scholarly journals An investigation into the impact of rooting android device on user data integrity

Author(s):  
Mohamed Hassan ◽  
Lutta Pantaleon
Keyword(s):  
Volume 3 ◽  
2004 ◽  
Author(s):  
Hua Dong ◽  
P. John Clarkson ◽  
Simeon Keates

In the past twenty years, a number of resources and tools to support inclusive design have been developed. However, the impact of these resources and tools on industry is not evident — few industrialists have been using them in practice. Investigations into industry have identified unmet needs, for example, the lack of appropriate user data relating to inclusive design. The fundamental problem is that few resources and tools have been developed based on rigorous requirements capture. In fact, many of them were developed only because the developers think the information could be useful. It is essential to prepare a detailed requirements list when clarifying the task at the product planning stage. This is also true for developing resources and tools for inclusive design. Requirements capture plays an important role in identifying real needs from users and developing appropriate methods of support for them. This paper starts with a survey of available resources and tools for inclusive design, and a discussion on their merits and deficiencies in respect to industry application. A number of methods are employed for the requirements capture for an inclusive design toolkit, which leads to a consistent result. An outline of the toolkit is also presented.


2022 ◽  
Vol 6 (GROUP) ◽  
pp. 1-14
Author(s):  
Lindah Kotut ◽  
D. Scott McCrickard

Privacy policy and term agreement documents are considered the gateway for software adoption and use. The documents provide a means for the provider to outline expectations of the software use, and also provide an often-separate document outlining how user data is collected, stored, and used--including if it is shared with other parties. A user agreeing with the terms, assumes that they have a full understanding the terms of the agreement and have provided consent. Often however, users do not read the documents because they are long and full of legalistic and inconsistent language, are regularly amended, and may not disclose all the details on what is done to the user data. Enforcing compliance and ensuring user consent have been persistent challenges to policy makers and privacy researchers. This design fiction puts forward an alternate reality and presents a policy-based approach to fording the consent gap with the TL;DR Charter: an agreement governing the parties involved by harnessing the power of formal governments, industry, and other stakeholders, and taking users expectation of privacy into account. The Charter allows us as researchers to examine the implications on trust, decision-making, consent, accountability and the impact of future technologies.


2020 ◽  
Vol 6 (3) ◽  
pp. 219-222 ◽  
Author(s):  
Cyril Blanchet ◽  
Nathalie Fabry

Purpose This paper aims to anticipate the influence of new cinematographic and television operators on the attractiveness of tourist destinations. Design/methodology/approach The methodology developed is two-fold: first, long-haul observation of the sector, and second, a state of the literature on the topic. Findings These platforms reshape the distribution of audiovisual content and influence consumer behavior. Through the detailed knowledge of users (user data, recommendation algorithm), the platforms have important information at their disposal to build future tourism trends. Originality/value In the continuity of research in film tourism, the authors question the impact of platforms that are now emerging as significant operators in the distribution and creation of audiovisual content.


2021 ◽  
Vol 16 (2) ◽  
pp. 54-61
Author(s):  
A. Kredina ◽  
A. Akparova ◽  
L. Vasa

The COVID-19 pandemic has accelerated the development of FinTech and the transition to cashless payments of the population of various countries, including Kazakhstan. For provision of cashless payments there are created platforms which work in NFC & MFS systems, they protected by security protocols (Secure Element (SE)) and allow to store confidential user data. Changes in the business model of banks have led to the emergence of a new format of banking products and services that can be used through smartphones (the main operating systems Android and iOS). The goal of the study is to analyze the dynamics of the impact of the COVID-19 pandemic on the use of cashless payments through national payment systems in Kazakhstan. Based on the goal, a null and an alternative hypothesis were set, of which the second was confirmed in the result. Research methods used to write this article are economic and statistical analysis and synthesis, graphical method, analysis of the series of dynamics. The data for the study was taken from the NBK Statistical Bulletin: data on cashless payments through the Interbank System of Money Transfer (ISMT) and the Interbank Clearing System (ICS) for the period from 2002 to 2020. The impact of the COVID-19 pandemic on the dynamics of the transformation of cashless payments made by using financial technologies has been proved. Recommendations for further improvement of the financial system are given. The development of national payment systems makes it possible to reduce the level of fraud in the financial sector, to increase the speed of cashless transfers and level out transaction errors. Study limitation: only national payment systems ISMT and ICS were used.


The widespread adoption of multi-cloud in enterprises is one of the root causes of cost-effectiveness. Cloud service providers reduce storage costs through advanced data de-duplication, which also provides vulnerabilities for attackers. Traditional approaches to authentication and data security for a single cloud need to be upgraded to be best suitable for cloud-to-cloud data migration security in order to mitigate the impact of dictionary and template attacks on authentication and data integrity, respectively. This paper proposes a scheme of user layer authentication along with lightweight cryptography. The proposed simulates its mathematical model to analyze the behavioral pattern of time-complexity of data security along with user auth protection. The performance pattern validates the model for scalability and reliability against both authentication and data integrity.


2020 ◽  
Vol 12 (7) ◽  
pp. 3064 ◽  
Author(s):  
Tai Huynh ◽  
Hien Nguyen ◽  
Ivan Zelinka ◽  
Dac Dinh ◽  
Xuan Hau Pham

Influencer marketing is a modern method that uses influential users to approach goal customers easily and quickly. An online social network is a useful platform to detect the most effective influencer for a brand. Thus, we have an issue: how can we extract user data to determine an influencer? In this paper, a model for representing a social network based on users, tags, and the relationships among them, called the SNet model, is presented. A graph-based approach for computing the impact of users and the speed of information propagation, and measuring the favorite brand of a user and sharing the similar brand characteristics, called a passion point, is proposed. Therefore, we consider two main influential measures, including the extent of the influence on other people by the relationships between users and the concern to user’s tags, and the tag propagation through social pulse on the social network. Based on these, the problem of determining the influencer of a specific brand on a social network is solved. The results of this method are used to run the influencer marketing strategy in practice and have obtained positive results.


2019 ◽  
Vol 292 ◽  
pp. 03002
Author(s):  
Albert Espinal ◽  
Rebeca Estrada ◽  
Carlos Monsalve

Nowadays, the traffic over the networks is changing because of new protocols, devices and applications. Therefore, it is necessary to analyze the impact over services and resources. Traffic Classification of network is a very important prerequisite for tasks such as traffic engineering and provisioning quality of service. In this paper, we analyze the variable packet size of the traffic in an university campus network through the collected data using a novel sniffer that ensures the user data privacy. We separate the collected data by type of traffic, protocols and applications. Finally, we estimate the traffic model that represents this traffic by means of a Poisson process and compute its associated numerical parameters.


Sign in / Sign up

Export Citation Format

Share Document