scholarly journals Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices

2016 ◽  
Vol 32 (3) ◽  
pp. 200-216 ◽  
Author(s):  
Kirsten Martin ◽  
Katie Shilton
Author(s):  
Gustavo Poot Tah ◽  
Erika Llanes Castro ◽  
José Luis López Martínez ◽  
Victor Chi Pech

This paper presents the design and development of a mobile application that uses QR codes for the inventory control of a computer center. This application was developed to support the administration of the computer center of the Multidisciplinary Unit Tizimin, with the aim to reduce costs and time of searching for articles when making an inventory, by leveraging the capabilities of smartphones and tablets. The implementation of the system was carried out using free software.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Teng Li ◽  
Jianfeng Ma

Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (CP-ABE). However, a practical and secure data sharing scheme that simultaneously supports fine-grained access control, large university, key escrow free, and privacy protection in MCC with expressive access policy, high efficiency, verifiability, and exculpability on resource-limited mobile devices has not been fully explored yet. Therefore, we investigate the challenge and propose an Efficient and Multiauthority Large Universe Policy-Hiding Data Sharing (EMA-LUPHDS) scheme. In this scheme, we employ fully hidden policy to preserve the user privacy in access policy. To adapt to large scale and distributed MCC environment, we optimize multiauthority CP-ABE to be compatible with large attribute universe. Meanwhile, for the efficiency purpose, online/offline and verifiable outsourced decryption techniques with exculpability are leveraged in our scheme. In the end, we demonstrate the flexibility and high efficiency of our proposal for data sharing in MCC by extensive performance evaluation.


2018 ◽  
Vol 8 (3) ◽  
pp. 124-128
Author(s):  
Nadide Duygu Solak ◽  
Murat Topaloglu

The number of mobile applications has been increasing rapidly in every field of life with the increasing use of smart devices. Smartphones and tablets make our lives easier with their properties and application they include. Minor or major accidents in traffic are always present in the daily life resulting in financial damage and loss of lives. There have been a number of studies done to speed up the processes to be done from the moment an accident happens. This study aims to enable people to perform all of the post-accident processes quickly and accurately with the use of mobile devices. In this way, papers and documents like photographs will be sent to the competent authorities without wasting time and effort. In addition, access to the road assistance needed will be quite easy. Keywords: Traffic accident, loss assessment and proceedings, mobile application.


2014 ◽  
Vol 31 (5) ◽  
pp. 14-16 ◽  
Author(s):  
Dheeraj Singh Negi

Purpose – The purpose of this paper is to describe the use of mobile technologies to develop new ways of Libraries and Information Centre. Mobile devices help to connect with patrons. Creating a library application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or even search databases is easier than most people think. The resources below should help libraries begin to plan and implement their own unique mobile presence: analyzing the present usage of mobile devices; providing an overview of devices, providers and features; describing the various activities these devices support for well library use; focusing how libraries and our librarians are responding with services tailored for these devices; and what can be done by libraries in future in this respect”. Design/methodology/approach – Information and Communications Technology continues to expand the boundaries of higher education into the “anytime/anywhere” experiences. Mobile communication is transforming how people search, receive and interact with information on a daily basis. In just a few short years, smart phone ownership has skyrocketed, and popular use of e-readers has been steadily on the rise. These advanced mobile tools provide portable access to the world of information, across boundaries of subject, discipline and industry. Findings – Mobile technology holds great promise for enabling libraries to provide enhanced services in a form users increasingly are demanding. If this promise is to be fully realized, however, libraries will need to conduct analyses and make smart decisions to address the issues outlined above, support staff education and explore partnerships and new funding models, and be prepared to compromise with respect to their traditional information delivery models. Originality/value – The explosion of advanced mobile technology and robust digital information collection capabilities should prompt libraries to examine carefully the ramifications for user privacy. Libraries can maintain their commitment to user privacy without overcompensating by imposing burdensome security measures or annoying interruptions. For example, libraries do not have to show users a privacy statement or security warning every time they want to access information on a mobile device. A single log-in and acceptance of terms of use, similar to the procedures for other mobile applications and services, should suffice. At the same time, libraries can take the opportunity to educate users in best practices with respect to privacy issues associated with the use of mobile devices.


