scholarly journals Pushed SOLID: Deploying SOLID in Smartphones

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Manuel Jesús-Azabal ◽  
Enrique Moguel ◽  
Sergio Laso ◽  
Juan Manuel Murillo ◽  
Jaime Galán-Jiménez ◽  
...  

Personal information has become one of the most valuable coins on the Internet. Companies gather a massive amount of data to create rich profiles of their users, trying to understand how they interact with the platform and what are their preferences. However, these profiles do not follow any standard and are usually incomplete in the sense that users provide different subsets of information to distinct platforms. Thus, the quality and quantity of the data vary between applications and tends to inconsistency and duplicity. In this context, the Social Linked Data (SOLID) initiative proposes an alternative to separate the user’s information from the platforms which consume it, defining a unique and autonomous source of data. Following this line, this study proposes Pushed SOLID, an architecture that integrates SOLID in the user’s smartphone to store and serve their information from a single entity controlled by the users themselves. In this study, we present an implementation of the Pushed SOLID proposal with the aim of experimentally assessing the technical viability of the solution. Satisfactory performance results have been obtained at battery consumption and response time. Furthermore, users have been interviewed about the proposal, and they find the solution attractive and reliable. This solution can improve the way data are stored on the Internet, empowering users to manage their own information and benefiting third party applications with consistent and update profiles.

2013 ◽  
Vol 3 (2) ◽  
pp. 58-70 ◽  
Author(s):  
B. Dawn Medlin

Due to the Internet and applications that can access the Internet, healthcare employees can benefit from the ability to view patient data almost anywhere and at any time. Data and information is also being shared among third party vendors, partners and supplies. With this type of accessibility of information which generally does include very personal information such as diagnosis and social security numbers, data can easily be obtained either through social engineering techniques or weak password usage. In this paper, a presentation of social engineering techniques is explored as well as the password practices of actual health care workers.


Author(s):  
Edward J. Szewczak

Personal information privacy is arguably the most important issue facing the growth and prosperity of the Internet, especially of e-commerce. Protecting personal information privacy has ignited a debate that pits privacy advocates against technology growth enthusiasts. This chapter explores personal information privacy on the Internet in terms of the social and legal issues surrounding it, and the technological challenges to personal information privacy facing individuals, businesses, and government regulators. Representative solutions to resolving the debate are presented, though at present the debate over personal information privacy continues and may have to be resolved by governments and the courts.


Psichologija ◽  
2012 ◽  
Vol 46 ◽  
pp. 60-79
Author(s):  
Birutė Pociūtė ◽  
Erika Krancaitė

