scholarly journals Fraudulent actions using information and telecommunications technologies in the field of mobile Internet applications

2021 ◽  
Vol 7 (2) ◽  
pp. 133-137
Author(s):  
K. I. Ozerov

The article deals with the specifics of committing fraudulent actions in the field of mobile Internet applications. The question of the security of official (App Store, Google Play) and unofficial platforms for downloading user programs for various purposes is raised. Examples of fraud are given and their negative consequences are demonstrated. The essence of fleeceware-applications is revealed and the pros and cons of the IOS and Android operating systems, which are the technical base in the mobile devices of the largest companies, are noted. There is an age category that is more exposed or may be exposed to illegal actions on the part of fraudsters in the field of IT technologies. In turn, the emphasis is placed on some gaps in those. systems and legislation in which the fraudster avoids criminal prosecution. The high latency of such crimes is confirmed due to the small damage to the victims of the assault, if we consider each victim separately, as well as due to the complexity of the crime itself. Measures are taken to prevent fraudulent actions related to online applications on mobile devices against yourself.

2013 ◽  
Vol 373-375 ◽  
pp. 1242-1246
Author(s):  
Yuan Jun Luo

With the continuous advance of mobile Internet applications and deepening of the mobile node based multicast applications are rapidly expanding, which prompted about IP multicast technology moves towards greater efficiency requires rapid expansion. This detailed analysis of the current source mobile support the technical characteristics of the pros and cons of various options, from mobile multicast nature of the fundamental dilemma facing the Institute and gives a general conclusion. Meanwhile, according to the technical characteristics of the mobile anchor point MAP, as a starting point, the initial build a more comprehensive source mobile multicast algorithm, given the basic principles and operation points, so show a good efficacy with, the extension movement of multicast frame shape.


IEEE Access ◽  
2016 ◽  
Vol 4 ◽  
pp. 3273-3287 ◽  
Author(s):  
Zhe Yang ◽  
Bing Wu ◽  
Kan Zheng ◽  
Xianbin Wang ◽  
Lei Lei

2017 ◽  
Vol 7 ◽  
pp. 73-79 ◽  
Author(s):  
Gaurav Gupta ◽  
Nikhilesh R. Vaid

The usage of the portable electronic devices such as the smartphones and handheld tablets has increased over the years, and this is true in the health-care industry also. This is because of the development of various patient management softwares. The use of apps to manage, educate, and inform patient is not uncommon among orthodontists nowadays. The aim of this article was to review the various apps available on the Google Play Store and iOS Apple Store for orthodontists and patients. Four smartphones using orthodontically relevant keywords such as orthodontics, orthodontists, and braces were searched and reviewed in detail. Out of the 354 orthodontically relevant apps available in both Android and Apple operating systems, the apps could be categorized as orthodontist-related apps or patient-related apps. Under these categories they could be further classified as practice managements apps, patient education apps, model analysis apps, tooth material calculators, patient reminder apps, etc.


2020 ◽  
pp. 197-218
Author(s):  
Bojana Trivunović ◽  
Olivera Gajić

With the development of mobile technology emerge fundamental changes in all spheres of human endeavor. In education, new methods of remote studying are being developed, with a particular emphasis on "m-learning" (learning with the help of mobile devices). Taking into consideration that mobile devices are one of the fastest-developing forms of technology, the importance of their assistance in the process of teaching and studying has been recognized. The goal of this paper is to introduce the concept of Bring Your Own Device (BYOD) in the context of industry and education as an example of disruptive technology. This concept implies that students bring their own mobile devices to the classroom and use them when learning. Using a descriptive research method and analysis of the relevant bibliography, the authors of the paper distinguish the implications for the change of university practices on the basis of critical analysis of positive and negative consequences of their use, redefined positions of the teachers and the students in the educational process, as well as the modified educational design.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Charles E. Perkins

The Internet is growing ever more mobile – meaning, that an ever greater proportion of Internet devices are mobile devices. This trend necessitates new designs and will produce new and even unpredictable conceptions about the very nature of the Internet and, more fundamentally, the nature of social interaction. The engineering response to growing mobility and complexity is difficult to predict. This chapter summarizes the past and the present ways of dealing with mobility, and uses that as context for trying to understand what needs to be done for the future. Central to the conception of future mobility is the notion of “always available” and highly interactive applications. Part of providing acceptable service in that conception of the mobile Internet will require better ways to manage handovers as the device moves around the Internet, and ways to better either hide or make available a person's identity depending on who is asking.


Sign in / Sign up

Export Citation Format

Share Document