893 resultados para applicazione android marketing prossimità geolocalizzazione
Resumo:
Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.
Resumo:
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
Google Android, Google's new product and its first attempt to enter the mobile market, might have an equal impact on mobile users like Apple's hyped product, the iPhone. In this Technical report we are going to present the Google Android platform, what Android is, describe why it might be considered as a worthy rival to Apple's iPhone. We will describe parts of its internals, take a look "under the hood" while explaining components of the underlying operating system. We will show how to develop applications for this platform, which difficulties a developer might have to face, and how developers can possibly use other programming languages to develop for Android than the propagated language Java.
Resumo:
How can marketers stop speeding motorists and binge drinking? Two experiments show that the beliefs consumers have about the degree to which they define themselves in terms of their close relationships (i.e., relational-interdependent self-construal (RISC)) offer useful insights into the effectiveness of communications for two key social marketing issues—road safety (Study 1, New Zealand sample) and alcohol consumption (Study 2, English sample). Further, self-referencing is a mechanism for these effects. Specifically, people who define themselves in terms of their close relationships (high-RISCs) respond most favorably to advertisements featuring a dyadic relationship (two people), and this favorable response is mediated by self-referencing. In contrast, people who do not include close relationships in their sense of self (low-RISCs) respond most favorably to self-reference advertisements featuring solitary models.
Resumo:
A global, online quantitative study among 300 consumers of digital technology products found the most reliable information sources were friends, family or word of mouth (WOM) from someone they knew, followed by expert product reviews, and product reviews written by other consumers. The most unreliable information sources were advertising or infomercials, automated recommendations based on purchasing patterns or retailers. While a very small number of consumers evaluated products online, rating of products and online discussions were more frequent activities. The most popular social media websites for reviews were Facebook, Twitter, Amazon and e-Bay, indicating the importance of WOM in social networks and online media spaces that feature product reviews as it is the most persuasive piece of information in both online and offline social networks. These results suggest that ‘social customers’ must be considered as an integral part of a marketing strategy.
Resumo:
Reports of immoral marketing practices i n the construction industry attract political, media and public but not much academic interest. This paper adopts a behavioural perspective and proposes a model for applying marketing ethics concepts and methods in the study of collusion in the construction contract market. An extensive multidisciplinary review of existing literature identified a lack of adequate conceptualisation of the mechanisms and decision making factors of collusive tendering. The process of developing the model is detailed in this paper. The objectives and methodology of the research project that tested the model are also outlined. The paper concludes with a brief note on the contributions and application of the proposed model.
Online environmental citizenship : blogs, green marketing and consumer sentiment in the 21st Century
Resumo:
Over the last three decades, the rise in consumer generated content has enabled more environmentally conscious points of view to effect mainstream opinion (Kalafatis, Pollard, East & Tsogas, 1999; Barber, Taylor & Strick, 2009). Consequently, more people are buying into environmentalist ideology and organizing themselves to influence social change. Focus has shifted from attracting public awareness to concern for green ideas, discourse, and environmental citizenship, the latter becoming the guideline by which debates on such topics are regulated (Follows & Jobber, 2000; Dobson, 2003).
Resumo:
This text explores the area of advertising and promotion practice. It shows how real organisations coordinate the various elements of the promotional mix with other marketing activities."--Provided by publisher
Resumo:
Evidence-based practice in entrepreneurship requires effective communication of research findings. We focus on how research synopses can “promote” research to entrepreneurs. Drawing on marketing communications literature, we examine how message characteristics of research synopses affect their appeal. We demonstrate the utility of conjoint analysis in this context and find message length, media richness and source credibility to have positive influences. We find mixed support for a hypothesized negative influence of jargon, and for our predictions that participants’ involvement with academic research moderates these effects. Exploratory analyses reveal latent classes of entrepreneurs with differing preferences, particularly for message length and jargon.
Resumo:
Purpose This study aims to employ the Model of Goal-Directed Behaviour (MGB) to examine the consumer acceptance of technology-based self-service (TBSS) for a credence service instrumental to a social goal. Credence services are increasingly delivered via self-service technology and in social marketing, the achievement of social goals can be contingent on consumer acceptance of these services. However, little is known about the determinants of acceptance and extant marketing literature fails to account for emotional and goal influences which are likely to be important. Design/methodology/approach The authors interviewed 30 young adults with self-reported stress, anxiety or depression as potential users of a self-help mental health service delivered via mobile phone. The data were analysed deductively and inductively with the assistance of NVivo. Findings The findings generally support using the MGB to enhance understanding of consumers' acceptance of TBSS. The paper also found evidence of the importance of maintenance self-efficacy, the self-evaluation of the ability to continue using the service, and a previously ignored element of consumer level competition that arises between alternatives that achieve the same goal. Originality/value This study is the first to examine factors that influence consumers' acceptance of TBSS for credence services aimed at achieving a social goal. It builds on understanding of consumer decision making in social marketing, particularly the influence of self-efficacy and competition. It also contributes to attitudinal research by providing initial evidence for deepening and broadening the MGB in the context of TBSSs.