Didėjant internetinės komunikacijos pritaikymo populiarumui, internetas tapo svarbiu socialiniu paauglių raidos kontekstu. Paskutiniais duomenimis, Lietuvoje „Facebook’o“ vartotojų yra jau daugiau kaip 1 mln., o penktadalis jų – 13–17 metų paaugliai. Naudojimosi socialiniais tinklais motyvus nagrinėję tyrėjai teigia, kad pagrindinis motyvas, skatinantis individus naudotis interneto socialiniais tinklais, yra poreikis palengvinti psichosocialines problemas, pavyzdžiui: vienišumą, tačiau nesutariama, ar internetas praplečia realaus bendravimo ribas, ar užima jo vietą, ar padeda išspręsti individo psichosocialines problemas, ar sukelia naujų problemų. Šio tyrimo tikslas – ištirti paauglių naudojimosi interneto socialiniu tinklu „Facebook“ pobūdžio sąsajas su jaučiamu vienišumu bei asmenybės bruožais.Tyrime dalyvavo 175 paaugliai, kurie mokosi 8–10 klasėse. Tiriamųjų amžius nuo 13 iki 18 metų (M = 15,44; SD = 1,102). Tiriamieji pildė anketą apie naudojimąsi interneto socialiniu tinklu „Facebook“, ULCA vienišumo skalę (3 versija, Russell, 1996), Asmenybės bruožų klausimyną NEO-FFI (Costa and McCrae, 1992).Tyrimo rezultatai parodė, kad „Facebook“ socialiniame tinkle yra užsiregistravę 81,1 procento tirtų paauglių, kurie tam tinklui skiria labai daug savo laiko, skelbia daug asmeninės informacijos tinklo profiliuose, nepakankamai dėmesio skirdami privatumo išsaugojimui. „Facebook’e“ paaugliai susiranda daug „draugų“, nors vyrauja santykių perkėlimas iš realybės į internetą. Tyrimas parodė, kad paauglių veikla tinkle yra dvejopo pobūdžio: socialiai aktyvi ir socialiai pasyvi. Asmenybės bruožai taip pat turi įtakos paauglių elgsenai: neurotiškų paauglių veikla „Facebook“ tinkle yra socialiai pasyvaus pobūdžio; ekstravertiškiems paaugliams neužtenka tik internetinio bendravimo, todėl jie linkę realiai susitikti su žmonėmis, su kuriais susipažino tame tinkle; paaugliai, kurių stipriai išreikštas sąmoningumo bruožas, yra neaktyvūs „Facebook’o“ naudotojai, o tarp vienišumo jausmą išgyvenančių paauglių labai išryškėjo socialiai pasyvios veiklos.Pagrindiniai žodžiai: „Facebook“ socialinis tinklas, asmenybės bruožai, vienišumas, veikla socialiniame tinkle. ADOLESCENT ACTIVITY VS PASSIVITY ON SOCIAL NETWORKING WEBSITES AND ITS RELATIONS WITH LONELINESS AND PERSONALITY TRAITSBirutė Pociūtė, Erika KrancaitėSummaryWith the growing popularity of Internet communication among adolescents, the Internet has become an important social context of their development. Recent data have revealed that there are already are over 1 million Facebook users in Lithuania; one-fifth of Facebook users consists of adolescents 13–17 years old. Investigators have assumed that one of the main reasons encouraging individuals to use social network websites is to facilitate psychosocial problems such as loneliness. Scientists are discussing the Internet possibilities to extend the limits of real communication or to take its place. The aim of this investigation was to reveal the features of adolescents’ use of the social networking website Facebook and its relations with loneliness and personality traits.The study included 175 adolescents, age 13 to 18 years (M = 15.4; SD = 1.102). They filled in a questionnaire on the use of social website Facebook, UCLA loneliness scale (version 3; Russell, 1996), the personality traits questionnaire NEO-FFI (Costa and McCrae, 1992).The results show that 81.1% of teens are users of the social network site Facebook and spend very much time on Facebook, publishing a lot of personal information in the web profiles without paying due attention to privacy preservation. On the website, adolescents accumulate large amounts of “friends”, although relationship transfer from the reality to the Internet prevails. The study revealed two main activity types: socially proactive and socially passive. The results also show that the personality traits have an impact on teenagers’ behaviour on Facebook: neurotic teenagers’ activity on Facebook is socially passive; extraverted adolescents support the social enhance attitude, but they are not enough to communicate online and tend to actually meet people that first were met on Facebook. Teenagers with a highly expressed consciousness, in general, are not active Facebook users, and do not try to compensate their loneliness by using the social network website Facebook. Very lonely teenagers show a socially passive activity, or a passive activity dominates, or in combination with a social activity. At the time, loneliness decreases, depending on how much time per day adolescents use the Facebook website.Key words: Social Network Site Facebook; personality traits; loneliness; activity on social Network Site.


Nowadays, People are well-connected to one another in Social Networks. Usage of Internet and involvement in Online Social Platforms are increasing day by day. People sharing their personal information in these platforms. Even, they started Uploading their Photo in the Internet and it became very common among the Internet users. Without understanding the risk, user involved in sharing their personal details. Some fraudulent users uploading another user’s photo without their knowledge. They are getting photos of others in many ways such as by taking photos using their mobile cameras, collecting images from Social networks, stealing images from the theft mobile. They are posting the photos in the Social media applications which are stored enduringly in the database. This results in the misuse of photo and involved in many criminal activities. To overcome this security problem, a competent face recognition system is needed which identify the user in the photo. To handle this, a set of users, friends list and their private photographs. This system accomplished as an evidence of approach in social network on Facebook application.


