Provision of Governmental Services through Mobile Phones and Tablets and Threats to Users' Security and Privacy

Author(s):  
Reza Mojtahed ◽  
José Miguel Baptista Nunes ◽  
Guo Chao Alex Peng

2014 ◽  
Vol 8 (3) ◽  
pp. 1-12 ◽  
Author(s):  
Mohanad Halaweh

Security perception has been investigated by much research within the e-commerce and e-banking context. However, very little research has investigated this issue within the general mobile context without limiting this to particular applications such as payment, marketing, banking and commerce. Therefore, this paper aims to explore the users' perception of security towards mobile phones from a wide perspective. An interpretive-qualitative research was adopted to investigate the users' perceptions. The research results provided evidence for extending the meaning of the security perception concept to include human security as a relevant issue to mobile phone usage. It also showed that mobile phones can be used as an instrument to commit fraud and crimes. Furthermore, the results showed that the development of mobile technology raises new security and privacy concerns. For practical implications, this research provides recommendations for mobile technology designers to improve mobile usability- related issues in order to improve users' feeling of security


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 458
Author(s):  
Uttam Sharma ◽  
Pradeep Tomar ◽  
Syed Sadaf Ali ◽  
Neetesh Saxena ◽  
Robin Singh Bhadoria

Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.


2013 ◽  
Vol 433-435 ◽  
pp. 1507-1510 ◽  
Author(s):  
Ji Zhang

Mobile phones become popular, and Android is the most popular open source mobile platform. To protect the mobile users security and privacy, it is necessary for us to adopt certain secure screen lock mechanism. Regrettably, existing screen lock mechanism failed to provide more stronger security. In this paper, we present a method to strength the screen locks security. Our evaluation shows that our screen lock is stronger than the existing mechanism.


2012 ◽  
Vol 4 (3) ◽  
pp. 23-41 ◽  
Author(s):  
Antero Juntunen ◽  
Virpi Kristiina Tuunainen ◽  
Sakari Luukkainen

New mobile ticketing services include travel card functionality in mobile phones, providing users with numerous benefits. However, several open issues still pose limitations for these services, including the diffusion of the enabling technology called Near Field Communication (NFC), concerns about security and privacy, as well as uncertainties in the related value networks and business models. In this study, the authors analyze the NFC mobile ticketing business model holistically from a techno-economic viewpoint and identify the critical business model issues that affect the commercial deployment of such services. Using single case methodology, the authors evaluate the NFC mobile ticketing business model with the help of the Service, Technology, Organization, Finance (STOF) model. Their results offer insights both to the researchers and to the practitioners by providing an analysis with theoretical grounding on the possibilities as well as difficulties in the deployment of NFC technology for mobile services.


Pathology ◽  
2001 ◽  
Vol 33 (3) ◽  
pp. 269-270
Author(s):  
Clive G. Harper ◽  
Victor K. Lee
Keyword(s):  

2014 ◽  
Vol 35 (3) ◽  
pp. 158-165 ◽  
Author(s):  
Christian Montag ◽  
Konrad Błaszkiewicz ◽  
Bernd Lachmann ◽  
Ionut Andone ◽  
Rayna Sariyska ◽  
...  

In the present study we link self-report-data on personality to behavior recorded on the mobile phone. This new approach from Psychoinformatics collects data from humans in everyday life. It demonstrates the fruitful collaboration between psychology and computer science, combining Big Data with psychological variables. Given the large number of variables, which can be tracked on a smartphone, the present study focuses on the traditional features of mobile phones – namely incoming and outgoing calls and SMS. We observed N = 49 participants with respect to the telephone/SMS usage via our custom developed mobile phone app for 5 weeks. Extraversion was positively associated with nearly all related telephone call variables. In particular, Extraverts directly reach out to their social network via voice calls.


2011 ◽  
Author(s):  
Christopher S. Walsh ◽  
Tom Power
Keyword(s):  

2006 ◽  
Author(s):  
Alessandra Preziosa ◽  
Marta Bassi ◽  
Daniela Villani ◽  
Andrea Gaggioli ◽  
Giuseppe Riva

Sign in / Sign up

Export Citation Format

Share Document