To see the other types of publications on this topic, follow the link: Smartphone Protection.

Journal articles on the topic 'Smartphone Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Smartphone Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Potocký, Sebastián, and Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity." Science & Military 17, no. 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.

Full text
Abstract:
Nowadays, information obtained from mobile phones is often the subject of evidence in front of a court. ForensicNowadays, information obtained from mobile phones is often the subject of evidence in front of a court. Forensicanalysts often come across smartphones about which they have no prior information. However, they need to extract data fromthem. The main prerequisite to extract the data is to bypass Android lock screen protection. The HID attack is a promisingmethod to break Android lock screen protection. In many cases, this is the only way how to break the smartphone´s nonbiometriclock screen protections on newer Android OS versions. The article contains examples of three non-biometric typesof Android smartphone lock screen protections and their computational complexity. The paper describes hardware and softwarerequirements for implementation of HID attack.
APA, Harvard, Vancouver, ISO, and other styles
2

Muhamad Fadhlan Hasugian and Ratna Januarita. "Perlindungan Hukum Bagi Konsumen yang Dirugikan dalam Penjualan Smartphone Terkait Pemblokiran IMEI Ditinjau dari Undang-Undang No. 8 Tahun 1999 tentang Perlindungan Konsumen." Bandung Conference Series: Law Studies 5, no. 1 (2025): 209–14. https://doi.org/10.29313/bcsls.v5i1.15986.

Full text
Abstract:
Abstract. research examines and describes the legal protection for consumers related to IMEI blocking in smartphone purchases related to smartphone consumers who are blocked by the government based on Permenkominfo No.1 of 2020 concerning IMEI (International Mobile Equipment Identity) Registration and Control which is connected with Law No. 8 of 1999 concerning Consumer Protection. This is done to protect consumers in purchasing smartphones related to blocked IMEI based on the consumer protection law. This research method uses a normative juridical approach with descriptive analysis spesifications. The data used is secondary data which includes primary legal materials, secondary legal materials, tertiary materials collected through literature studies and interviews which are then analyzed qualitatively. The results of this study indicate that the legal consequences in the sale and purchase transaction of smartphones in IMEI blocking violate the principle of freedom of contract, good faith, and the principle of legal certainty. The author also analyzes how consumer protection mechanisms can be carried out. This protection mechanism can be in the form of preventive law against consumers regarding the purchase of blackmarket smartphones based on the provisions of Law Number 8 of 1999 concerning Consumer Protection which provides the rights that consumers should get as stated in Article 4. Repressive legal protection is carried out with legal liability, because business actors have violated statutory provisions. Abstrak. Penelitian ini mengkaji dan mendeskripsikan terkait perlindungan hukum bagi konsumen terkait pemblokiran IMEI dalam pembelian smartphone terkait smartphone konsumen yang diblokir oleh pemerintah berdasarkan Permenkominfo No.1 Tahun 2020 tentang Pendaftaran dan Pengendalian IMEI (Internasional Mobile Equipment Identity) yang dihubungkan dengan UU No. 8 Tahun 1999 tentang Perlindugan Konsumen. Hal tersebut dilakukan untuk melindungi konsumen dalam pembelian smartphone terkait IMEI yang diblokir berdasarkan UU perlindungan konsumen. Metode penelitian ini peneliti menggunakan pendekatan yuridis normatif dengan spesifikasi deskriptif analisis. Data yang digunakan adalah data sekunder yang meliputi bahan hukum primer, bahan hukum sekunder, bahan hukum tersier yang dikumpulkan melalui studi pustaka dan wawancara yang kemudian di analisis yuridis secara kualitatif. Hasil penelitian ini menunjukkan bahwa akibat hukum dalam transaksi jual beli smartphone dalam pemblokiran IMEI ini melanggar asas kebebasan berkontrak, itikad baik, dan asas kepastian hukum. Penulis juga menganalisis bagaimana mekanisme perlindungan konsumen dapat dilakukan. Mekanisme perlindungan ini dapat berupa hukum preventif terhadap konsumen berkaitan pembelian smartphone black market berdasar pada ketentuan Undang- Undang Nomor 8 Tahun 1999 tentang Perlindungan Konsumen yang memberikan hak-hak yang seharusnya konsumen dapatkan seperti tercantum dalam Pasal 4. Perlindungan hukum represif dilakukan dengan pertanggungjawaban hukum, karena pelaku usaha telah melanggar ketentuan perundang-undangan.
APA, Harvard, Vancouver, ISO, and other styles
3

Kameda-Smith, MM, C. Iorio-Morin, SU Ahmed, et al. "P.105 Smartphone and mobile app use among Canadian Neurosurgery residents and fellows." Canadian Journal of Neurological Sciences / Journal Canadien des Sciences Neurologiques 44, S2 (2017): S40. http://dx.doi.org/10.1017/cjn.2017.189.

Full text
Abstract:
Background: Communicating with senior neurosurgical colleagues during residency necessitates a reliable and versatile smartphone. Smartphones and their apps are commonplace. They enhance communication with colleagues, provide the ability to access patient information and results, and allow access to medical reference applications. Patient data safety and compliance with the Personal Health Information Protection Act (PHIPA, 2004) in Canada remain a public concern that can significantly impact the way in which mobile smartphones are utilized by resident physicians Methods: Through the Canadian Neurosurgery Research Collaborative (CNRC), an online survey characterizing smartphone ownership and utilization of apps among Canadian neurosurgery residents and fellows was completed in April 2016. Results: Our study had a 47% response rate (80 surveys completed out of 171 eligible residents and fellows). Smartphone ownership was almost universal with a high rate of app utilization for learning and facilitating the care of patients. Utilization of smartphones to communicate and transfer urgent imaging with senior colleagues was common. Conclusions: Smartphone and app utilization is an essential part of neurosurgery resident workflow. In this study we characterize the smartphone and app usage within a specialized cohort of residents and suggest potential solutions to facilitate greater PHIPA adherence
APA, Harvard, Vancouver, ISO, and other styles
4

Citrawathi, Desak Made, I. A. I. Udiantari, and S. W. Warpala. "FITUR EYE PROTECTION PADA LAYAR SMARTPHONE DAPAT MENGURANGI KELELAHAN MATA DAN MEMPERPANJANG DURASI PENGGUNAANNYA PADA SISWA SMP NEGERI 1 SERIRIT." JST (Jurnal Sains dan Teknologi) 8, no. 1 (2019): 94–103. http://dx.doi.org/10.23887/jstundiksha.v8i1.19225.

