scholarly journals Interventions using mobile devices (phones, smart phones, or tablets) to improve adherence to treatment for HIV or tuberculosis

2021 ◽  
Vol 2021 (12) ◽  
Author(s):  
David J Roberts ◽  
Joseph Rylands ◽  
David Sinclair
2017 ◽  
Vol 2 (2) ◽  
pp. 31-35
Author(s):  
Akshada Abnave ◽  
Charulata Banait ◽  
Mrunalini Chopade ◽  
Supriya Godalkar ◽  
Soudamini Pawar ◽  
...  

M-learning or mobile learning is defined as learning through mobile apps, social interactions and online educational hubs via Internet or network using personal mobile devices such as tablets and smart phones. However, in such open environment examination security is most challenging task as students can exchange mobile devices or also can exchange information through network during examination. This paper aims to design secure examination management system for m- learning and provide appropriate mechanism for anti- impersonation to ensure examination security. The users are authenticated through OTP. To prevent students from exchanging mobile devices during examination, system re-authenticates students automatically through face recognition at random time without interrupting the test. The system also provides external click management i.e. prevent students from accessing online sites and already downloaded files during examination.


Author(s):  
Yang Li ◽  
Allan J. Brimicombe

This chapter introduces the concept of Mobile Geographical Information Systems (Mobile GIS) as an evolution of conventional GIS to being available on wireless mobile devices such as smart phones. The evolution of the technology and its applications are charted in this chapter. The main elements of Mobile GIS are then discussed. This focuses on: GIS servers; wireless mobile telecommunication networks; wireless mobile devices; location-awareness technology; and gateway services. This is followed by a discussion of the main features in terms of the services and usage of Mobile GIS: mobility; real-time connectivity; location-awareness; broadened usage. Mobile Geographical Information Systems are an important facilitating technology for Location-Based Services (LBS). A range of applications of Mobile GIS for smart phones are described. The chapter closes with a discussion of the prospects and challenges for Mobile GIS. Challenges derive from four broad areas: limitations that derive from the technologies being used; areas of GIScience that still need to be adequately researched; users; and business models for a sustainable presence.


Author(s):  
Jean-Eric Pelet ◽  
Jashim Khan ◽  
Panagiota Papadopoulou ◽  
Emmanuelle Bernardin

From the perspective of improving e-learning, the free access and user friendliness of User Generated Content (UGC) tools, such as social media, embedded onto mobile devices, such as smartphones and tablets, make them attractive to be adopted by students and professors in many institutions around the world. This chapter presents the results of an exploratory study on the use of smart phones and social media, identifying differences among countries, focusing on the MENA region (Middle East and North Africa). The objective is to facilitate the understanding of the rapidly evolving and expanding technology of smart phones and social media and explore its potential for m-learning purposes. Results show that social media and mobile devices can be effectively combined in a promising way to enable m-learning.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Nuno André Osório Liberato ◽  
João Eduardo Quintela Alves de Sous Varajão ◽  
Emanuel Soares Peres Correia ◽  
Maximino Esteves Correia Bessa

Location-based mobile services (LBMS) are at present an ever growing trend, as found in the latest and most popular mobile applications launched. They are, indeed, supported by the hasty evolution of mobile devices capabilities, namely smart phones, which are becoming truer mobile pocket-computers; by users demand, always searching for new ways to benefit from technology, besides getting more contextualized and user-centred services; and, lastly, by market drive, which sees mobile devices as a dedicated way to reach customers, providing profile-based publicity, products, discounts and events. With e-commerce, products and services started arriving to potential customers through desktop computers, where they can be bought and fast delivered to a given address. However, expressions such as “being mobile”, “always connected”, “anytime anywhere” that already characterize life in the present will certainly continue to do so in the near future. Meanwhile, mobile devices centred commerce services seem to be the next step. Therefore, this paper presents a system architecture designed for location-based e-commerce systems. These systems, where location plays the most important role, enable a remote products/services search, based in user parameters: after a product search, shops with that products are returned in the search results and are displayed in a map, around the user present location; and services like obtaining more information, reserving and purchasing are made available as well. This concept represents a mix between traditional client-oriented commerce and faceless mass-oriented e-commerce, enabling a proximity-based user-contextualized system, being well capable of conveying significant advantages and facilities to both service-providers/retailers and users.


