Development and Mitigation of Android Malware

Author(s):  
Vanessa N. Cooper ◽  
Hossain Shahriar ◽  
Hisham M. Haddad

As mobile applications are being developed at a faster pace, the security aspect of user information is being neglected. A compromised smartphone can inflict severe damage to both users and the cellular service provider. Malware on a smartphone can make the phone partially or fully unusable, cause unwanted billing, steal private information, or infect every name in a user's phonebook. A solid understanding of the characteristics of malware is the beginning step to prevent much of the unwanted consequences. This chapter is intended to provide an overview of security threats posed by Android malware. In particular, the authors focus on the characteristics commonly found in malware applications and understand the code level features that allow us to detect the malicious signatures. The authors also discuss some common defense techniques to mitigate the impact of malware applications.

2017 ◽  
Vol 9 (1) ◽  
Author(s):  
Debby Arisandi

<p>Purpose- In the GSM seluler telephony sector, the main condition for protecting the subscriber base is to win customer to be loyalty, a key necessity for the maintenance of a brand loyalty in the long term. To achieve this aim, service quality must be measured and identified. This paper’s aim is to measure the effects of service quality towards brand loyalty on DTAC seluler service provider. This study will explore the relationship between service quality and brand loyalty in the seluler service industry.</p><p>Design/methodology/approach- The main research target sample covered 200 seluler phone users in Prince of Songka University, Hatyai campus. Field research was conducted. The questionnaire was formed by a synthesis of existing constructs in relevant literature. Reliability tests, descriptive statistic, and regressions analyses were performed to both confirm scale reliability and answer the research questions. The data were analysed by moderated regression analysis to test the hypotheses.</p><p>Findings- The findings of this study show that an overall service quality directly affects brand loyalty. Network quality, customer service, pricing structure and billing system are the service quality dimensions that have significant positive influence on brand loyalty, which in turn has a significant positive impact on brand loyalty 43,5%. Therefore, it plays a crucial role in winning customer loyalty.</p><p>Originality/value- It is of great importance for seluler operators in a mature market such as that of Thailand, to understand what the drivers of brand loyalty are. The present study produced useful findings, which can be utilized by seluler service provider managers, in their effort to develop and implement successful brand loyalty strategies. With respect to the findings, pricing structure has the most importance than others dimensions of service quality which provides positive outcomes on brand loyalty, not only in the present but also in the future. So, the effect of pricing structure on brand loyalty becomes greater than the effect of others dimenstions of service quality. Therefore, any GSM operator who wishes to preserve its existing subscriber base should concentrate on winning its subscribers’ loyalty, especially for DTAC.</p>Keywords- Seluler Services, Brand Loyalty, Service Quality


2020 ◽  
Author(s):  
Mayli Lañas-Navarro ◽  
Jose Ipanaque-Calderon Sr ◽  
Fiorela E Solano

BACKGROUND Research on the use of the Internet in the medical field is experiencing many advances, including mobile applications, social networks, telemedicine. Its implementation in medical care and comprehensive patient management is a much discussed topic at present. OBJECTIVE This narrative review aims to understand the impact of the internet and social networks on the management of diabetes, both for patients and medical staff. METHODS The bibliographic search was carried out in the databases Pubmed, Virtual Health Library (VHL) and Lilacs between 2018 to 2020. RESULTS Multiple mobile applications have been created for the help and control of diabetic patients, as well as the implementation of online courses, improving the knowledge of health personnel applying them in the field of telemedicine. CONCLUSIONS The use of the Internet and social networks brings many benefits for both the diabetic patient and the health personnel, offering advantages for both.


Games ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 44
Author(s):  
Luis Santos-Pinto ◽  
Tiago Pires

We analyze the impact of overconfidence on the timing of entry in markets, profits, and welfare using an extension of the quantity commitment game. Players have private information about costs, one player is overconfident, and the other one rational. We find that for slight levels of overconfidence and intermediate cost asymmetries, there is a unique cost-dependent equilibrium where the overconfident player has a higher ex-ante probability of being the Stackelberg leader. Overconfidence lowers the profit of the rational player but can increase that of the overconfident player. Consumer rents increase with overconfidence while producer rents decrease which leads to an ambiguous welfare effect.


