Emerging Issues in Mobile Data Capture Methods across Multiple Domains

Author(s):  
Jo Cranwell ◽  
Xu Sun ◽  
David Golightly ◽  
Genovefa Kefalidou ◽  
Benjamin Bedwell ◽  
...  

Mobile device-based data capture studies have potential as contextual data collection methods to address the limitations of the traditional paper-based diary method. The ever-evolving computing power of mobile phones broadens the potential applications of such methods in novel and interesting ways. While there have been a number of studies that demonstrate the power of the mobile device-based diary approach, there is less known about participants' experience of such studies. This chapter presents five case studies to bring together user experiences of participating in mobile data capture studies and evaluates how this can be fed into the future study design.

2013 ◽  
Vol 5 (2) ◽  
pp. 62-83 ◽  
Author(s):  
Xu Sun ◽  
David Golightly ◽  
Jo Cranwell ◽  
Benjamin Bedwell ◽  
Sarah Sharples

Mobile device-based diary studies have potential as contextual data capture methods that address the limitations of the traditional paper-based diary method. While there have been a number of studies that demonstrate the power of the mobile device-based diary approach, there is less known about participants’ experience of such studies. This paper presents three cases of mobile data capture to bring together user experiences of participating in diary studies and discuss how this can be fed into the design of methodology.


2021 ◽  
Vol 10 (2) ◽  
pp. 73
Author(s):  
Raquel Pérez-Arnal ◽  
David Conesa ◽  
Sergio Alvarez-Napagao ◽  
Toyotaro Suzumura ◽  
Martí Català ◽  
...  

The COVID-19 pandemic is changing the world in unprecedented and unpredictable ways. Human mobility, being the greatest facilitator for the spread of the virus, is at the epicenter of this change. In order to study mobility under COVID-19, to evaluate the efficiency of mobility restriction policies, and to facilitate a better response to future crisis, we need to understand all possible mobility data sources at our disposal. Our work studies private mobility sources, gathered from mobile-phones and released by large technological companies. These data are of special interest because, unlike most public sources, it is focused on individuals rather than on transportation means. Furthermore, the sample of society they cover is large and representative. On the other hand, these data are not directly accessible for anonymity reasons. Thus, properly interpreting its patterns demands caution. Aware of that, we explore the behavior and inter-relations of private sources of mobility data in the context of Spain. This country represents a good experimental setting due to both its large and fast pandemic peak and its implementation of a sustained, generalized lockdown. Our work illustrates how a direct and naive comparison between sources can be misleading, as certain days (e.g., Sundays) exhibit a directly adverse behavior. After understanding their particularities, we find them to be partially correlated and, what is more important, complementary under a proper interpretation. Finally, we confirm that mobile-data can be used to evaluate the efficiency of implemented policies, detect changes in mobility trends, and provide insights into what new normality means in Spain.


Author(s):  
Kaisa Malinen ◽  
Anna Rönkä ◽  
Eija Sevón

This chapter introduces a mobile diary data collection tool and discusses its use in the field of family research. Although the mobile diary method is a newcomer in the field of family research, its history is rooted in the larger context of the development of methods for investigating daily life. Mobile phones offer several advantages for studying daily family dynamics: user friendliness, cost-effectiveness, the ability to capture daily emotions, interactions and significant moments, and data reliability and validity. Mobile diaries utilize various mobile phone services, including SMSs and applications, and they are increasingly used also with children. The benefits of mobile diaries in family interventions include their ability to elicit reflection and help clients to keep the aim of the intervention in mind. The future possibilities of mobile diaries in family research and interventions are discussed later in this chapter.


Author(s):  
Kyong James Cho ◽  
Heidi A. Campbell

Mobile phones have had a profound impact on many aspects of contemporary life, including the practice of religion. This chapter outlines the significance of the intersection of religion and mobile phone technology. The study of religion and mobile phones is closely connected to the broader field of “digital religion,” which for nearly two decades has explored how religious individuals and communities use and respond to digital media. Scholars of digital religion have argued that religious communities and culture are increasingly being influence and shaped by digital media in notable ways, especially in relation to issues of identity, community, and authority (Campbell, 2012). These issues are also important in understanding how religious groups engage with and are influenced by mobile technologies and digital culture. The chapter begins by defining the study of mobile media and outlines the history of digital religion as a field of study. Next, it highlights three key areas of research focus in relation to religion and mobile media: the use of mobile media by religious individuals and communities, how religion has been expressed through mobile applications, and reflection on broader cultural significance of the intersection of religion and mobile phones. This leads to a discussion of emerging issues within the study of religion and mobile phones.


NFC enabled mobile phones are equipped with SE combined with NFC infrastructure like readers and POS terminals. The actors in the NFC infrastructure are the pre requisites but not sufficient for the use of NFC payments. There has to be a secure way to download, install, personalize, upgrade and delete an application in SE without the need to go to the service provider or mobile operator stores. TSM solution provide means of managing the NFC service life cycle OTA by using built upon and emphasizes the role an importance in NFC ecosystem. Mobile device needs to have a trusted Execution environment a place where sensitive data can be stored in secure fashion. It is a piece of hardware called as SE.


Author(s):  
Thangavel M. ◽  
Divyaprabha M. ◽  
Abinaya C.

Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. Each day, a mobile device attack is changing dynamically, and it is very difficult to represent a complete set of threats and vulnerabilities. Mobile phone security has become an important aspect of security issues in wireless multimedia communications. The development of mobile applications has increased drastically; hence, it is our responsibility to protect our devices and the data within them. Being aware is the first step to protect data. Thus, to prevent the mobile from the threats, efforts are required to form the application developer, app market administrator, and user to defend against the malware. This article explores those threats and vulnerabilities of mobile applications.


Author(s):  
Taylor Lensch ◽  
Kristen Clements-Nolle ◽  
Roy F Oman ◽  
Minggen Lu

Abstract Background The objective of this study was to determine the separate and cumulative influence of individual, family and community assets on juvenile arrest rates in a cohort of youth. Methods Five waves of data were collected from 1111 youth and their parents living in randomly sampled census tracts in a Midwestern state. Computer-assisted, in-person data collection methods were used to measure assets within individual (six assets), family (four assets) and community (six assets) domains. Extended Cox models were used to assess the relationship between the number of assets and time to first juvenile arrest, while controlling for known confounders. Results Nine of 16 assets across individual, family and community domains were prospectively associated with a reduction in arrest rates. There was a relationship between the number of assets youth possess within individual, family and community domains and rates of arrest. For example, compared to youth with zero to one community assets, those with three [adjusted hazard ratio (AHR): 0.52; 95% confidence interval (CI): 0.30–0.88], four [AHR: 0.57; 95% CI: 0.34–0.97] or five to six [AHR: 0.45; 95% CI: 0.25–0.82] community assets had lower risk of arrest. Conclusions Public health efforts focused on developing policies and programs to promote asset building across multiple domains of influence are warranted.


2016 ◽  
Vol 34 (Supplement 1) ◽  
pp. e247
Author(s):  
Jing Zhang ◽  
Lei Sun ◽  
Yu Liu ◽  
Hongyi Wang ◽  
Ningling Sun ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document