Full text
Abstract:
Penelitian ini bertujuan untuk mengetahui: (1) fitur eye protection pada layar smartphone dapat mengurangi kelelahan mata; dan (2) fitur eye protection pada layar smartphone dapat meningkatkan durasi penggunaan smartphone. Jenis Penelitian ini adalah penelitian eksperimental semu(quasi experimental) dengan rancangan randomize pre and post test design. Lokasi penelitian di SMP Negeri 1 Seririt Kecamatan Seririt, Kabupaten Buleleng-Bali. Pengambilan sampel dilakukan secara acak dan diambil sebanyak 26siswa. Analisis data dilakukan dengan menggunakan uji t paired dengan taraf signifikansi 5 %. Hasil penelitian ini menunjukkan bahwa ada perbedaan bermakna pada kelelahan mata sebesar 67,81 % (p < 0,05) dan durasi penggunaan smartphone sebesar 56,30 % (p < 0,05) antara layar smartphone yang tidak menggunakan fitur eye protection dan yang menggunakan fitur eye protection. Disimpulkan bahwa penggunaan fitur eye protectionpada layar smartphone dapat menurunkan kelelahan mata dan meningkatkan durasi penggunaan. Disarankan agar para pengguna perangkat digital selalu memperhatikan kesehatan dan keselamatan kerja, salah satunya dengan cara mengaktifkan fitur eye protection pada layar smartphone untuk menghindari terjadinya kelelahan mata dan juga dapat memperpanjang durasi penggunaannya.
APA, Harvard, Vancouver, ISO, and other styles
5

Citrawathi, Desak Made, I. A. I. Udiantari, and S. W. Warpala. "FITUR EYE PROTECTION PADA LAYAR SMARTPHONE DAPAT MENGURANGI KELELAHAN MATA DAN MEMPERPANJANG DURASI PENGGUNAANNYA PADA SISWA SMP NEGERI 1 SERIRIT." JST (Jurnal Sains dan Teknologi) 8, no. 1 (2019): 94. http://dx.doi.org/10.23887/jst-undiksha.v8i1.19225.

Full text
Abstract:
Penelitian ini bertujuan untuk mengetahui: (1) fitur eye protection pada layar smartphone dapat mengurangi kelelahan mata; dan (2) fitur eye protection pada layar smartphone dapat meningkatkan durasi penggunaan smartphone. Jenis Penelitian ini adalah penelitian eksperimental semu(quasi experimental) dengan rancangan randomize pre and post test design. Lokasi penelitian di SMP Negeri 1 Seririt Kecamatan Seririt, Kabupaten Buleleng-Bali. Pengambilan sampel dilakukan secara acak dan diambil sebanyak 26siswa. Analisis data dilakukan dengan menggunakan uji t paired dengan taraf signifikansi 5 %. Hasil penelitian ini menunjukkan bahwa ada perbedaan bermakna pada kelelahan mata sebesar 67,81 % (p < 0,05) dan durasi penggunaan smartphone sebesar 56,30 % (p < 0,05) antara layar smartphone yang tidak menggunakan fitur eye protection dan yang menggunakan fitur eye protection. Disimpulkan bahwa penggunaan fitur eye protectionpada layar smartphone dapat menurunkan kelelahan mata dan meningkatkan durasi penggunaan. Disarankan agar para pengguna perangkat digital selalu memperhatikan kesehatan dan keselamatan kerja, salah satunya dengan cara mengaktifkan fitur eye protection pada layar smartphone untuk menghindari terjadinya kelelahan mata dan juga dapat memperpanjang durasi penggunaannya.
APA, Harvard, Vancouver, ISO, and other styles
6

Nasution, Fitri Khairani, and Nurussakinah Daulay. "The Influence of Academic Resilience And Student Well-Being on Smartphone Addiction." Jurnal Basicedu 6, no. 3 (2022): 4415–22. http://dx.doi.org/10.31004/basicedu.v6i3.2864.

Full text
Abstract:
Various problems experienced by students at school such as the many academic pressures that are difficult to deal with will trigger stress on students and divert stress by playing smartphones excessively, so that it will have a negative impact on their lives. To prevent smartphone addiction, self-protection factors are needed, namely academic resilience and student psychological well-being. The purpose of the study was to determine the effect of academic resilience and student well-being on smartphone addiction at MTs Nurul Islam Indonesia. The subjects of this study amounted to 198 students. The type of research used is a quantitative approach with multiple linear regression analysis techniques. The results of the study showed that there was a significant effect of academic resilience on smartphone addiction of t(-6,448), p = 0.00 (p<0.05), and significantly with a value of 0.000 <0.05 and a large influence of 21.5% on smartphones. addictions. However, there was no significant effect of student well-being on smartphone addiction t(1.208), p = 0.0229 (p>0.05).
APA, Harvard, Vancouver, ISO, and other styles
7

Kraushaar, Judith, and Sabine Bohnet-Joschko. "Smartphone Use and Security Challenges in Hospitals: A Survey among Resident Physicians in Germany." International Journal of Environmental Research and Public Health 19, no. 24 (2022): 16546. http://dx.doi.org/10.3390/ijerph192416546.