2017 ◽  
Vol 3 (2) ◽  
pp. 76
Author(s):  
Octarina Nur Samijayani ◽  
Ibnu Fauzi

<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar atau Smart Home yang memanfaatkan teknologi Jaringan Sensor Nirkabel menggunakan standard Zigbee. Beberapa node sensor ditempatkan pada peralatan rumah, dimana setiap node dapat saling berkomunikasi secara wireless dan terpusat di node kordinator. Selanjutnya node kordinatior akan terhubung ke jaringan internet sehingga pemilik rumah dapat membuka aplikasi smart home kapan saja dan dimana saja. Rancangan sistem <em>Smart Home</em> disimulasikan menggunakan rumah model untuk menguji kinerja perangkat <em>Smart Home</em>. Pengujian kinerja Smart Home dimulai dengan pengujian keakurasian masing masing data sensor hingga waktu respon komunikasi dari sensor ke pusat monitoring. Tingkat error pembacaan suhu disetiap ruangan ialah 1 - 4.27%. Sensor PIR berhasil mendeteksi keberadaan orang di suatu ruangan dengan waktu delay </strong><strong>adalah 2.8 detik dengan jarak maksimal 5 meter</strong><strong>. Fungsi kendali dan monitoring (<em>on/off</em>) perangkat elektronik bekerja dengan baik, dengan waktu respon kurang dari 1 detik. Dari hasil pengujian komunikasi nirkabel antar node, diperoleh bahwa jarak maksimal antar node ialah sekitar 20 m, dengan rata-rata waktu respon pengiriman data ialah 1-2 detik. Adapun waktu respon mengalami delay mencapai 2 detik apabila beberapa perintah kendali dilakukan pada waktu yang bersamaan.</strong></p><p> </p><p><strong><em>Kata Kunci - </em></strong><em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p><p> </p><p><em>Abstrak</em><strong> - Home security becomes very important when homeowners leave the house empty. In addition to theft, fire is also a problem that often occurs when the house left the owner. As an alternative solution to maintain and supervise the homes submitted in this study is to use Wireless Sensor Network technology integrated with the Internet network, so that homeowners can still monitor the state of the house remotely. In this study designed prototype smart home system or Smart Home which utilizes Wireless Sensor Network technology using Zigbee standard. Some sensor nodes are placed in the home equipment, where each node can communicate wirelessly and centrally at the coordinator node. Next node coordinate will be connected to the internet network so that homeowners can open smart home application anytime and anywhere. The Smart Home system design is simulated using a home model to test the performance of Smart Home devices. Smart Home performance testing begins with testing the accuracy of each sensor data until the communication response time from the sensor to the monitoring center. The error rate of temperature readings in each room is 1 - 4.27%. PIR sensor successfully detects the presence of people in a room with a delay time is 2.8 seconds with a maximum distance of 5 meters. The control and monitoring functions (on / off) of electronic devices work well, with a response time of less than 1 second. From the results of testing wireless communication between nodes, obtained that the maximum distance between nodes is about 20 m, with the average response time of data transmission is 1-2 seconds. The response time has a delay of 2 seconds if some control commands are done at the same time.</strong><strong></strong></p><p><strong> </strong></p><p><strong><em>Keywords - </em></strong> <em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p>


Author(s):  
Е.Н. Юдина

интернет-пространство стало частью реального мира современных студентов. В наши дни особенно актуальна проблема активизации использования интернета как дополнительного ресурса в образовательном процессе. В статье приводятся результаты небольшого социологического исследования, посвященного использованию интернета в преподавании социологических дисциплин. Internet space has become a part of the real world of modern students. The problem of increasing the use of the Internet as an additional resource in the educational process is now particularly topical. The article contains the results of a small sociological study on the use of the Internet in teaching sociological disciplines.


Author(s):  
Mark Newman

The study of networks, including computer networks, social networks, and biological networks, has attracted enormous interest in recent years. The rise of the Internet and the wide availability of inexpensive computers have made it possible to gather and analyse network data on an unprecendented scale, and the development of new theoretical tools has allowed us to extract knowledge from networks of many different kinds. The study of networks is broadly interdisciplinary and developments have occurred in many fields, including mathematics, physics, computer and information sciences, biology, and the social science. This book brings together the most important breakthroughts in each of these fields and presents them in a unified fashion, highlighting the strong interconnections between work in different areas. Topics covered include the measurement of networks; methods for analysing network data, including methods developed in physics, statistics, and sociology; fundamentals of graph theory; computer algorithms, including spectral algorithms and community detection; mathematical models of networks such as random graph models and generative models; and models of processes taking place on networks.


Sign in / Sign up

Export Citation Format

Share Document