scholarly journals How Dangerous Are Your Smartphones? App Usage Recommendation with Privacy Preserving

2016 ◽  
Vol 2016 ◽  
pp. 1-10 ◽  
Author(s):  
Konglin Zhu ◽  
Xiaoman He ◽  
Bin Xiang ◽  
Lin Zhang ◽  
Achille Pattavina

With the rapid proliferation of mobile devices, explosive mobile applications (apps) are developed in the past few years. However, the functions of mobile apps are varied and the designs of them are not well understood by end users, especially the activities and functions related to user privacy. Therefore, understanding how much danger of mobile apps with respect to privacy violation to mobile users is becomes a critical issue when people use mobile devices. In this paper, we evaluate the mobile app privacy violation of mobile users by computing the danger coefficient. In order to help people reduce the privacy leakage, we combine both the user preference to mobile apps and the privacy risk of apps and propose a mobile app usage recommendation method named AppURank to recommend the secure apps with the same function as the “dangerous” one for people use. The evaluation results show that our recommendation can reduce the privacy leakage by 50%.

2019 ◽  
Vol 8 (4) ◽  
pp. 10536-10543

The usage of hand-held and mobile devices has been increased rapidly in recentyears. The execution of sophisticated softwares and Apps on mobile phonescan lead to poor performance with respect to energy consumption and responsetime. With the emergence of the offloading concept of App workloads, an attempt has been made toimprove the performance of the hand-held devices by exploiting cloud service. The computation offloadingin hand-held devices consumes energy as well as time for transferring the datafrom hand-held devices to cloud. For the effective use of cloud services, there is a need to optimize the execution time of mobile App and energy consumedby the respective App. Many research endeavors have been made in recentyears to reduce the execution time and energy consumption during offloadingprocess. However, the usage of offloading has been evolved to quench the thirstof mobile users who execute multiple Apps simultaneously and are in dire needof seamless connectivity but some dynamic algorithms are needed to decidewhether offloading is favorable or not for a mobile App. If the mobile Apptakes more time and consumes more battery if executed on cloud then it isrecommended to use mobile platform rather than using cloud services. In thispaper, we are presenting machine learning based techniques which would help the mobile users in decision making to execute the App on mobile devices or on cloud using cloud services.


2017 ◽  
Vol 8 (2) ◽  
pp. 1-18
Author(s):  
Hongyu Guo ◽  
Amjad Nusayr ◽  
Wen-Chen Hu

Toggle buttons are intuitive gadgets widely used in software GUI design and mobile app interfaces with increasing popularity on mobile devices. However, the current practice of toggle button design is prone to semantic ambiguity, which causes confusions to the users. This paper presents an analysis of the various paradigms of toggle button design in the current practice and provides a resolution of the sematic ambiguities by proposing a set of design standards regarding toggle buttons. State semantics and action semantics are distinguished and it is advocated that state semantics should be used in lieu of action semantics.


2019 ◽  
Vol 47 (2) ◽  
pp. 189-192 ◽  
Author(s):  
Harry E Smallbone ◽  
Thomas FE Drake-Brockman ◽  
Britta S von Ungern-Sternberg

Follow-up for ongoing management and monitoring of patients is important in clinical practice and research. While common, telephone follow-up is resource intensive and, in our experience, yields low success rates. Electronic communication using mobile devices including smartphones and tablets can provide efficient alternatives — including SMS (text), online forms and mobile apps. To assess attitudes towards electronic follow-up, we surveyed 642 parents and carers at Perth Children’s Hospital, targeting demographics, device ownership and attitudes towards electronic follow-up. Mobile phone ownership was effectively universal. Almost all respondents were happy to communicate electronically with the hospital. Promisingly, 93.2% of respondents were happy to receive follow-up SMSs from the hospital and 80.3% were happy to reply to SMS questions. There was less enthusiasm regarding other modalities, with 59.9% happy to use a website and 69.0% happy to use a mobile app. The results support the introduction of electronic communication for follow-up in our paediatric population.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Efthimios Alepis ◽  
Constantinos Patsakis

The extensive adoption of mobile devices in our everyday lives, apart from facilitating us through their various enhanced capabilities, has also raised serious privacy concerns. While mobile devices are equipped with numerous sensors which offer context-awareness to their installed apps, they can also be exploited to reveal sensitive information when correlated with other data or sources. Companies have introduced a plethora of privacy invasive methods to harvest users’ personal data for profiling and monetizing purposes. Nonetheless, up till now, these methods were constrained by the environment they operate, e.g., browser versus mobile app, and since only a handful of businesses have actual access to both of these environments, the conceivable risks could be calculated and the involved enterprises could be somehow monitored and regulated. This work introduces some novel user deanonymization approaches for device and user fingerprinting in Android. Having Android AOSP as our baseline, we prove that web pages, by using several inherent mechanisms, can cooperate with installed mobile apps to identify which sessions operate in specific devices and consequently further expose users’ privacy.