Full text
Abstract:
Although mobile devices support physicians in a variety of ways in everyday clinical practice, the use of (personal) mobile devices poses potential risks for information security, data protection, and patient safety in hospitals. We used a cross-sectional survey-based study design to assess the current state of smartphone use among resident physicians in hospitals and to investigate the relationships between working conditions, current smartphone usage patterns, and security-related behavior. In total, data from 343 participating physicians could be analyzed. A large majority (98.3%) used their smartphones during clinical practice. Of the respondents who used a smartphone during clinical practice, only 4.5% were provided with a smartphone by their employer. Approximately three-quarters of the respondents who used their smartphones for professional communication never/almost never used dedicated GDPR-compliant messenger services. Using a hierarchical regression model, we found a significant effect of the organizational resources Social Support (Supervisor) and Information Security-related Communication on security-related behavior during the selection of medical apps (App Selection). Smartphones are an important part of digital support for physicians in everyday clinical practice. To minimize the risks of use, technical and organizational measures should be taken by the hospital management, resulting, for example, in a Bring-Your-Own-Device (BYOD) initiative.
APA, Harvard, Vancouver, ISO, and other styles
8

Mušinbegović, Almina, Harun Alijagic, Amer Hrnjic, and Ali Abd Almisreb. "Security considerations for smartphone devices." Defense and Security Studies 5, no. 2 (2024): 108–14. https://doi.org/10.37868/dss.v5.id274.

Full text
Abstract:
In the paper the ways in which smartphone devices are designed to be secure are investigated. Different approaches were examined for Windows, Android and alike, as well as diving into the three security layers or areas of security. The first layer investigated was a “physical” device protection which involves the protection of the device and the data on it in case the device was stolen by not allowing anyone to gain access to the device, locking its content. Second protection of the data examined was not allowing applications on the device access to corporate and personal data. Last layer of the protection investigated was in-app information being leaked and otherwise used. Security objectives and mechanisms were also visited in the paper. Literature review on the subject is provided.
APA, Harvard, Vancouver, ISO, and other styles
9

Pranoto, Hadi, and Eko Budi Setiawan. "Android Smartphone Remote Monitoring Application Using SMS Service." International Journal of New Media Technology 4, no. 2 (2017): 112–19. http://dx.doi.org/10.31937/ijnmt.v4i2.643.

Full text
Abstract:
Android has been updating the system of every version it releases. The addition of Application Programming Interface (API) is done every time Google releases a new Android operating system. The availability of APIs for third-party applications provides opportunities for developers to be able to monitor Android smartphones. Just like Google Device Manager which can instruct Android smartphones over the internet network, however, it still has a deficiency that is if the target smartphone in a state of inactive internet. In this research, the author utilizes SMS media to be able to process instructions and access the system API for monitoring purposes. The results of this research is by using SMS then user can instruct Android smartphone to take photos, get current location, ring, delete smartphone files, set screen protection, and backup contact with higher messaging reliability. This application can run well on Android Lollipop 5.1 (API Level 22) or above because it has enough API to support system functionality.
APA, Harvard, Vancouver, ISO, and other styles
10

Qabalin, Majdi K., Muawya Naser, and Mouhammd Alkasassbeh. "Android Spyware Detection Using Machine Learning: A Novel Dataset." Sensors 22, no. 15 (2022): 5765. http://dx.doi.org/10.3390/s22155765.

Full text
Abstract:
Smartphones are an essential part of all aspects of our lives. Socially, politically, and commercially, there is almost complete reliance on smartphones as a communication tool, a source of information, and for entertainment. Rapid developments in the world of information and cyber security have necessitated close attention to the privacy and protection of smartphone data. Spyware detection systems have recently been developed as a promising and encouraging solution for smartphone users’ privacy protection. The Android operating system is the most widely used worldwide, making it a significant target for many parties interested in targeting smartphone users’ privacy. This paper introduces a novel dataset collected in a realistic environment, obtained through a novel data collection methodology based on a unified activity list. The data are divided into three main classes: the first class represents normal smartphone traffic; the second class represents traffic data for the spyware installation process; finally, the third class represents spyware operation traffic data. The random forest classification algorithm was adopted to validate this dataset and the proposed model. Two methodologies were adopted for data classification: binary-class and multi-class classification. Good results were achieved in terms of accuracy. The overall average accuracy was 79% for the binary-class classification, and 77% for the multi-class classification. In the multi-class approach, the detection accuracy for spyware systems (UMobix, TheWiSPY, MobileSPY, FlexiSPY, and mSPY) was 90%, 83.7%, 69.3%, 69.2%, and 73.4%, respectively; in binary-class classification, the detection accuracy for spyware systems (UMobix, TheWiSPY, MobileSPY, FlexiSPY, and mSPY) was 93.9%, 85.63%, 71%, 72.3%, and 75.96%; respectively.
APA, Harvard, Vancouver, ISO, and other styles
11

Belkhamza, Zakariya, Mohd Adzwin Faris Niasin, and Sidah Idris. "The Effect of Privacy Concerns on the Purchasing Behavior among Malaysian Smartphone Users." International Journal of E-Services and Mobile Applications 8, no. 3 (2016): 38–52. http://dx.doi.org/10.4018/ijesma.2016070103.

Full text
Abstract:
The rise of e-commerce and m-commerce has brought the intention to the privacy concerns among mobile buyers, and studies showed that it is an important factor that affect attitude and intention to buy products or services through smartphones. The objective of this paper is to investigate the issue of privacy concerns on the attitude and purchasing intention among Malaysian smartphone users. This was performed by investigating the relationships between privacy concerns and attitude towards purchase, as well as between the privacy concerns and the intention to purchase using smartphone apps. The paper provides significant insights on the issue of privacy concerns in the usage of smartphones which can help developers such as Google and Apple to improve their apps stores to provide better protection for users' privacy and security in Malaysia.
APA, Harvard, Vancouver, ISO, and other styles
12

Sang, Jun, Daxiang Hong, Bing Zhang, Hong Xiang, and Li Fu. "Protection profile for the smartphone operating system." International Journal of Embedded Systems 6, no. 1 (2014): 28. http://dx.doi.org/10.1504/ijes.2014.060923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Faisal, Mohammad, and Sa’ed Abed. "Cluster-Based Antiphishing (CAP) Model for Smart Phones." Scientific Programming 2021 (July 7, 2021): 1–9. http://dx.doi.org/10.1155/2021/9957323.