2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


Author(s):  
Pierluigi Murro ◽  
Valentina Peruzzi

AbstractUsing a unique sample of Italian manufacturing firms, we investigate the impact of relationship lending on firms’ use of trade credit. We find that firms maintaining close and long-lasting relationships with their main banks are associated with higher amounts of trade credit extended by suppliers. This result is robust to alternative measures of trade credit and relationship lending, and to different estimation techniques. We also analyze the mechanisms driving the association between relationship lending and the use of trade credit. Regression results suggest that the positive link between accounts payable and relationship lending is especially significant for firms that use to provide soft information to their lenders and for companies with greater relational abilities.Plain English Summary The existence of close and long lasting lending relationships positively affects the amount of trade credit manufacturing firms receive from their suppliers. By relying on the Survey on Italian Manufacturing Firms, we show that the positive link between relationship lending and the use of trade credit is driven by two channels: private information and relational capital. In a policy perspective, our findings reveal a need for banking regulation and supervision to encompass banking business models in evaluating banks. The current approach might not be suitable for local banks investing in soft information acquisition and could weaken SMEs’ chances to receive both bank financing and trade credit from suppliers. Moreover, from a managerial point of view, our results uncover the relevance of firms’ ability to create strong relationships with banks, suppliers, and other companies that may help alleviating financial constraints.


Author(s):  
Van Huynh Ha Le ◽  
Huy Ngoc Nguyen

Foreign language anxiety (FLA) has a debilitating influence on the oral performance of EFL speakers. Over the past decade, most research in MALL has emphasized the use of mobile applications on improving language skills, but little research has explored the impact of using video recording tool to decrease foreign language speaking anxiety (FLSA). Hence, this study examines the effect of using video recording tool on students' EFL speaking anxiety. Twenty-eight pre-intermediate freshmen at Van Lang University, Vietnam, participated in a seven-week project. In this research, mixed method was used in combination with three data collection instruments: questionnaire, observation notes, semi-structured interview. The results indicated that video recording tool significantly lowers EFL speaking anxiety. Therefore, this study makes a major contribution to research on FLA by exploring freshmen's anxiety causes and its impacts on learners' oral performance and offering a technique to help them overcome that phobia: mobile phone video recording.


2018 ◽  
Vol 52 (1) ◽  
pp. 16-26 ◽  
Author(s):  
Frances V.C. Ryan ◽  
Peter Cruickshank ◽  
Hazel Hall ◽  
Alistair Lawson

Results are reported from a study that investigated patterns of information behaviour and use as related to personal reputation building and management in online environments. An everyday life information seeking (ELIS) perspective was adopted. Data were collected by diary and interview from 45 social media users who hold professional and managerial work roles, and who are users of Twitter, Facebook and/or LinkedIn. These data were first transcribed, then coded with NVivo10 according to themes identified from a preliminary literature review, with further codes added as they emerged from the content of the participant diaries and interviews. The main findings reveal that the portrayal of different personas online contributes to the presentation (but not the creation) of identity, that information-sharing practices for reputation building and management vary according to social media platform, and that the management of online connections and censorship are important to the protection of reputation. The maintenance of professional reputation is more important than private reputation to these users. They are aware of the ‘blur’ between professional and private lives in online contexts, and the influence that it bears on efforts to manage an environment where LinkedIn is most the useful of the three sites considered, and Facebook the most risky. With its novel focus on the ‘whole self’, this work extends understandings of the impact of information on the building and management of reputation from an information science perspective.


2006 ◽  
Vol 6 (1) ◽  
Author(s):  
James E Gunderson

In the rational expectations equilibrium of this paper, agents have private information and differing information partitions and therefore assign differing conditional distributions to asset payoffs and other economic variables relevant to their investment choices. Standard asset pricing models typically do not recognize the impact of these differing information partitions, and empirical tests based on these models thus measure asset riskiness in a way that may not be relevant to any of the agents' decisions. I show how this can lead to distorted estimates of investment risk and how it can make the equity premium appear difficult to explain.


Author(s):  
Nalla Bala Kalyan ◽  
Toopalli Sirisha

The analysis of financial statements is an important aid to financial analysis. They provide information on how the firm has performed in the past and what is its current financial position. Financial analysis is the process of identifying the financial strengths and weakness of the firm from the available accounting data and financial statements. The analysis is done by establishing relationship between the different items of financial statements. The target of this paper is to examine the major features of GST. GST also known as the Goods and Services Tax is defined as the giant indirect tax structure premeditated to maintain and enhances the economic enlargement of a country. Service tax was a tax levied by Central Government of India on services provided or agreed to be provided excluding services covered under negative list and considering the Place of Provision of Services Rules, 2012 and collected as per Point of Taxation Rules, 2011 from the person liable to pay service tax. Person liable to pay service tax is governed by Service Tax Rules, 1994 he may be service provider or service receiver or any other person made so liable. It is an indirect tax wherein the service provider collects the tax on services from service receiver and pays the same to government of India. This paper has also focused on the impact of GST (Goods and Services Tax) will be on Indian Tax Scenario.


Sign in / Sign up

Export Citation Format

Share Document