Author(s):  
Ivo Damyanov ◽  
Nikolay Tsankov

<span>The use of mobile devices is increasing in daily learning activities, providing single-person use combined with interactive learning materials, simulations, voice recognition and educational games. Mobile app stores bring to learners a large amount of mobile applications, but their value and effectiveness to support these learning activities is far from being adequately studied.</span><br /><span>In this paper, we present our recent study related to the opportunities for smart devices to be used in school education, outlining the main obstacles and challenges. The subject of the research is students' interest in the use of multimedia mobile devices for educational purposes. The aim of the study is to establish the main determinants for the complete and purposeful application of smart devices in school education.</span>


2020 ◽  
pp. 489-507
Author(s):  
Ying Xiu ◽  
Jose L. Fulgencio ◽  
Tutaleni I. Asino ◽  
Alesha D. Baker

Globally, those who have traditionally been adversely impacted by the digital divide due to lack of access to computing technologies such as desktop computers, are also the ones who have been shown to have high adoption of mobile devices. If open educational resources (OER) are to have the envisaged wide impact, it is necessary to look at the role mobile applications and mobile app markets play in the OER movement. In this chapter, we link mobile applications and OER and discuss the role mobile app markets play in facilitating open-access learning initiatives. This is done by exploring OER and mobile learning definitions, benefits, and barriers; and comparing and contrasting mobile apps across a set of variables including purpose and resource format.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Konglin Zhu ◽  
Zexuan Liu ◽  
Lin Zhang ◽  
Xinyu Gu

Explosive mobile applications (Apps) are proliferating with the popularity of mobile devices (e.g., smartphones, tablets). These Apps are developed to satisfy different function needs of users. Majority of existing App Stores have difficulty in recommending proper Apps for users. Therefore, it is of significance to recommend mobile Apps for users according to personal preference and various constraints of mobile devices (e.g., battery power). In this paper, we propose a mobile App recommendation framework by incorporating different requirements from users. We exploit modern portfolio theory (MPT) to combine the popularity of mobile Apps, personal preference, and mobile device constraints for mobile App recommendation. Based on this framework, we discuss the recommendation approaches by constraints of phone power and limited mobile data plan. Extensive evaluations show that the proposed mobile App recommendation framework can well adapt to power and network data plan constraints. It satisfies the user App preference and mobile device constraints.


2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sarah Hudson ◽  
Yi Liu

PurposeAs mobile apps request permissions from users, protecting mobile users' personal information from being unnecessarily collected and misused becomes critical. Privacy regulations, such as General Data Protection Regulation in the European Union (EU), aim to protect users' online information privacy. However, one’s understanding of whether these regulations effectively make mobile users less concerned about their privacy is still limited. This work aims to study mobile users' privacy concerns towards mobile apps by examining the effects of general and specific privacy assurance statements in China and the EU.Design/methodology/approachDrawing on ecological rationality and heuristics theory, an online experiment and a follow-up validation experiment were conducted in the EU and China to examine the effects of privacy assurance statements on mobile users' privacy concerns.FindingsWhen privacy regulation is presented, the privacy concerns of Chinese mobile users are significantly lowered compared with EU mobile users. This indicates that individuals in the two regions react differently to privacy assurances. However, when a general regulation statement is used, no effect is observed. EU and Chinese respondents remain unaffected by general assurance statements.Originality/valueThis study incorporates notions from fast and frugal heuristics end ecological rationality – where seemingly irrational decisions may make sense in different societal contexts.


Author(s):  
Wen-Chen Hu ◽  
Naima Kaabouch ◽  
Hongyu Guo ◽  
AbdElRahman Ahmed ElSaid

This chapter describes how mobile advertisements are critical for both mobile users and businesses as people spend more time on mobile devices than on PCs. However, how to send relevant advertisements and avoid unnecessary ones to specific mobile users is always a challenge. For example, a concert-goer may like to visit restaurants or parks before the concert and may not like the advertisements of grocery stores or farmers' markets. This research tries to overcome the challenge by using the methods of location-aware data mining. Furthermore, privacy is always a great concern for location-based advertising (LBA) users because their location information has to be shared in order to receive the services. This chapter also takes the concern into serious consideration, so the user privacy will not be compromised. Preliminary experiment results show the proposed methods are effective and user-privacy is rigorously preserved.


2020 ◽  
Vol 12 (4) ◽  
pp. 24-41
Author(s):  
Yasmeen Elsantil

With the exponential increase in the use of mobile devices across the globe, there is a concomitant need to understand how mobile users perceive the security of mobile application, and the potential risks involved in accessing and downloading them. Such an understanding will enable users to ensure the apps they download are secure and create greater awareness in the marketplace of the presence of hackers and malware used to invade the privacy and personal details of smartphones users. Research on the perception of users' mobile security is very limited and needs further investigation. This study aims to identify how mobile users perceive the security of different mobile apps and the extent to which different apps affect such perceptions. This study also investigates mobile user preferences for the places where they can access apps and their perceptions of risk at marketplaces vs. websites. This study is based on a qualitative research in which interviews were conducted with 32 university students. The study found that mobile users do not feel secure when installing mobile apps, and that concerns about hacking personal and private information are pervasive. Users expressed more security concerns regarding entertainment apps such as games and communication rather than financial apps, such as banking. The study also found that users prefer installing apps from app stores. The findings of this research contribute a greater understanding of how mobile users perceive mobile app security and offers insights that will help developers adjust their security policies to ensure users' security. The study also presents theoretical and empirical contributions, along with limitations and suggestions for further work.


Sign in / Sign up

Export Citation Format

Share Document