Full text
Abstract:
Different types of connectivity are available on smartphones such as WiFi, infrared, Bluetooth, GPRS, GPS, and GSM. The ubiquitous computing features of smartphones make them a vital part of our lives. The boom in smartphone technology has unfortunately attracted hackers and crackers as well. Smartphones have become the ideal hub for malware, gray ware, and spyware writers to exploit smartphone vulnerabilities and insecure communication channels. For every security service introduced, there is simultaneously a counterattack to breach the security and vice versa. Until a new mechanism is discovered, the diverse classifications of technology mean that one security contrivance cannot be a remedy for phishing attacks in all circumstances. Therefore, a novel architecture for antiphishing is mandatory that can compensate web page protection and authentication from falsified web pages on smartphones. In this paper, we developed a cluster-based antiphishing (CAP) model, which is a lightweight scheme specifically for smartphones to save energy in portable devices. The model is significant in identifying, clustering, and preventing phishing attacks on smartphone platforms. Our CAP model detects and prevents illegal access to smartphones based on clustering data to legitimate/normal and illegitimate/abnormal. First, we evaluated our scheme with mathematical and algorithmic methods. Next, we conducted a real test bed to identify and counter phishing attacks on smartphones which provided 90% accuracy in the detection system as true positives and less than 9% of the results as true negative.
APA, Harvard, Vancouver, ISO, and other styles
14

Toda, Masahiro, Satoko Ezoe, Kanae Mure, and Tatsuya Takeshita. "Smartphone Dependence of University Students and Parental Rearing Attitudes." International Journal of Cyber Behavior, Psychology and Learning 8, no. 1 (2018): 25–32. http://dx.doi.org/10.4018/ijcbpl.2018010102.

Full text
Abstract:
We investigated associations between smartphone dependence and perceived parental rearing attitudes. We administered a set of self-reporting questionnaires to 195 medical-university students designed to evaluate these factors. For females, the maternal high care/high protection group had statistically significantly higher scores for smartphone dependence than the low care/low protection group. No such relationship was apparent for male respondents. These findings suggest, at least for females, that smartphone dependence may be associated with perceived rearing attitudes.
APA, Harvard, Vancouver, ISO, and other styles
15

J Kumarasinghe, Pivithuru, Qiubo Huang, and Nilmini Rathnayake. "The Perspectives of University Academics on Their Intention to Purchase Green Smartphones in Sri Lanka." Interdisciplinary Journal of Information, Knowledge, and Management 18 (2023): 369–85. http://dx.doi.org/10.28945/5160.

Full text
Abstract:
Aim/Purpose: Most people use their phones for work and communication. Businesses today require sustainable mobile phones to limit the environmental impact of mobile phones. According to the Environmental Protection Agency (EPA), a green product uses less energy. Green smartphones need low radiation emission, are made from recyclable materials, and are designed to last longer than typical smartphones. Further, the manufacturing process needs to have a low environmental impact. The present study aims to identify the influence of variables (such as Green Awareness, Environmental Concern, Altruism, and Willingness to Pay) on green smartphone purchase intention among academics in the Sri Lankan higher education sector. Background: With the swift technological advances, almost everyone has begun to use smartphones. Simultaneously, smartphone manufacturers have begun to release cutting-edge smartphone models to the general public. As a result, it has generated a significant amount of e-waste for the environment. As a result, therefore, the sustainability of green smartphones has become a major societal concern in the developed world, but this is not yet true in the developing world Methodology: The study used a qualitative research method in which the authors attempted to acquire primary data by conducting in-depth interviews with academics from the Sri Lankan higher education sector using a semi-structured interview guide. Eight interviews were conducted, audio recorded, and word-to-word transcribed for content analysis. Researchers used content analysis to determine the presence, meanings, and linkages of specific words, themes, or concepts. Contribution: The findings provide important environmental insights for smartphone makers and society, such as introducing waste reduction programs and energy-saving practices and creating awareness among people to change their consumption patterns. The study will provide valuable insights into the green smartphone phone purchasing intentions of academics in a developing country, especially helping green smartphone producers and marketers construct effective tactics with the insight of the current study based on university faculty members’ viewpoints. Findings: The current study’s findings revealed that academics acknowledge the need for environmental protection with an awareness of the green concept and environmental concerns. According to the interviews, most participants intended to move from their present smartphone to an ecologically friendly phone, as they explained on altruism. This implies that even academics in underdeveloped countries are worried about environmental issues and have shown a more robust understanding of these issues and how environmentally aware individuals’ activities may assist the earth’s sustainability. Further, academics have a willingness to pay for a green smartphone. Recommendations for Practitioners: Academics prioritize environmental conservation when making purchases. This implies that manufacturers and enterprises should focus on developing and in- novating more environmentally friendly products. Recommendation for Researchers: Using only academics as a sample approach is severely limited if the study’s population comprises people with various qualities. Nevertheless, this study presented only four independent variables, and more factors impacting green smartphone purchasing intention may exist. As a result, it is proposed that future research consider other factors. Impact on Society: It was discovered that most participants displayed altruism in their product purchases, implying that policymakers must strengthen the moral practice of concern for the welfare and happiness of other humans, even in developing countries. Future Research: A further in-depth study focusing on many perspectives such as limits and motivations for purchasing green products in various socioeconomic groups with varying moderating factors such as gender, education, rural-urban, and so on would be advantageous. Individual (emotions, habits, perceived behavioral control, trust, values, personal norm, knowledge) and situational (availability, product attributes, subjective norm, brand, eco-labeling) variables should be included in future research.
APA, Harvard, Vancouver, ISO, and other styles
16

Smith, Katherine A., Leming Zhou, and Valerie J. M. Watzlaf. "User Authentication in Smartphones for Telehealth." International Journal of Telerehabilitation 9, no. 2 (2017): 3–12. http://dx.doi.org/10.5195/ijt.2017.6226.

Full text
Abstract:
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth
APA, Harvard, Vancouver, ISO, and other styles
17

Ben Ayed, Ahmed. "Permission Request Pattern Recognition in Android Malware Applications." International Journal of Strategic Information Technology and Applications 8, no. 1 (2017): 37–49. http://dx.doi.org/10.4018/ijsita.2017010103.

