944 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security
Resumo:
Mobile technologies have brought about major changes in police equipment and police work. If a utopian narrative remains strongly linked to the adoption of new technologies, often formulated as 'magic bullets' to real occupational problems, there are important tensions between their 'imagined' outcomes and the (unexpected) effects that accompany their daily 'practical' use by police officers. This article offers an analysis of police officers' perceptions and interactions with security devices. In so doing, it develops a conceptual typology of strategies for coping with new technology inspired by Le Bourhis and Lascoumes: challenging, neutralizing and diverting. To that purpose, we adopt an ethnographic approach that focuses on the discourses, practices and actions of police officers in relation to three security devices: the mobile digital terminal, the mobile phone and the body camera. Based on a case study of a North American municipal police department, the article addresses how these technological devices are perceived and experienced by police officers on the beat.
Resumo:
We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.
Resumo:
The purpose of this thesis was to study how certificates could be used to improve security of mobile devices. In the theoretical part the usage of certificates to improve security is explained. In the practical part a concept of certificate handling middleware is introduced and implemented. This is to demonstrate what kind of functionality is needed to provide an improvement over the current situation in security with mobile devices. The certificate handling middleware is a concept that would work better if implemented directly into mobile device's core functionality. Many of the mobile devices have a certificate store to some degree and often it is not used to store other people's certificates. A certificate store combined with address book and added with possibility to add attributes to the people such as group memberships would be sufficient to satisfy the needs of many emerging sharing and social applications.
Resumo:
Tourism is one of the biggest industry branches with billions of tourists traveling every year around the world. Therefore, solutions providing tourist information have to be up to date with both changes in the industry and the world’s technological progress. The aim of this thesis is to present a design and a prototype of a tourist mobile service which is individual-oriented, cost-free for the end user, and secure. On the information providers’ side, the solution is implemented as a Webbased database. The end users access the information through a Bluetooth application on their mobile devices. The Bluetooth-based solution allows to avoid any costs for the end users, that is tourists. The study shows that, even with small data transfers, the tourists could save significantly when compared to possible roaming charges for data transfer. Also, the proposed mobile service is not intrusive, as it is provided through an application installed by tourists voluntarily on their mobile devices. Through design and implementation this work shows that it is possible to build a system which can be used to provide information services to tourists through mobile phones. The work achieved a successful ongoing synchronization between the client and the server databases. Implementation and usage were limited to smart phones only, as they provide better technological support for the solution having features like maps, GPS, Wi-Fi, Bluetooth and Databases. Moreover, the design of this system shows how Bluetooth technology can be used effectively as a means of communication while minimizing its shortcomings and risks, such as security, by bypassing Bluetooth server service discovery protocol (SDP) and connecting directly to the device. Apart from showing the design and implementation of the end-user costfree mobile information service, the results of this work also highlight the possible business opportunities to the provider of the service.
Resumo:
An Autonomous Mobile Robot battery driven, with two traction wheels and a steering wheel is being developed. This Robot central control is regulated by an IPC, which controls every function of security, steering, positioning localization and driving. Each traction wheel is operated by a DC motor with independent control system. This system is made up of a chopper, an encoder and a microcomputer. The IPC transmits the velocity values and acceleration ramp references to the PIC microcontrollers. As each traction wheel control is independent, it's possible to obtain different speed values for each wheel. This process facilities the direction and drive changes. Two different strategies for speed velocity control were implemented; one works with PID, and the other with fuzzy logic. There were no changes in circuits and feedback control, except for the PIC microcontroller software. Comparing the two different speed control strategies the results were equivalent. However, in relation to the development and implementation of these strategies, the difficulties were bigger to implement the PID control.
Resumo:
Mobile applications market shows one of the highest growth rates for the market of intellectual products. The market is attractive to investors, despite the fact that the major companies of this industry already firmly consolidated its position. Experts predict the growth of the market for mobile applications with the development of mobile technologies in general. To demonstrate the explosive growth of the market and the scale of its impact, it is worth recalling the mobile game Angry Birds, which was able to achieve a huge reach and formed a full-fledged media brand, comparable to the film industry brands. The reasons why some games become popular and others not, are important for understanding the driving factors of the games industry. The Master’s Thesis explores the factors for mobile games applications popularity and ranking and propose recommendations for mobile games app store optimization of app representation. It discovers particular features of mobile games applications and releases’ influence on their popularity. Also the study assumes usage of such business models as The Business Model Canvas by Osterwalder and The Lean Startup Methodology by Ries, and describes the best practices of mobile application development process and market positioning. Moreover, the Master’s Thesis gives examples of multiple case studies about successful mobile apps developers.
Resumo:
The recent emergence of a new generation of mobile application marketplaces has changed the business in the mobile ecosystems. The marketplaces have gathered over a million applications by hundreds of thousands of application developers and publishers. Thus, software ecosystems—consisting of developers, consumers and the orchestrator—have emerged as a part of the mobile ecosystem. This dissertation addresses the new challenges faced by mobile application developers in the new ecosystems through empirical methods. By using the theories of two-sided markets and business ecosystems as the basis, the thesis assesses monetization and value creation in the market as well as the impact of electronic Word-of-Mouth (eWOM) and developer multihoming— i. e. contributing for more than one platform—in the ecosystems. The data for the study was collected with web crawling from the three biggest marketplaces: Apple App Store, Google Play and Windows Phone Store. The dissertation consists of six individual articles. The results of the studies show a gap in monetization among the studied applications, while a majority of applications are produced by small or micro-enterprises. The study finds only weak support for the impact of eWOM on the sales of an application in the studied ecosystem. Finally, the study reveals a clear difference in the multi-homing rates between the top application developers and the rest. This has, as discussed in the thesis, an impact on the future market analyses—it seems that the smart device market can sustain several parallel application marketplaces.
