scholarly journals Scoot over Smart Devices: The Invisible Costs of Rental Scooters

2019 ◽  
Vol 17 (1/2) ◽  
pp. 191-197 ◽  
Author(s):  
Andrew Boyles Petersen

In the past year, transportation rental companies, including Bird, Lime, and Spin, have dropped hundreds of thousands of rental scooters across North America. Relying on mobile apps and scooter-mounted GPS units, these devices have access to a wide-variety of consumer data, including location, phone number, phone metadata, and more. Pairing corroborated phone and scooter GPS data with a last-mile transportation business model, scooter companies are able to collect a unique, highly identifying dataset on users. Data collected by these companies can be utilized by internal researchers or sold to advertisers and data brokers. Access to so much consumer data, however, poses serious security risks. ­Although Bird, Lime, and Spin posit electric scooters as environmentally friendly and accessible transportation, they also allow for unethical uses of user data through vaguely-worded terms of service. To promote more equitable transportation practices, this article will explore the implications of dockless scooter geotracking, as well as related infrastructure, privacy, and data security ramifications.

Author(s):  
Lili Nemec Zlatolas ◽  
Tatjana Welzer-Druzovec ◽  
Marjan Heričko ◽  
Marko Hölbl

The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.


Author(s):  
Latifa Er-Rajy ◽  
M. Ahmed El Kiram

In the past, banking took place only inside bank rooms, which was a task for customers and bankers at the same time. But in our day, thanks to the high-speed development and growth of mobile technology, the mobile phone platform had the power to create great opportunities for customers of the physical bank due to its capabilities and coverage of the population; this can be proved by the number of mobile subscriptions that approximates the world population figures. In order to explore these opportunities, most banks have already launched their mobile apps or have redesigned the mobile version of their websites. Among the advantages of using mobile banking is that users have the ability to make banking transactions, online payments or transfers, anywhere and at any time. In this article, we investigated the danger of the permissions requested by mobile banking applications, their effects on sensitive user data and their relationship with the attack called “Man in the middle” and its different forms. We took Morocco as a case of study.


Author(s):  
Lili Nemec Zlatolas ◽  
Tatjana Welzer ◽  
Marjan Heričko ◽  
Marko Hölbl

The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Religions ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 372
Author(s):  
Edward Rommen

A new dark age has come upon us; as a result, Christianity and its churches in North America are no longer growing. One reason for this might be the widespread impression that Christians are hypocrites, saying they believe one thing while doing the opposite. However, that accusation would only be true if these believers actually believed the principles they are supposed to be violating. It is more likely that many Christians have, like those around them, abandoned truth in favor of personal opinion bringing moral discourse to a near standstill and intensifying the darkness by extinguishing the light of truth. Still, there is hope. In the past, it often was a faithful few, a remnant, who preserved the knowledge of that light and facilitated a new dawn. History shows us that the very movements that are today abdicating responsibility were once spiritual survivors themselves. They withdrew, coalesced around the remaining spark of truth in order to remember, preserve, and reignite. The thoughts and practices of these pioneers could guide the escape from today’s darkness.


2021 ◽  
Vol 11 (11) ◽  
pp. 5039
Author(s):  
Yosoon Choi ◽  
Yeanjae Kim

A smart helmet is a wearable device that has attracted attention in various fields, especially in applied sciences, where extensive studies have been conducted in the past decade. In this study, the current status and trends of smart helmet research were systematically reviewed. Five research questions were set to investigate the research status of smart helmets according to the year and application field, as well as the trend of smart helmet development in terms of types of sensors, microcontrollers, and wireless communication technology. A total of 103 academic research articles published in the past 11 years (2009–2020) were analyzed to address the research questions. The results showed that the number of smart helmet applications reported in literature has been increasing rapidly since 2018. The applications have focused mostly on ensuring the safety of motorcyclists. A single-board-based modular concept unit, such as the Arduino board, and sensor for monitoring human health have been used the most for developing smart helmets. Approximately 85% of smart helmets have been developed to date using wireless communication technology to transmit data obtained from smart helmets to other smart devices or cloud servers.


Volume 3 ◽  
2004 ◽  
Author(s):  
Hua Dong ◽  
P. John Clarkson ◽  
Simeon Keates

In the past twenty years, a number of resources and tools to support inclusive design have been developed. However, the impact of these resources and tools on industry is not evident — few industrialists have been using them in practice. Investigations into industry have identified unmet needs, for example, the lack of appropriate user data relating to inclusive design. The fundamental problem is that few resources and tools have been developed based on rigorous requirements capture. In fact, many of them were developed only because the developers think the information could be useful. It is essential to prepare a detailed requirements list when clarifying the task at the product planning stage. This is also true for developing resources and tools for inclusive design. Requirements capture plays an important role in identifying real needs from users and developing appropriate methods of support for them. This paper starts with a survey of available resources and tools for inclusive design, and a discussion on their merits and deficiencies in respect to industry application. A number of methods are employed for the requirements capture for an inclusive design toolkit, which leads to a consistent result. An outline of the toolkit is also presented.


Sign in / Sign up

Export Citation Format

Share Document