scholarly journals SoK: Cryptographic Confidentiality of Data on Mobile Devices

2021 ◽  
Vol 2022 (1) ◽  
pp. 586-607
Author(s):  
Maximilian Zinkus ◽  
Tushar M. Jois ◽  
Matthew Green

Abstract Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past several years, providers have deployed a number of advanced cryptographic features intended to protect data on mobile devices, even in the strong setting where an attacker has physical access to a device. Many of these techniques draw from the research literature, but have been adapted to this entirely new problem setting. This involves a number of novel challenges, which are incompletely addressed in the literature. In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks. Our work proposes a methodology that researchers can use to analyze cryptographic data confidentiality for mobile devices. We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on. We then analyze existing mobile device confidentiality measures to identify research areas that have not received proper attention from the community and represent opportunities for future research.

Partner Abuse ◽  
2015 ◽  
Vol 6 (1) ◽  
pp. 107-125 ◽  
Author(s):  
Julia K. Walker

Traditionally recognized as “violence against women,” the research literature on intimate partner violence/abuse (IPV/A; also known as domestic violence) continually neglects to incorporate subculture populations that do not fit societal understanding of typical victim/offender roles. More than 4 decades of research has expanded our knowledge of IPV/A in Western and developing countries across race, ethnicity, religion, and socioeconomic status. However, identifying the prevalence of IPV/A across all manner of relationships has been difficult. In particular, IPV/A within the transgender population has remained practically invisible. Although frequently recognized as an appendage of lesbian, gay, and bisexual populations, trans people are often overlooked in research because of their invisibility within society. Research that does exist is rarely generalizable because of sample size and selection. Therefore, research is required to assess how trans people are affected by IPV/A, what they understand IPV/A to be, what needs are trans-specific, and what help-seeking barriers exist.An analysis of the literature pertaining to trans people regarding IPV/A and other violence, health, and public relations as well as experiences with law enforcement agencies (LEAs) and judiciary in an attempt to identify any issues that could be relevant to trans people experiencing IPV/A is presented. Implications for practice and future research are discussed.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-28
Author(s):  
Deepak Thakur ◽  
Jaiteg Singh ◽  
Gaurav Dhiman ◽  
Mohammad Shabaz ◽  
Tanya Gera

Contemporary technologies have ensured the availability of high-quality research data shared over the Internet. This has resulted in a tremendous availability of research literature, which keeps evolving itself. Thus, identification of core research areas and trends in such ever-evolving literature is not only challenging but interesting too. An empirical overview of contemporary machine learning methods, which have the potential to expedite evidence synthesis within research literature, has been explained. This manuscript proposes Simulating Expert comprehension for Analyzing Research trends (SEAR) framework, which can perform subjective and quantitative investigation over enormous literature. TRENDMINER is the use case designed exclusively for the SEAR framework. TRENDMINER uncovered the intellectual structure of a corpus of 444 abstracts of research articles (published during 2010–2019) on Android malware analysis and detection. The study concludes with the identification of three core research areas, twenty-seven research trends. The study also suggests the potential future research directions.


2019 ◽  
Vol 43 (5) ◽  
pp. 818-824 ◽  
Author(s):  
V.V. Arlazarov ◽  
K. Bulatov ◽  
T. Chernov ◽  
V.L. Arlazarov

A lot of research has been devoted to identity documents analysis and recognition on mobile devices. However, no publicly available datasets designed for this particular problem currently exist. There are a few datasets which are useful for associated subtasks but in order to facilitate a more comprehensive scientific and technical approach to identity document recognition more specialized datasets are required. In this paper we present a Mobile Identity Document Video dataset (MIDV-500) consisting of 500 video clips for 50 different identity document types with ground truth which allows to perform research in a wide scope of document analysis problems. The paper presents characteristics of the dataset and evaluation results for existing methods of face detection, text line recognition, and document fields data extraction. Since an important feature of identity documents is their sensitiveness as they contain personal data, all source document images used in MIDV-500 are either in public domain or distributed under public copyright licenses. The main goal of this paper is to present a dataset. However, in addition and as a baseline, we present evaluation results for existing methods for face detection, text line recognition, and document data extraction, using the presented dataset.


