scholarly journals Inference of demographic attributes based on mobile phone usage patterns and social network topology

Author(s):  
Carlos Sarraute ◽  
Jorge Brea ◽  
Javier Burroni ◽  
Pablo Blanc
2016 ◽  
Vol 5 (3) ◽  
pp. e160 ◽  
Author(s):  
Galen Chin-Lun Hung ◽  
Pei-Ching Yang ◽  
Chia-Chi Chang ◽  
Jung-Hsien Chiang ◽  
Ying-Yeh Chen

Author(s):  
Hanny Yulius Limanto ◽  
Tay Joc Cing ◽  
Andrew Watkins

With the recent introduction of third generation (3G) technology in the field of mobile communications, mobile phone service providers will have to find an effective strategy to market this new technology. One approach is to analyze the current profile of existing 3G subscribers to discover common patterns in their usage of mobile phones. With these usage patterns, the service provider can effectively target certain classes of customers who are more likely to purchase their subscription plans. To discover these patterns, we use a novel algorithm called Artificial Immune Recognition System (AIRS) that is based on the specificity of the human immune system. In our experiment, the algorithm performs well, achieving an accuracy rate in the range of 80% to 90%, depending on the set of parameter values used.


2017 ◽  
Vol 26 ◽  
pp. S87-S88 ◽  
Author(s):  
K. Santo ◽  
S. Kirkendall ◽  
J. Chalmers ◽  
C. Chow ◽  
J. Redfern

2011 ◽  
Vol 2 (5) ◽  
pp. 229-238
Author(s):  
Ishfaq Ahmed ◽  
Khadija Aijaz Perji .

This study focuses on exploring the pattern of mobile phone usage among youngsters in Pakistan to delineate the extent of addictive behavior towards its usage. For this purpose questionnaires were used to elicit the responses. University students were selected as population and simple random sampling technique was used. Sample was consisting of 500 students out of which 400 students responded back comprising 80% response rate for this research. Findings of this study revealed that majority respondents are able to have definite priorities between their responsibilities & commitments and their cell phone usage. Very few are those who always exhibit the extreme addictive behaviors and rest is the majority who are not frequently involved in addictive usage patterns. Thus, youngsters use their cell phones under reasonable limits and do not tend towards extreme behaviors leading towards addictive cell phone usage.


Author(s):  
Andraž Petrovčič ◽  
Sebastiaan Peek ◽  
Vesna Dolničar

Assistive applications (apps) on smartphones could contribute to a better quality of life for seniors living independently at home. At present, there is a lack of empirical evidence of seniors’ acceptance of such apps. The Cycle of Technology Acquirement by Independent-Living Seniors (C-TAILS) model was recently proposed for studying the interplay between acceptance factors by integrating the personal, social and technological domains of seniors’ daily lives. This study aimed to explore how four groups of factors, clustered in accordance with the C-TAILS model, predict seniors’ interest in assistive apps, on a representative sample of the Slovenian population aged 55 years or older. The 617 respondents, who were contacted though a telephone survey, answered a questionnaire about their interest in three groups of assistive apps and four groups of potentially associated acceptance factors. Three linear regression models were used to analyse the association between the factors and the seniors’ interest in the three types of assistive apps. Smartphone-related dispositional traits were the strongest predictors across all three models. Among mobile phone usage patterns, smartphone use and the breadth of mobile phone features used were significant factors, while the significance of seniors’ personal characteristics and socio-economic conditions varied across the models. Hence, awareness that these factors play different roles in the acceptance of different assistive apps is needed in order to design viable interventions for their acceptance among seniors.


2010 ◽  
Author(s):  
Scott W. Campbell ◽  
Nojin Kwak

Author(s):  
Sonya Zhang ◽  
Saree Costa

As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.


2018 ◽  
Vol 10 (1) ◽  
pp. 23-39
Author(s):  
Sonya Zhang ◽  
Saree Costa

As the digital generations have grown up with high-tech gadgets and become avid users of mobile phones and apps, they are also exposed to increasing mobile security threats and vulnerability. In this paper the authors discuss the impact of recent mobile technology advancements on mobile threat environment and mobile security practices. They also conducted a survey to 262 college students to examine their mobile phone usage patterns, security concerns and practices. The results show that students use their mobile phone frequently for various productivity and entertainment purposes. They are generally aware of and concerned about mobile security, not only on losing the phone physically but also on data theft, web threat, and mobile malware. Students also practice security to some extend - most change PIN and passwords regularly, download their apps mostly from official app stores, and generally keep their OS and apps up-to-date. The authors also found significant correlations between mobile security practices and personal attributes, including major, gender, and technology aptitude.


Sign in / Sign up

Export Citation Format

Share Document