the conventional method of manually determining a signature for each new malware sample untenable. This paper presents a scalable, automated approach for detecting and classifying malware by using pattern recognition algorithms and statistical methods at various stages of the malware analysis life cycle. Our framework combines the static features of function length and printable string information extracted from malware samples into a single test which gives classification results better than those achieved by using either feature individually. In our testing we input feature information from close to 1400 unpacked malware samples to a number of different classification algorithms. Using k-fold cross validation on the malware, which includes Trojans and viruses, along with 151 clean files, we achieve an overall classification accuracy of over 98%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a scalable approach for distinguishing malicious files from clean files by investigating the behavioural features using logs of various API calls. We also propose, as an alternative to the traditional method of manually identifying malware files, an automated classification system using runtime features of malware files. For both projects, we use an automated tool running in a virtual environment to extract API call features from executables and apply pattern recognition algorithms and statistical methods to differentiate between files. Our experimental results, based on a dataset of 1368 malware and 456 cleanware files, provide an accuracy of over 97% in distinguishing malware from cleanware. Our techniques provide a similar accuracy for classifying malware into families. In both cases, our results outperform comparable previously published techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other exploits to middleware and back-end systems. This paper is proposing a framework which will provide protection from malware and ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader level. This will ensure that any malicious code in the tag is identified. If the tag is infected by malicious code it will stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be capable of protecting an RFID system from denial of service (DOS) attack, forward security and rogue reader better than existing protocols. The framework is introducing a layer concept on a smart reader to reduce coupling between different tasks. Using this framework, the RFID system will be protected from malware and also the privacy of the tag will be ensured.