Resumo:
The vast majority of our contemporary society owns a mobile phone, which has resulted in a dramatic rise in the amount of networked computers in recent years. Security issues in the computers have followed the same trend and nearly everyone is now affected by such issues. How could the situation be improved? For software engineers, an obvious answer is to build computer software with security in mind. A problem with building software with security is how to define secure software or how to measure security. This thesis divides the problem into three research questions. First, how can we measure the security of software? Second, what types of tools are available for measuring security? And finally, what do these tools reveal about the security of software? Measuring tools of these kind are commonly called metrics. This thesis is focused on the perspective of software engineers in the software design phase. Focus on the design phase means that code level semantics or programming language specifics are not discussed in this work. Organizational policy, management issues or software development process are also out of the scope. The first two research problems were studied using a literature review while the third was studied using a case study research. The target of the case study was a Java based email server called Apache James, which had details from its changelog and security issues available and the source code was accessible. The research revealed that there is a consensus in the terminology on software security. Security verification activities are commonly divided into evaluation and assurance. The focus of this work was in assurance, which means to verify one’s own work. There are 34 metrics available for security measurements, of which five are evaluation metrics and 29 are assurance metrics. We found, however, that the general quality of these metrics was not good. Only three metrics in the design category passed the inspection criteria and could be used in the case study. The metrics claim to give quantitative information on the security of the software, but in practice they were limited to evaluating different versions of the same software. Apart from being relative, the metrics were unable to detect security issues or point out problems in the design. Furthermore, interpreting the metrics’ results was difficult. In conclusion, the general state of the software security metrics leaves a lot to be desired. The metrics studied had both theoretical and practical issues, and are not suitable for daily engineering workflows. The metrics studied provided a basis for further research, since they pointed out areas where the security metrics were necessary to improve whether verification of security from the design was desired.
Resumo:
Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some of the major issues in Mobile Cloud Computing. One of the key issues in mobile cloud computing is the end to end delay in servicing a request. Data caching is one of the techniques widely used in wired and wireless networks to improve data access efficiency. In this paper we explore the possibility of a cooperative caching approach to enhance data access efficiency in mobile cloud computing. The proposed approach is based on cloudlets, one of the architecture designed for mobile cloud computing.
Resumo:
El trabajo describe el proyecto de desarrollo de un SIG 3D de código abierto para dispositivos móviles (Apple-iOS y Android) y para navegadores web con tecnología WebGL. En la fase actual, nos centraremos en el diseño e implementación del globo virtual, como elemento esencial que da soporte al SIG 3D y de una IDE que permite la programación de nuevas funcionalidades al globo. Dentro de los objetivos de diseño del globo virtual tenemos (i) simplicidad, con código estructurado que facilita la portabilidad y con una API de código abierto sencilla, (ii) eficiencia, tomando en cuenta los recursos hardware de los dispositivos móviles más extendidos en el mercado, (ii) usabilidad, implementando una navegación intuitiva mediante gestos para la interacción en pantalla y (iv) escalabilidad, gracias a una API desarrollada, se permite aumentar de las prestaciones mediante el desarrollo de scripts y podrán ser ejecutados tanto dentro del navegador web como de forma nativa en las plataformas móviles. Ante un panorama de clara proliferación de aplicaciones para móviles, Glob3 Mobile pretende ser una apuesta fuerte que llegue a convertirse en un SIG 3D de código abierto que abarque variadas aplicaciones sectoriales, algunas ya en marcha
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in building automation, healthcare and agriculture. In the EU project Hydra1 highlevel security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios especially in the user domains of building automation, healthcare, and agriculture. This paper gives a short introduction to the Hydra project, its user domains and its approach to ensure security by design. Based on the results of a focus group analysis of the building automation domain typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta Model. How concepts such as context security, semantic security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of a technical building automation scenario.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.
Resumo:
Mobile devices are attractive media for directly communicating with consumers who have become busier and more difficult to reach. While SMS (short message service) advertising has received some attention in the literature, Bluetooth-enabled advertising is still unexplored. This research aims to investigate younger consumers’ acceptance of Bluetooth-delivered advertising. Although the majority of the respondents were willing to accept this form of advertising, they needed both to be in control of the frequency with which they receive messages and also to be reassured that the medium could ensure privacy and security. The research further indicated that peers influence the acceptance of Bluetooth-driven advertising.
Resumo:
In recent years, ZigBee has been proven to be an excellent solution to create scalable and flexible home automation networks. In a home automation network, consumer devices typically collect data from a home monitoring environment and then transmit the data to an end user through multi-hop communication without the need for any human intervention. However, due to the presence of typical obstacles in a home environment, error-free reception may not be possible, particularly for power constrained devices. A mobile sink based data transmission scheme can be one solution but obstacles create significant complexities for the sink movement path determination process. Therefore, an obstacle avoidance data routing scheme is of vital importance to the design of an efficient home automation system. This paper presents a mobile sink based obstacle avoidance routing scheme for a home monitoring system. The mobile sink collects data by traversing through the obstacle avoidance path. Through ZigBee based hardware implementation and verification, the proposed scheme successfully transmits data through the obstacle avoidance path to improve network performance in terms of life span, energy consumption and reliability. The application of this work can be applied to a wide range of intelligent pervasive consumer products and services including robotic vacuum cleaners and personal security robots1.