Full text
Abstract:
This article discusses that smartphone systems have known a huge evolution in terms of their capacities and functionalities. Therefore, they are used extensively for professional and personal work. Since smartphones became popular, cybercriminals and Malware developers have shown an extensive interest in the smartphone's system. Therefore, the protection of these devices is very important. Since Malware has to be granted some permissions to achieve its goals, the author believes those permissions could be a useful characteristic in helping detect malicious applications. However, the usefulness of such features is not yet confirmed. This research consists of an examination of three hundred eighty-seven different Android-Based Malware applications in order to determine if there is a permission request pattern. This article presents a complete analysis of permission requests in Android malicious applications using the Self-Organizing Maps.
APA, Harvard, Vancouver, ISO, and other styles
18

Dickson, Glen. "NBD Nanotechnologies Brings Antimicrobial Protection to Smartphone Screens." Information Display 37, no. 1 (2021): 6–8. http://dx.doi.org/10.1002/msid.1175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Churk, J. P. "Friendship and Courtship in The Era of Smartphone: Experience from Youths in Higher Learning Institutions in Dodoma Municipality Tanzania." AFRICAN JOURNAL OF APPLIED RESEARCH 8, no. 2 (2022): 356–70. http://dx.doi.org/10.26437/ajar.31.10.2022.25.

Full text
Abstract:
Purpose: As technological advancement in terms of digital communication is increased, the use of smartphones among individuals as a source of information and community practices also increased. The study examined the role of the smartphone in building friendships and courtships among youth in public academic institutions in Dodoma Municipality.
 Design/ Methodology/ Approach: The study used mixed methods including surveys and interviews to understand the way youths utilise smartphones in building friendships and courtship. Descriptive and content data analysis were used to analyse the data.
 Findings: The findings revealed that smartphone has significantly enabled youth to access valuable information about their intimate friends and courting partners. It also revealed that functions provided by smartphone enabled youth to keep their partners closer by utilising social media networks.
 Research Limitation: The study focused only on youths in Higher Learning Institutions in Dodoma City, Tanzania thus limiting generalisations.
 Practical implications: The study recommends the need for a policy that protects personal information shared through a smartphone for the wellbeing of youths and society’s digital practices.
 Social implications: The personal data protection policy will help to protect the privacy rights of youths and all members of the community in general, against any possible abuse which has gained unprecedented attention, especially in the current information age.
 Originality/ Value: The study will contribute to improving policy decisions to protect the current digital generation against the violation of personal data shared via digital communication.
APA, Harvard, Vancouver, ISO, and other styles
20

Nash, Carol. "A Scoping Review of Children, Empowerment, and Smartphone Technology Regarding Social Construction Theory with the Aim of Increasing Self-Direction in Democracies." Social Sciences 13, no. 4 (2024): 196. http://dx.doi.org/10.3390/socsci13040196.

Full text
Abstract:
Children are Dependents in a version of social construction theory regarding their inability to self-direct their behavior in democratic society. In this regard, childhood represents a lack of self-direction, a life period when people require the guidance and protection of adults. The assumed necessity of adults supervising children in democracies necessitates substantial social resources, reducing the self-direction of those charged with overseeing children. Given that self-direction defines the optimal experience of people within a democratic society, finding ways to increase the self-direction of children is an individual and a social benefit. In this regard, smartphones have improved self-direction in children. How children have become empowered to self-direct their lives with smartphone use considering social construction theory—as Advantaged, Contenders, or Deviants—is the focus of a scoping review conducted on “children, empowerment, smartphones” of the following databases: OVID, JSTOR, ProQuest, PubMed, Scopus, and Web of Science. The result is that children permitted to self-direct their activities aided by smartphone technology have comparable social behavior to adults positioned as Advantaged, Contenders, or Deviants, and as such, they should be encouraged to utilize smartphone technology to improve their self-direction, as doing so will augment individual and caregiver self-direction, providing increased social benefit.
APA, Harvard, Vancouver, ISO, and other styles
21

Belkhamza, Zakariya, and Mohd Adzwin Faris Niasin. "The Effect of Privacy Concerns on Smartphone App Purchase in Malaysia: Extending the Theory of Planned Behavior." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 5 (2017): 178. http://dx.doi.org/10.3991/ijim.v11i5.6961.

Full text
Abstract:
<p class="0abstract">The rise of m-commerce has brought the intention to the privacy concerns among mobile users, and studies showed that it is an important factor that affects attitude and intention to purchase smartphone apps. The objective of this paper is to investigate the issue of privacy concerns on the attitude and purchasing intention among Malaysian smartphone users. This paper employed the Theory of Planned Behavior (TPB) to investigate the role of privacy concerns in influencing the decision making process. The paper provides significant insights on the issue of privacy concerns in the usage of smartphones which can help developers such as Google and Apple to improve their apps stores to provide better protection for users’ privacy and security in Malaysia.</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Azni, A. H., Sakiinah Altaf Hussain, and Najwa Hayaati Mohd Alwi. "Digital Certificate-Based Authentication Model for Enhanced Smartphone Security." Journal of Computing Research and Innovation 10, no. 1 (2025): 64–76. https://doi.org/10.24191/jcrinn.v10i1.496.

Full text
Abstract:
Smartphones are integral to the Internet of Things, facilitating connectivity for various devices such as home systems and healthcare tools. However, the growing threat of identity theft, data breaches, and attacks due to weak authentication and poor password management emphasizes the critical need for mobile device security. Cryptography is pivotal in ensuring that only authorized devices can access data. This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. Aimed at addressing smartphone users' authentication needs, the model operates through three phases: Registration, Digital Certificate, and Authentication, each bolstering data protection through digital certificate-based authentication. To assess the model, expert reviews are conducted to ensure its effectiveness. The results demonstrate significant improvements in security and ease of implementation compared to traditional authentication methods. Expert reviews agree that the model effectively mitigates unauthorized access risks by strengthening encryption and authentication protocols across its three key phases. These enhancements make it particularly suited for addressing the evolving security challenges of mobile applications, setting a benchmark for future authentication frameworks in smartphone ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
23

Rudolphi, Josie, Shelly Campo, Brandi Janssen, Marizen Ramirez, Kai Wang, and Diane Rohlman. "A Test of Social Cognitive Theory to Increase Hearing Protection Use in Swine Buildings." Journal of Agricultural Safety and Health 28, no. 4 (2022): 215–28. http://dx.doi.org/10.13031/jash.15183.