2016 ◽  
pp. 1770-1788
Author(s):  
Annika Wiklund-Engblom ◽  
Kasper Hiltunen ◽  
Juha Hartvik ◽  
Mia Porko-Hudd ◽  
Marléne Johansson

The study presented is part of a work-in-progress project of developing a mobile application for smartphones, Talking Tools (TT). The first context TT is developed for and tested in is sloyd education [Swedish: slöjd], a compulsory subject taught in Finnish schools. In sloyd learners design and manufacture unique artifacts in various materials (textiles, wood, metal, and electronics). The process-based work flow of sloyd lends itself well to this kind of educational tool, which aids multimodal documentation, communication, and instruction. The empirical study targets what student teachers (N=11) microblogged about and the character of the blog posts during a sloyd project. A sociocultural perspective of appropriating new tools for learning is used as a theoretical frame, as well as views on multimodality and transmedia. Their sloyd process is discussed in terms of transmedia storybuilding, as learners build their own story as a flow of content through their documentation and interactions.


Author(s):  
Tristan Wehrmaker ◽  
Kurt Schneider

Mobile devices create new opportunities for companies. However, innovative applications can cause challenges for software and system architecture. In this chapter, the authors describe a trap to fall into when starting a promising mobile application in a shortsighted way. When the application gets popular and successful, diversity of mobile platforms increases. Many users have an almost emotional relationship to their own smartphone or platform and may not be willing to change it. In order to make the mobile application available to more users, a company may be tempted to add a “simple” extension to accommodate other platforms. Thus, the diversity in devices leads to diversity in distributed object technologies and with it to problems in complexity and compatibility. The authors describe an approach that counters this problem with RESTful services. They use the ConTexter system for illustrating experiences with the problem and for evaluating a proposed solution. The chapter shows the key issues the authors had to solve while migrating ConTexter to a RESTful platform.


Author(s):  
Habib M. Fardoun ◽  
Hachem Awada

At the current classrooms, teachers continue using traditional techniques for monitoring the class. However, there are more participation of mobile devices, and concretely, the tablets. In addition, the network access by both students and teachers in daily life is something usual and a routine work. For this reason, the authors propose the introduction at the classes of a system whose target is to facilitate teacher's labour in the common tasks that are done over the class session. Thus, through a mobile application and a centralized platform of students' data, the authors obtain an interactive and modern system that facilitates teacher's labour.


Author(s):  
Radu Ioan Ciobanu ◽  
Ciprian Dobre

When mobile devices are unable to establish direct communication, or when communication should be offloaded to cope with large throughputs, mobile collaboration can be used to facilitate communication through opportunistic networks. These types of networks, formed when mobile devices communicate only using short-range transmission protocols, usually when users are close, can help applications still exchange data. Routes are built dynamically, since each mobile device is acting according to the store-carry-and-forward paradigm. Thus, contacts are seen as opportunities to move data towards the destination. In such networks data dissemination is usually based on a publish/subscribe model. Opportunistic data dissemination also raises questions concerning user privacy and incentives. In this the authors present a motivation of using opportunistic networks in various real life use cases, and then analyze existing relevant work in the area of data dissemination. The authors present the categories of a proposed taxonomy that captures the capabilities of data dissemination techniques used in opportunistic networks. Moreover, the authors survey relevant techniques and analyze them using the proposed taxonomy.


2016 ◽  
Vol 78 (5) ◽  
Author(s):  
Retno Novi Dayawati ◽  
Mahmud Dwi Sulistiyo ◽  
Meiditia Mustika Rani ◽  
Rahmi Maulidina Nistia ◽  
Desi Noor Linda ◽  
...  

The deaf have a very fundamental problem, which is the ability to communicate and interact, so that it makes their very complicated. In the process of learning in basic education, the problem root faced by children with hearing impairment is the limitation in identifying and producing words. The learning process is limited to only rely on time at the school was an obstacle for them. Therefore, A-TooLips built as learning applications on mobile devices for the deaf children focusing on the ability to produce words. A-TooLips gives more time and places for hearing impaired children to learn, so that it helps their problem in communicating and interacting with others. It is explained in this paper that the A-TooLips has been successfully implemented and tested by some children with hearing impairment, and reached positive results.


Sign in / Sign up

Export Citation Format

Share Document