2014 ◽  
Vol 602-605 ◽  
pp. 2321-2325
Author(s):  
Yin He Wu ◽  
Dai Ping Li

Due to the highly developed modern technology,Smart phones and other mobile devices are become more and more universal. Most of those devices are used to process or store sensitive and confidential data.Consequently,it may cause many problems,such as privacy disclosure,mobile phone virus,spyware,etc. In order to solve those issues,We need to monitor applications`s behaviour to tell those malicious ones. Here we use MobileSubstrate to hook every sensitive system API the application invokes in iOS planform,and send this invocation to our matching algorithm,the matching algorithm will evaluate if the API are being invoked in a safe way according to Application API Review Model.If a application trying to call some APIs which is totally unnecessary,we can reject this invoke and give user a warning.


2015 ◽  
Vol 2015 ◽  
pp. 1-23 ◽  
Author(s):  
Chi-Yo Huang ◽  
Yu-Sheng Kao

The smart mobile devices have emerged during the past decade and have become one of the most dominant consumer electronic products. Therefore, exploring and understanding the factors which can influence the acceptance of novel mobile technology have become the essential task for the vendors and distributors of mobile devices. The Phablets, integrated smart devices combining the functionality and characteristics of both tablet PCs and smart phones, have gradually become possible alternatives for smart phones. Therefore, predicting factors which can influence the acceptance of Phablets have become indispensable for designing, manufacturing, and marketing of such mobile devices. However, such predictions are not easy. Meanwhile, very few researches tried to study related issues. Consequently, the authors aim to explore and predict the intentions to use and use behaviors of Phablets. The second generation of the Unified Theory of Acceptance and Use of Technology (UTAUT2) is introduced as a theoretic basis. The Decision Making Trial and Evaluation Laboratory (DEMATEL) based Network Process (DNP) will be used to construct the analytic framework. In light of the analytic results, the causal relationships being derived by the DEMATEL demonstrate the direct influence of the habit on other dimensions. Also, based on the influence weights being derived, the use intention, hedonic motivation, and performance expectancy are the most important dimensions. The analytic results can serve as a basis for concept developments, marketing strategy definitions, and new product designs of the future Phablets. The proposed analytic framework can also be used for predicting and analyzing consumers’ preferences toward future mobile devices.


Author(s):  
Luke Albert Steller ◽  
Shonali Krishnaswamy ◽  
Mohamed Methat Gaber

With the emergence of high-end smart phones/PDAs there is a growing opportunity to enrich mobile/pervasive services with semantic reasoning. This paper presents novel strategies for optimising semantic reasoning for realising semantic applications and services on mobile devices. We have developed the mTableaux algorithm which optimises the reasoning process to facilitate service selection. We present comparative experimental results which show that mTableaux improves the performance and scalability of semantic reasoning for mobile devices.


2020 ◽  
Vol 9 (4) ◽  
pp. 324
Author(s):  
Hewa M. Zangana ◽  
Marwan Omar

Mobile devices such as Smart Phones and Personal Assistant Devices (PDA) that are Internet based are becoming much more capable of handling complex tasks such as online shopping, online banking as well as social media networking; However, the security mechanisms and defense measures that are built into those devices are not commensurate with those powerful communication and computational capabilities. This in turn, creates critical vulnerabilities thus promoting the chance for imminent security threats. The intent of this paper is to take a look into some of the vulnerabilities and risks associated with the use of smart phones that are Internet based, explore the current security mechanisms and strategies that are in place, and finally propose some proactive defense strategies to ensure appropriate protection of critical information contained in Smart phone devices.


Sign in / Sign up

Export Citation Format

Share Document