Full text
Abstract:
HighlightsAlmost 50% of participants reported engaging with the smartphone app Habitbull daily. Access to high-quality hearing protection devices may be enough to change behaviors towards hearing protection device use among young adults. Abstract. Farming ranks among the top occupations for which workers are at risk for noise-induced hearing loss (NIHL), an irreversible yet preventable condition. Hearing Protection Devices (HPDs) (i.e., earmuffs and ear plugs) are effective at preventing exposure to noise; however, few farmers report consistent use.The purpose of this study was to test an intervention based on Social Cognitive Theory with interactive smartphone technology to increase the use of HPDs among swine facility workers.A pilot, quasi-experimental study was implemented among 72 younger adult swine workers. Participants were randomly assigned to one of three groups. Group 1 received HPDs (e.g., earmuffs and ear plugs). Group 2 received the same HPDs as Group 1 and was also instructed to use a smartphone application to track their use of hearing protection for 60 days. Group 3 received the HPDs and instructions on using a smartphone app for tracking the use of hearing protection and setting daily goals for hearing protection use. Use of hearing protection was assessed via an online survey prior to the intervention (i.e., “baseline”), immediately after the post-intervention, and at a 3-month follow-up.Compared to baseline use, all three groups reported increased use of hearing protection immediately post-intervention. However, this increase was not maintained at a 3-month follow-up for two of the study groups. Group 3 (HPD, tracking, and goal-setting app) showed the greatest increase in the use of HPDs from baseline to immediate post-intervention; however, Group 1 (HPD only) showed the greatest sustained increase from baseline to the 3-month follow-up. Modifying the environment by supplying HPDs was effective in increasing HPD use among swine facility workers. Improving access to hearing protection devices alone may lead to sustained changes in behavior. Keywords: Agricultural safety and health, Hearing protection, Noise-induced hearing loss, Young adult workers.
APA, Harvard, Vancouver, ISO, and other styles
24

Hughes Driscoll, Colleen A., Michael Cleveland, Samuel Gurmu, Sarah Crimmins, and Dina El-Metwally. "Research: Replacing Overhead Paging with Smartphones to Reduce Hospital Noise." Biomedical Instrumentation & Technology 54, no. 4 (2020): 251–57. http://dx.doi.org/10.2345/0899-8205-54.4.251.

Full text
Abstract:
Abstract Hospital noise is associated with adverse effects on patients and staff. Communication through overhead paging is a major contributor to hospital noise. Replacing overhead paging with smartphones through a clinical mobility platform has the potential to reduce transitory noises in the hospital setting, though this result has not been described. The current study evaluated the impact of replacing overhead paging with a smartphone-based clinical mobility platform on transitory noise levels in a labor and delivery unit. Transitory noises were defined as sound levels greater than 10 dB above baseline, as recorded by a sound level meter. Prior to smartphone implementation, 77% of all sound levels at or above 60 dB were generated by overhead paging. Overhead pages occurred at an average rate of 3.17 per hour. Following smartphone implementation, overhead pages were eliminated and transitory noises decreased by two-thirds (P < 0.001). The highest recorded sound level decreased from 76.54 to 57.34 dB following implementation. The percent of sounds that exceeded the thresholds recommended by the Environmental Protection Agency and International Noise Council decreased from 31.2% to 0.2% following implementation (P < 0.001). Replacement of overhead paging with a clinical mobility platform that utilized smartphones was associated with a significant reduction in transitory noise. Clinical mobility implementation, as part of a noise reduction strategy, may be effective in other inpatient settings.
APA, Harvard, Vancouver, ISO, and other styles
25

Michels, Marius, Vanessa Bonke, and Oliver Musshoff. "Understanding the adoption of smartphone apps in crop protection." Precision Agriculture 21, no. 6 (2020): 1209–26. http://dx.doi.org/10.1007/s11119-020-09715-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hendra, Saputra, Zahra Amalia, Faldi Faldi, et al. "Recommendation mobile antivirus for Android smartphones based on malware detection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 3559–66. https://doi.org/10.11591/ijai.v13.i3.pp3559-3566.

Full text
Abstract:
The proliferation of smartphone malware attacks due to a lack of vigilance in app selection raises serious concerns. Built-in smartphone security features often must be improved to protect devices from these threats. Although numerous articles recommend top-tier antivirus solutions, there need to be more reliable data sources that raise suspicions about undisclosed promotional motives. This research endeavors to establish a ranking of antivirus efficacy to provide optimal recommendations for Android smartphone users. The research methodology entails a meticulous comparison of malware detection and labeling outcomes between various antivirus programs within virustotal and the labeling system employed by the euphony application. The comparative results are categorized into three groups: antivirus solutions proficient in identifying specific malware types, those detecting malware presence without categorization, and antivirus software failing to detect malware effectively. The experimental findings present the five leading antivirus solutions, ranked from the highest to lowest scores, as Ikarus, Fortinet, ESET-NOD32, Avast-Mobile, and SymantecMobileInsight. Based on the comprehensive assessment conducted in this study, these solutions are recommended as the top antivirus choices. These recommendations are poised to significantly aid users in selecting the most suitable antivirus protection for their Android smartphones.
APA, Harvard, Vancouver, ISO, and other styles
27

El Majdoub, Asmae, Chaimae Saadi, and Habiba Chaoui. "Mobile Forensics Data Acquisition." ITM Web of Conferences 46 (2022): 02006. http://dx.doi.org/10.1051/itmconf/20224602006.