Author(s):  
Ching-Hsien Hsu ◽  
Emmanuel Udoh

The ever-growing cloud computing and services provide dynamic intelligence and play an increasingly critical role in all aspects of our lives. By taking advantage of virtualized resources, cloud computing services presents an attractive means to address the challenges while realizing the potential of Mobile and Wireless Computing (MWC). The MWC paradigm can be generalized to include mobile devices, which not only incorporate sophisticated methods for users to interact with the online world through numerous applications in their devices, but are endowed with multiple sensors that enable them to contribute data as nodes in the IoT. In this context, mobile cloud services that enable widespread data collection through mobile devices and collaborative use of mobile devices to enhance existing and realize new applications are very much of interest. As such, the MWC has come to the picture seeking solutions for computing and IT infrastructures to be energy efficient and environmentally friendly. This special issue is in response to the increasing convergence between MWC and cloud services, while different approaches exist, challenges and opportunities are numerous in this context. The research papers selected for this special issue represent recent progresses in the field, including works on services computing and modeling, mobile cloud, U-Care cloud, vehicle networks, energy-aware architectures, and wireless sensor network technologies and applications. This special issue includes four extended version of the selected paper originally presented at the 17th Mobile Computing Workshop (MC 2012) and the 8th Workshop on Wireless, Ad Hoc and Sensor Networks (WASN 2012), held at Taipei, Taiwan; one extended version of the selected paper originally presented at the 4th IEEE International Conference on Cloud Computing Technology and Science (IEEE CloudCom 2012), held at Taipei, Taiwan; and one regular submission with 20% average acceptance rate for 2012 submissions in IJGHPC. The papers selected for this issue not only contribute valuable insights and results but also have particular relevance to the mobile, wireless and cloud computing community. All of them present high quality results for tackling problems arising from the ever-growing mobile and cloud services. We believe that this special issue provides novel ideas and state-of-the-art techniques in the field, and stimulates future research in the mobile and wireless services in clouds.


Author(s):  
Antonius Raghubansie ◽  
Hatem El-Gohary ◽  
Chandrani Samaradivakara

This paper aims to locate the key schools of thought in viral marketing (VM) literature, recognise the various sub-sets within viral marketing overall area of research and to identify the different gaps in viral marketing research literature offering a summation of the existing work done so far. The paper tries to build on the existing body of literature in the field of viral marketing, its related electronic word of mouth (eWOM) context and to present a taxonomic classification for future research. The review uses the paradigm funnel to examine the development of VM, key research contributions and categorises the published literature according to their objectives, analytical approaches and their contributions to theory. The literature addresses many subjects of study (e.g. E-Marketing, E-Word of Mouth, Social Media, Peer-to-Peer Communications, Viral Marketing, Buzz Marketing, Stealth Marketing, Viral Advertising, Viral Videos and other aligned research areas). The findings illustrated that there are various gaps in the literature that require further investigation. Based on the findings, it is evident that the existing frameworks arising from the literature should be enhanced by the adoption of qualitative approaches that explore how general observations respond to contingent factors.


2017 ◽  
Vol 4 ◽  
pp. 87-91
Author(s):  
Michał Buryta ◽  
Piotr Kopniak

The article concerns the differences in the mechanisms of securing the three most popular mobile platforms, which are Android, iOS and Windows Phone. Mainly focuses on the differences related to access to user data, installing and running applications, Internet access, network connectivity, cloud services, backup, file encryption capabilities, the use of electronic signatures and connect the device to your computer.


2016 ◽  
Vol 23 (2) ◽  
pp. 158-176 ◽  
Author(s):  
Samad M. E. Sepasgozar ◽  
Martin Loosemore ◽  
Steven R. Davis

