Quantifying Political Behavior on Mobile Devices over Time: A User Evaluation Study

2014 ◽  
Vol 11 (4) ◽  
pp. 435-445 ◽  
Author(s):  
Lindsay H. Hoffman ◽  
Hui Fang
2011 ◽  
Vol 1 (4) ◽  
Author(s):  
Oleg Davidyuk ◽  
Ekaterina Gilman ◽  
Iván Milara ◽  
Jussi Mäkipelto ◽  
Mikko Pyykkönen ◽  
...  

AbstractUbiquitous computing environments advocate creating applications by plugging together various resources (mobile devices, displays, augmented everyday objects, and so on) and Web Services to support the user’s everyday activities and needs. This approach is referred to as application composition, and such applications are called composite. Due to the dynamic nature of ubiquitous environments, application composition has to be supported at runtime, so that the applications are able to adapt to the situation within the environment and other contexts. Application composition is usually performed by autonomous context-aware mechanisms that provide limited or no control for users. Still, users need to be aware of their environments and be able to control and configure applications when they are composed and executed. Towards this goal we present in this article a context-aware application composition system based on the iCompose interface for composing and controlling applications at runtime. Users compose applications by simply touching the resources in the environment with their mobile devices, while the iCompose interface provides feedback and assists users by suggesting them possible further actions. The interface relies on a rule-based reasoner and utilizes various context sources to support users dynamically, according to the situation in which they compose applications. We present a complete implementation of the system and report the results of a user evaluation study conducted with 21 participants. This study assesses the issues of control, usability, feasibility and user acceptance of the iCompose interface for context-aware application composition and the prototype as a whole.


2021 ◽  
Vol 30 (Sup8) ◽  
pp. 25-35
Author(s):  
Peta Lager ◽  
Lisa Loxdale

Leaks and peristomal skin complications are highly prevalent among people with a stoma, reported by over 80% of ostomates within 2 years of surgery. This suggests that there is room for improvement in ostomy appliances, particularly in their hydrocolloid-based adhesive flanges. Hydrocolloid has an absorptive method of moisture management that, over time, risks maceration and skin stripping, potentially leading to moisture-associated skin damage (MASD) and medical adhesive-related skin injury (MARSI). The newly developed Genii ostomy appliances (Trio Healthcare) use novel Sil2 Breathable Silicone Technology to provide secure, effective adhesion and manage moisture levels by replicating natural transepidermal water loss (TEWL). This has the potential to increase appliance wear time, reduce incidence of MASD and permit atraumatic removal without adhesive remover, reducing the risks of MARSI, as well as time burdens on the user and economic burdens on the healthcare system. Meanwhile, the silicone flanges and water-resistant sports fabric pouches are lightweight, flexible and unobtrusive, and they are the first appliances to be available in colours to match different skin tones, all of which provides security, comfort, confidence and discretion. This article explores the features of Sil2 and Genii ostomy appliances, with reference to preliminary data from a user evaluation.


2016 ◽  
Vol 2016 (1) ◽  
pp. 4-19 ◽  
Author(s):  
Andreas Kurtz ◽  
Hugo Gascon ◽  
Tobias Becker ◽  
Konrad Rieck ◽  
Felix Freiling

Abstract Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1) all fingerprints are unique and distinguishable; and (2) utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time


2013 ◽  
pp. 1188-1203
Author(s):  
Ricardo Queirós ◽  
Mário Pinto

Recent studies of mobile Web trends show the continued explosion of mobile-friend content. However, the wide number and heterogeneity of mobile devices poses several challenges for Web programmers, who want automatic delivery of context and adaptation of the content to mobile devices. Hence, the device detection phase assumes an important role in this process. In this chapter, the authors compare the most used approaches for mobile device detection. Based on this study, they present an architecture for detecting and delivering uniform m-Learning content to students in a Higher School. The authors focus mainly on the XML device capabilities repository and on the REST API Web Service for dealing with device data. In the former, the authors detail the respective capabilities schema and present a new caching approach. In the latter, they present an extension of the current API for dealing with it. Finally, the authors validate their approach by presenting the overall data and statistics collected through the Google Analytics service, in order to better understand the adherence to the mobile Web interface, its evolution over time, and the main weaknesses.


Author(s):  
Tansif Ur Rehman

The practice of protecting computers, websites, mobile devices, electronic services, networks, and digital data from malicious attacks is known as cybersecurity. Since political, military, private, financial, and medical institutions collect, process, and maintain massive volumes of data on computers and other devices, cybersecurity is critical. Sensitive data, such as intellectual property, financial data, personal records, or other forms of data, can make up a large amount of the data. Improper access or disclosure to that data can have profound implications. Technology has undoubtedly made a significant change in every aspect of life in Pakistan, whether it is a financial or non-financial sphere. Technology's usage is thoroughly utilized by banks worldwide. They have started adopting it frequently because of the immense need to achieve goals and satisfy customer needs more efficiently. Almost all leading banks have now provided e-commerce facilities. Over time, more and more services and facilities are offered to bank customers conveniently via e-commerce products.


Author(s):  
Álvaro M. Sampaio ◽  
Paulo Simões ◽  
Pedro Arezes ◽  
António J. Pontes

The interaction of hand tools with the user is crucial and a key factor for his or her performance. In specific medical devices like surgical instruments, it is also important to ensure patient safety, namely, to avoid the risk of a surgical instrument’s being left inside a body. This article investigates the patterns of hand-to-product contact areas by identifying the potential locations to couple an external add-on tracing device on surgical instruments. A user evaluation study was conducted to determine the contact areas between the surgeons’ hands and different surgical instruments. The methodology, the results, and a discussion are described below.


2020 ◽  
Vol 4 (2) ◽  
pp. 28
Author(s):  
Snežana Stupar-Rutenfrans ◽  
Jaap Elzes ◽  
John van den Elst

This study explores if peripheral colored ambient light or colored light can be noticed and semantically associated with text while reading a novel from an Electronic Visual Display (EVD). Additionally, it is investigated if those colored signs are perceived as supplementary to the story and result in a more immersive experience. For that purpose, a user evaluation study was performed based on attention theory (selective attention, semantic priming, and divided attention), reading behavior, and semantics of colors. Participants received a reading assignment. While reading a novel from an e-book, dynamic colored ambient light or colored light was emitted. Throughout the reading assignment, the colors were adapted to the particular scenes the participant was reading. Findings suggest that attention can be divided between reading the novel from an EVD and the ambient color signs.


Author(s):  
Masashi Sugahara ◽  
Keichi Noto ◽  
Atsushi Idoji ◽  
Kazukiyo Yamamoto ◽  
Kenta Hanai ◽  
...  

As Japan has increasingly becoming a so-called “super-aging society,” and the number of people with mobility impairment has increased, the barrier-free improvements have been implemented to public facilities so far. After the New Barrier-free Law has been enforced, however, the conceptual basis of such improvements has been shifting toward the universal design, based on the idea that everybody should be able to use facilities impartially. This study clarifies the present situation and problems of the barrier-free improvements from a passenger ship terminal to the inside of a ship, and elucidates improvement issues of nodal points of future marine and land transport. We carried out a questionnaire and site survey for the Hiroshima Port Ujina Passenger Boat Terminal, as well as the ships used, where the improvements are made based on the New Barrier-free Law.


Sign in / Sign up

Export Citation Format

Share Document