Full text
Abstract:
Mobile technology is among the fastest developing technologies that have changed the way we live our lives. And, with the increase of the need to protect our personal information, smartphone companies have developed multiple types of security protection measures on their devices which makes the forensic data acquisition for law enforcement purposes so much harder. As we all know, one of the biggest tasks in mobile forensics investigation is the step of data acquisition, it is the step of extracting all the valuable information that will help the investigators to bring out all the evidences. In this paper, we will explain the traditional forensic data acquisition methods and the impact of encryption and security protection that been implemented in new smartphones on these methods, we will also present some new mobile forensics methods that will help to bypass the security measures in new generation smartphones, and finally, we will propose a new data extraction model using artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
28

Riad, Khaled, and Lishan Ke. "RoughDroid: Operative Scheme for Functional Android Malware Detection." Security and Communication Networks 2018 (September 20, 2018): 1–10. http://dx.doi.org/10.1155/2018/8087303.

Full text
Abstract:
There are thousands of malicious applications that invade Google Play Store every day and seem to be legal applications. These malicious applications have the ability to link the malware referred to as Dresscode created for network hacking as well as scrolling information. Since Android smartphones are indispensable, there should be an efficient and also unusual protection. Therefore, Android smartphones usually continue to be safeguarded from novel malware. In this paper, we propose RoughDroid, a floppy analysis technique that can discover Android malware applications directly on the smartphone. RoughDroid is based on seven feature sets (FS1,FS2,…,FS7) from the XML manifest file of an Android application, plus three feature sets (FS8,FS9, and FS10) from the Dex file. Those feature sets pass through the Rough Set algorithm to elastically classify the Android application as either benign or malicious. The experimental results mainly consider 20 most common malware families, plus three new malware families (Grabos, TrojanDropper.Agent.BKY, and AsiaHitGroup) that invade Google Play Store at 2017. According to the experimental results, RoughDroid has 95.6% detection performance for the malware families at 1% false-positive rate. Finally, RoughDroid is a lightweight approach for straightly examining downloaded applications on the smartphone.
APA, Harvard, Vancouver, ISO, and other styles
29

Sawant, Tanuja, Dhrupal Shah, Smita Sontakke, and Prathmesh Gunjgur. "An ML and SMS remote access based model for Anti-theft protection of Android devices." ITM Web of Conferences 32 (2020): 03021. http://dx.doi.org/10.1051/itmconf/20203203021.

Full text
Abstract:
Android phones being stolen is a significant problem that causes concerns to intellectual privacy and property. Always protecting smartphones from being stolen is a problem that remains. The key findings of the survey of existing systems for theft protection are, they provide various efficient functionalities but fail when the internet is unavailable or require specialized equipment to detect thefts. Most of these solutions are not free of charge, inefficient, time-consuming, or/and inflexible. This paper puts forward a system that provides an ML-based real-time anti-theft and remote access system for android devices. It detects theft using SVM-RBF model trained on feature-set extracted from the inertial sensor’s data with an accuracy of 0.76. Whereas remote access is provided using short message services (SMS). The salient feature of this system is minimal configuration without intruding human-assisted tasks. Moreover, it will be an excellent help for authentic smartphone users to realize the theft situation and utilize the remote access features.
APA, Harvard, Vancouver, ISO, and other styles
30

Saputra, Hendra, Amalia Zahra, Faldi Faldi, et al. "Recommendation mobile antivirus for Android smartphones based on malware detection." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 3559. http://dx.doi.org/10.11591/ijai.v13.i3.pp3559-3566.

Full text
Abstract:
<p>The proliferation of smartphone malware attacks due to a lack of vigilance in app selection raises serious concerns. Built-in smartphone security features often must be improved to protect devices from these threats. Although numerous articles recommend top-tier antivirus solutions, there need to be more reliable data sources that raise suspicions about undisclosed promotional motives. This research endeavors to establish a ranking of antivirus efficacy to provide optimal recommendations for Android smartphone users. The research methodology entails a meticulous comparison of malware detection and labeling outcomes between various antivirus programs within Virustotal and the labeling system employed by the Euphony application. The comparative results are categorized into three groups: antivirus solutions proficient in identifying specific malware types, those detecting malware presence without categorization, and antivirus software failing to detect malware effectively. The experimental findings present the five leading antivirus solutions, ranked from the highest to lowest scores, as Ikarus, Fortinet, ESET-NOD32, Avast-Mobile, and SymantecMobileInsight. Based on the comprehensive assessment conducted in this study, these solutions are recommended as the top antivirus choices. These recommendations are poised to significantly aid users in selecting the most suitable antivirus protection for their Android smartphones.</p>
APA, Harvard, Vancouver, ISO, and other styles
31

Zhao, Wei Wei, Zhi Guo Wang, Wei Cao, and Hong Yan Liu. "An Anti-Lost Data Security Storage System for Smartphone Based on Cloud Service." Applied Mechanics and Materials 687-691 (November 2014): 2993–96. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2993.

Full text
Abstract:
An anti-lost data security storage system for Smartphone has been proposed in this paper. The encryption key of data and the identity are stored in USBKey, so as to realize the physical separation of the encryption key and data, and the matching of USBKey and Smartphone. The System solves the problems of data recovery and backup in Smartphone after the phone is lost. The results indicate that the system has good data protection features, such as encryption and decryption fast, secure and reliable transmission, anti-lost, etc.
APA, Harvard, Vancouver, ISO, and other styles
32

chun se hak and 황순학. "Electronic Financial Transaction and Consumer Protection in the Smartphone Environment." Journal of Product Research 32, no. 6 (2014): 93–99. http://dx.doi.org/10.36345/kacst.2014.32.6.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ju, Xiaoen, and Kang G. Shin. "Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps." Journal of Information Privacy and Security 11, no. 2 (2015): 62–79. http://dx.doi.org/10.1080/15536548.2015.1045372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Buller, David B., Marianne Berwick, Kathy Lantz, et al. "Smartphone Mobile Application Delivering Personalized, Real-Time Sun Protection Advice." JAMA Dermatology 151, no. 5 (2015): 497. http://dx.doi.org/10.1001/jamadermatol.2014.3889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Moran, Chelsea, and Ella Zetler. "A review of smartphone applications for promoting sun protection practices." Journal of the American Academy of Dermatology 81, no. 2 (2019): 613–15. http://dx.doi.org/10.1016/j.jaad.2018.11.027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kartadinata, Andriansyah. "Penegakan Hukum Terhadap Tindak Pidana Penjualan Smartphone Ilegal Dalam Perspektif Undang-Undang Nomor 8 Tahun 1999 Tentang Perlindungan Konsumen." Justicia Sains: Jurnal Ilmu Hukum 9, no. 2 (2024): 558–69. https://doi.org/10.24967/jcs.v9i2.3740.