Purpose – The purpose of this paper is to present a critical review of research in information and equipment technology adoption in the construction industry. The study also aims to formulate a conceptual framework of the different stages in the adoption process identify gaps in the existing literature and to provide a holistic picture of contemporary research in technology adoption in construction research literature. Design/methodology/approach – A generic framework is initially proposed containing the fundamental concepts of “pre-adoption”, “adoption” and “post-adoption”. The review separates the literature according to three key perspectives: “socio-economic”; “managerial”; and “psychological”. The applicability of the existing approaches to the construction context is discussed, and then a new conceptual framework for construction is developed. Findings – Significant gaps in the understanding of construction technology adoption are identified that provide an interesting agenda for future research. A Construction Technology Adoption Framework is presented, which draws together all of sub-processes involved in technology adoption. This framework covers key activities of both the vendor and the customer. Research limitations/implications – The study has been restricted to information technologies and construction equipment technology. Other construction technologies, such as formwork systems, have not been examined. Practical implications – The new framework provides a direction for research into the technology adoption process including key sub-processes and potential research areas. The framework also assists vendors to influence customers’ decision-making processes, and guides new customers in setting up their own decision procedures. Originality/value – This paper departs from earlier research by focusing on information and equipment technology adoption rather than innovation adoption in general. In addition, this paper considers both sides of the adoption equation (vendor and customer), which is in contrast to previous binary studies which considered one side or the other. It delineates the boundaries of different concepts such as diffusion, adoption, acceptance and implementation, which have been interchangeably used in previous studies. This paper introduces the concept of dissemination to construction, which has previously been investigated in other industries.


2013 ◽  
Vol 3 (4) ◽  
pp. 1-27 ◽  
Author(s):  
Antonius Raghubansie ◽  
Hatem El-Gohary ◽  
Chandrani Samaradivakara

This paper aims to locate the key schools of thought in viral marketing (VM) literature, recognise the various sub-sets within viral marketing overall area of research and to identify the different gaps in viral marketing research literature offering a summation of the existing work done so far. The paper tries to build on the existing body of literature in the field of viral marketing, its related electronic word of mouth (eWOM) context and to present a taxonomic classification for future research. The review uses the paradigm funnel to examine the development of VM, key research contributions and categorises the published literature according to their objectives, analytical approaches and their contributions to theory. The literature addresses many subjects of study (e.g. E-Marketing, E-Word of Mouth, Social Media, Peer-to-Peer Communications, Viral Marketing, Buzz Marketing, Stealth Marketing, Viral Advertising, Viral Videos and other aligned research areas). The findings illustrated that there are various gaps in the literature that require further investigation. Based on the findings, it is evident that the existing frameworks arising from the literature should be enhanced by the adoption of qualitative approaches that explore how general observations respond to contingent factors.


Author(s):  
I-Horng Jeng

Mobile commerce is one of emerging inter-discipline technology which integrates the network protocol, multimodal sensation, storage management, and other research areas. It intends to make paperless applications for both convenience and ecology on the mobile devices -- including those used for ticketing, coupons, loyalty rewards, payments, etc. By the innate limitations of the physical properties, mobile device -- particularly the handheld mobile device -- must make their best tradeoffs among the available hardware resources to reach their dedicated specifications. However, one of the recent progresses in the new technologies of the Internet, cloud computing, is capable of appearing ubiquitously with mobile devices and intends to outstretch its various applications by the devices. The next generation of mobile devices will use wireless broadband access and human-computer interaction technologies which support cloud services and interface designs respectively advances to allow remote plug-and-play with web 2.0 applications that is suitable for mobile commerce in which this chapter emphasizes. Besides, for sustainable development of a mobile commerce solution, workable but not securable is absolutely not enough. Therefore, a secure information retrieval and reveal protocol for mobile commerce based on modified RSA digital signature is also proposed and demonstrated.


1996 ◽  
Vol 21 (4) ◽  
pp. 155-173 ◽  
Author(s):  
David W. Test ◽  
Wendy M. Wood

The concept of natural supports was formally introduced to the field of supported employment in 1988. Since then, natural supports have been incorporated into supported employment policy as an extended service in the 1992 Rehabilitation Act Amendments. At the same time, numerous definitions of natural supports, as well as, strategies based on the concept of natural supports have been suggested. Considering the potential impact of natural supports on both supported employment policy and practice, we conducted a review of the research literature to document the contributions of strategies based on the concept of natural supports to supported employment. Although findings indicated a number of promising strategies, research is still needed. Results are discussed in terms of separating the concept of natural supports from strategies based on the concept of natural supports, future research areas, and the potential problems of having natural supports as policy without empirical support for practice.


Sign in / Sign up

Export Citation Format

Share Document