E-Mail on the Move: Categorization, Filtering, and Alerting on Mobile Devices with the ifMail Prototype

Author(s):  
Marco Cignini ◽  
Stefano Mizzaro ◽  
Carlo Tasso ◽  
Andrea Virgili
Keyword(s):  
Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Author(s):  
A . Flores ◽  
M. Polo Usaola

Pervasive computing (PvC) environments should support the continuity of users’ daily tasks across dynamic changes of operative contexts. Pervasive or ubiquitous computing implies computation becoming part of the environment. Many different protocols and operating systems, as well as a variety of heterogeneous computing devices, are interrelated to allow accessing information anywhere, anytime in a secure manner (Weiser, 1991; Singh, Puradkar, & Lee, 2005; Ranganathan & Campbell, 2003).According to the initial considerations by Weiser (1991), a PvC environment should provide the feeling of an enhanced natural human environment, which makes the computers themselves vanish into the background. Such a disappearance should be fundamentally a consequence not of technology but of human psychology, since whenever people learn something sufficiently well, they cease to be aware of it. This means that the user’s relationship to computation changes to an implicit human-computer interaction. Instead of thinking in terms of doing explicit tasks “on the computer”—creating documents, sending e-mail, and so on—on PvC environments individuals may behave as they normally do: moving around, using objects, seeing and talking to each other. The environment is in charge of facilitating these actions, and individuals may come to expect certain services which allow the feeling of “continuity” on their daily tasks (Wang & Garlan, 2000).Users should be allowed to change their computational tasks between different operative contexts, and this could imply the use of many mobile devices that help moving around into the environment. As a result, the underlying resources to run the required applications may change from wide memory space, disk capacity, and computational power, to lower magnitudes. Such situations could make a required service or application inappropriate in the new context, with a likely necessity of supplying a proper adjustment. However, users should not perceive the surrounding environment as something that constraints their working/living activities. There should be a continuous provision of proper services or applications. Hence the environment must be provided with a mechanism for dynamic applications suitability (Flores & Polo, 2006).


Author(s):  
Chris Houser ◽  
Patricia Thornton

Mobile devices such as laptop computers, PDAs (personal digital assistants), and cell phones offer many features useful for learning both inside and outside classrooms. These devices offer access to Web pages and e-mail, and provide other functions such as textual noting and video cameras. They promise a single, easily learned device that can be useful in a variety of educational settings. When used appropriately, these devices can enrich the learning experience by connecting learners with each other, their environment, and with information providers. They can enable collaborative problem solving by providing easy face-to-face sharing of data through IR (infrared) beaming or distance sharing through e-mail and Web interfaces. For learners who require repetitive practice for skills development, mobile devices offer a personal tool that can be used anytime, anywhere for quick review. Because of their low cost and ease of use, mobile devices have the potential to bring the power of a computer to every learner.


Author(s):  
Gabriele Costa ◽  
Aliaksandr Lazouski ◽  
Fabio Martinelli ◽  
Paolo Mori

In these last years, mobile devices, such as mobile phones or Personal Digital Assistants, became very popular among people. Moreover, mobile devices became also very powerful, and most of them are also able to execute applications, such as games, Internet browsers, e-mail clients, and so on. Hence, an adequate security support is required on these devices, to avoid that malicious applications damage the device or perform unauthorized accesses to personal data (such as the contact list). This chapter describes the approaches that have been proposed in scientific literature to guarantee the security of mobile devices.


Author(s):  
Susan A. Elwood ◽  
Marsha Grace ◽  
Claudia Lichtenberger

We are making progressive advances towards Weiser’s vision. Technologies are already being embedded into our environment. Smart floors can sense when a person has fallen and immediately send vital information to paramedic support (Abowd, Atkeson, Bobick, Essa, MacIntyre, Mynatt, & Starner, 2000). People are using mobile devices, such as cell phones for e-mail, instant messaging, Web browsing, games, and MP3 playback (Lendino, 2006). Presence technologies are already informing us as to our IM buddy’s physical presence, such as online, off-line, busy, or away from the desk. Current uses of the Web for searching, photos, music, video, various levels of electronic communities, and online, collaborative software applications are preparing users to advance to the next Web 2.0 level of Internet use. Combine Web 2.0 with expanded WiFi capabilities, and we won’t need large computing devices for sharing large amounts of data within virtual, collaborative environments.


2015 ◽  
pp. 1270-1282
Author(s):  
Şebnem Özdemir ◽  
Emre Akadal ◽  
Zerrin Ayvaz Reis

Mobile device usage highly increases in last years. Most people use mobile devices to do their computer works like checking e-mail, following social media, surfing on the Web, etc. Also mobile devices let one install new applications on one's devices. Two huge mobile operating systems—Android and iOS—have mobile application markets to offer new applications to users. There are many application categories in mobile application markets. One of them is “Education” category. This study defines what kind of applications in education category there are. All applications in this category were reviewed and analysed with descriptive methods.


Author(s):  
Gabriele Costa ◽  
Aliaksandr Lazouski ◽  
Fabio Martinelli ◽  
Paolo Mori

In these last years, mobile devices, such as mobile phones and tablets, have become very popular. Moreover, mobile devices have become very powerful and commonly run fairly complex applications such as 3D games, Internet browsers, e-mail clients, social network clients, and many others. Hence, an adequate security support is required on these devices to avoid malicious application damage or unauthorized accesses to personal data (such as personal contacts or business email). This chapter describes the security support of the current commercial mobile devices along with a set of approaches that have been proposed in the scientific literature to enhance the security of mobile applications.


10.28945/3272 ◽  
2008 ◽  
Author(s):  
Oludele Awodele ◽  
Victor Dibia ◽  
Oghenerukevwe Onoruvie ◽  
Sharon Okoruwa

Conventionally, enterprise services that can be utilized by mobile devices such as E - mail, instant messaging, data transfer, news and event notification have been typically achieved using GPRS (General Packet Radio Service) connections to access internet servers that provide these services. Thus, even in a local area, disadvantages such as full dependence on GPRS service providers, incurred GPRS costs and slow data/communication rates constitute formidable drawbacks. This paper describes a system /Architecture (BTServ) in which these same services can be supplied via Bluetooth, with notable benefits such as high data rates, minimal dependence on external (GPRS) networks, higher security (internet attacks are totally avoided) and reduced cost, in a localized setting such as a corporate house.


Sign in / Sign up

Export Citation Format

Share Document