Toys and Mobile Applications: Current Trends and Related Privacy Issues

Author(s):  
Gary Ng ◽  
Michael Chow ◽  
André de Lima Salgado

Digitalization has transformed brick and motor fashion-oriented business to one tap convenient business through smart phones via mobile applications. The digital age is more inclined towards fashion and apparel due to ample exposure of current trends in fashion industry through internet, social media, travelling, cultural exchange and others. The study emphasized on discovering the online fashion and apparel buying behavior, satisfaction level, and exploring the most influential factors towards the digital consumers for online fashion and apparel shopping by analyzing 256 respondents through convenient and judgmental sampling. Data is analyzed through Factor analysis and multiple regression. The study reveals that Price sensitivity factors has significant weightage towards online fashion and apparel shopping like flash sales, loyalty programs and points, spike sales- exciting offers on all categories for limited period, cashback offers, Discounts and offers.


Author(s):  
Donovan Peter Chan Wai Loon ◽  
Sameer Kumar

From adults to children, beginners to experts, and in numerous countries around the world, there is a diverse user base for mobile devices. However, the extensive use of mobile devices has also led to the proliferation and attacks of various mobile malware. The purpose of this chapter is to provide an overview of mobile malware. Subsequently, the chapter highlights the current trends and challenges posed by malicious mobile applications. The authors look into Android and iOS mobile platforms and discuss current research to detect malicious applications. Remedies for poor risk communications on Android-based devices are also suggested.


Author(s):  
Rochell R. McWhorter ◽  
Elisabeth E. Bennett

Technology has become increasingly invasive and corporate networks are expanding into public and private spaces to collect unprecedented data and provide new services such as artificial intelligence and through unsettling human-like personas. The term “creepy technology” is appearing in the literature along with concerns for privacy, ethical boundaries, cybersecurity, and mistaken identity but is also in news articles to inform the public about technology advances that affect consumer privacy. Invasive technology provides the impetus for external adaptation for many organizations and current trends require rapid adaption to potential threats to security. Also, usability addresses how users respond and adapt to new technology. This chapter includes the presentation of an exploratory study of how the public responded to various technology announcements (N=689 responses) and results indicated a significant response to invasive technologies and some sense of freedom to opine. This chapter also provides discussion of interventions that are critical to both public and private sectors.


Author(s):  
Анна Дороговцева ◽  
Anna Dorogovtseva ◽  
Э. Томилина ◽  
E. Tomilina ◽  
А. Ерыгина ◽  
...  

New directions of HR management development which are observed for the last years as a result of development and introduction of high technologies are considered in the article. There has been analyzed HR tendency in Russia and basic HR trends which will allow HR specialists to increase productivity that is one of the key factors of competitiveness in companies. The relevance of application of Big Data is proved in HR analytics, mobile applications for the solution of HR tasks, new ways of search, assessment of candidates, new approaches to development of corporate education, use of training and development of personnel instead of search new, etc. in the companies, for the purpose of maintenance of competitiveness in the modern changing environment. In detail modern HR trends which recently are actively included into the HR sphere are considered and gain a foothold in it as the main tactics. Now they are necessary for development of the companies, for compliance to current trends and technological innovations in the sphere of modern HR.


Author(s):  
Athanasios Drigas ◽  
Pantelis Angelidakis

M-learning has the potential to take education out of classroom boundaries. Based on the device used, any student/learner can access a vast area of content. Varying from podcasts to videos, participate in virtual lessons or just ask a mentor over the net directly for answers to his problems. These new technological capabilities create demand for rethinking pedagogy and school system education. For that reason our examples of mobile applications within education (formal/informal) been made in correlation with technology. Usability details for each app are being discussed through the ISO9241 part11 standard. While describing current trends by taking in consideration curriculum prescribed directions and differentiated instruction’s theoretical suggestions.


2006 ◽  
Vol 30 (4) ◽  
Author(s):  
Grace Chung ◽  
Sara M. Grimes

Abstract: This paper explores privacy issues in relation to the growing prominence of marketing research and data mining in websites for children. Whereas increasing protection is given to individuals’ personal information, little attention is paid to information that is aggregated, electronically scanned, and sorted — despite the fact that aggregate information is often highly valued by the marketing industry. The authors review current trends in Internet market research, data mining techniques, policy initiatives, and the contents of some of the most highly frequented children’s game sites. The paper demonstrates how common data mining practices constitute a threat to children’s emerging rights online. Résumé : Cet article explore la question de la vie privée des enfants et la proéminence croissante de la recherche marketing et le « data mining » dans le développement et gestion des sites Web pour enfants. De plus en plus, l’incorporation des technologies «data mining» dans les sites Web résultent en un fusionnement de contenu et commerce, ce qui élève un nombre de questions concernant les droits des enfants et les responsabilités des chercheurs. Les auteurs concluent que les droits naissants des enfants en ligne sont à risque dans ce contexte commercial de l’Internet.


2019 ◽  
Vol 8 (3) ◽  
pp. 101-124
Author(s):  
M.M. Danina ◽  
N.V. Kiselnikova ◽  
E.A. Kuminskaya ◽  
P. Greskova

The prevalence of depression among the population estimated at 8-12%. The World Health Organization admits that the existing help system is not sufficiently successful in dealing with depression, and gives priority to online methods – accessible and anonymous. So it can be used by a large number of people and can help to overcome the problem of stigmatization of people with depression. In the article current trends in using online diagnostics tools (mobile applications and gadgets) are discussed and detection of groups with depression risk in social media digital footprints are analyzed. The prospect of research consists in studying the mechanisms and identifying specific components of programs related to the preventive effect, as well as the possibilities of using online methods to work with other mental disorders.


Author(s):  
Donovan Peter Chan Wai Loon ◽  
Sameer Kumar

From adults to children, beginners to experts, and in numerous countries around the world, there is a diverse user base for mobile devices. However, the extensive use of mobile devices have also led to the proliferation and attacks of various mobile malware. The purpose of this article is to provide an overview of mobile malware. Subsequently, the paper highlights the current trends and challenges posed by malicious mobile applications. The authors look into Android and iOS mobile platforms and discuss current research to detect malicious applications. Remedy for poor risk communications on Android-based devices are also suggested.


Author(s):  
Rochell R. McWhorter ◽  
Elisabeth E. Bennett

Technology has become increasingly invasive and corporate networks are expanding into public and private spaces to collect unprecedented data and provide new services such as artificial intelligence and through unsettling human-like personas. The term “creepy technology” is appearing in the literature along with concerns for privacy, ethical boundaries, cybersecurity, and mistaken identity but is also in news articles to inform the public about technology advances that affect consumer privacy. Invasive technology provides the impetus for external adaptation for many organizations and current trends require rapid adaption to potential threats to security. Also, usability addresses how users respond and adapt to new technology. This chapter includes the presentation of an exploratory study of how the public responded to various technology announcements (N=689 responses) and results indicated a significant response to invasive technologies and some sense of freedom to opine. This chapter also provides discussion of interventions that are critical to both public and private sectors.


Sign in / Sign up

Export Citation Format

Share Document