Full text
Abstract:
The aim of writing this scientific work is of course to determine law enforcement regarding criminal acts of illegal smartphone sales in the perspective of Law Number 8 of 1999 concerning Consumer Protection with data collection techniques using normative juridical methods and library research. The research results show that the distribution of illegal smartphones can be overcome by implementing Article 62 Paragraph (1) in conjunction with Article 8 Paragraph (1) letter a of Law no. 8 of 1999 relating to consumer protection with the threat of a maximum prison sentence of five years and a maximum fine of 2 billion Rupiah as well as Article 52 Juncto Article 32 Paragraph (1) of Law no. 36 of 1999 concerning Telecommunications with the threat of a maximum prison sentence of 1 year or a maximum fine of one hundred million rupiah.
APA, Harvard, Vancouver, ISO, and other styles
37

Auliya, Syafira, Lukito Edi Nugroho, and Noor Akhmad Setiawan. "A review on smartphone usage data for user identification and user profiling." Communications in Science and Technology 6, no. 1 (2021): 25–34. http://dx.doi.org/10.21924/cst.6.1.2021.363.

Full text
Abstract:
The amount of retrievable smartphone data is escalating; while some apps on the smartphone are evidently exploiting and leaking users’ data. These phenomena potentially violate privacy and personal data protection laws as various studies have showed that technologies such as artificial intelligence could transform smartphone data into personal data by generating user identification and user profiling. User identification identifies specific users among the data based upon the users’ characteristics and users profiling generates users’ traits (e.g. age and personality) by exploring how data is correlated with personal information. Nevertheless, the comprehensive review papers discussing both of the topics are limited. This paper thus aims to provide a comprehensive review of user identification and user profiling using smartphone data. Compared to the existing review papers, this paper has a broader lens by reviewing the general applications of smartphone data before focusing on smartphone usage data. This paper also discusses some possible data sources that can be used in this research topic.
APA, Harvard, Vancouver, ISO, and other styles
38

Masciantonio, Marcello G., and Aneta A. Surmanski. "Medical smartphone applications." University of Western Ontario Medical Journal 86, no. 2 (2017): 51–53. http://dx.doi.org/10.5206/uwomj.v86i2.2030.

Full text
Abstract:
Smartphones have a variety of unique features including text-message communication, camera, sensors, and health applications (apps), which can be used to assist in monitoring an individual’s health, diet, and exercise, as well as support goal-focused strategies personalized to user needs. Mental health and diabetes management apps are two prominent examples that have been shown to be effective in improving specific health outcomes. Mental health apps provide day-to-day patient care by teaching users how to reduce stress, focusing on strategies to enhance mental well-being. Apps such as Kokoro, Headspace, and PRISM have been demonstrated to reduce symptoms of depression and anxiety, and psycho-education apps have been demonstrated to reduce symptoms and to enhance concentration during specific tasks. Many diabetes apps are accessible by patients and physicians, and include tracking features for nutrition, fitness, and hemoglobin A1c levels. Specialized apps with text-messaging services and personalized support have been associated with improvements in blood pressure and blood glucose control. Social forums also provide patients privacy and the freedom to discuss their conditions with comfort. Health apps are easily accessible and available at low or no cost, and can be an effective tool for educating patients with chronic disease, supporting collaborative self-management, extending the impact of healthcare providers, and include response anonymity. There remain significant challenges including the protection of private health information and the development of regulatory frameworks to evaluate app quality, effectiveness, and absence of harm. Overall, the implementation of smartphone apps in healthcare systems may decrease demand in clinics, reduce healthcare costs, and lead to an improvement in patient health.
APA, Harvard, Vancouver, ISO, and other styles
39

Vasudev, Arpitha. "AI-Powered Privacy Protection Techniques for Smartphones." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49462.

Full text
Abstract:
Abstract - In today’s hyper-connected digital environment, smartphone applications frequently collect and share user data without explicit consent, posing serious privacy risks. The rise of cross-app tracking, location monitoring, and behavioral profiling by advertising and analytics platforms demands proactive protection. This paper presents an AI-powered Android application that safeguards user privacy in real time. Utilizing a local VPN service, the application intercepts outgoing network traffic and employs an on-device machine learning model built with TensorFlow Lite to detect and block potential trackers and unauthorized data transmissions. It alerts users whenever sensitive resources such as the microphone, location, or camera are accessed. The app also includes a user-friendly dashboard for reviewing historical tracking attempts. Designed to be lightweight and fully functional offline, the system ensures robust privacy without relying on cloud-based monitoring. This approach offers a secure and practical solution to modern digital privacy challenges, particularly on mobile platforms. Key Words: Android privacy, on-device machine learning, mobile security, VPN interception, TensorFlow Lite, tracker detection.
APA, Harvard, Vancouver, ISO, and other styles
40

Shin, Suk-Jo, Seon-Joo Kim, and In-June Jo. "Privacy Data Protection Methods on Smartphone Using A Virtual Disk Platform." Journal of the Korea Contents Association 13, no. 12 (2013): 560–67. http://dx.doi.org/10.5392/jkca.2013.13.12.560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

谭, 美思茵. "Research on the Legal Regulation and Privacy Protection of Smartphone Searches." Open Journal of Legal Science 12, no. 12 (2024): 7170–79. https://doi.org/10.12677/ojls.2024.12121018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Heinrich, Alexander, Leon Würsching, and Matthias Hollick. "Please Unstalk Me: Understanding Stalking with Bluetooth Trackers and Democratizing Anti-Stalking Protection." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 353–71. http://dx.doi.org/10.56553/popets-2024-0082.

Full text
Abstract:
While designed to locate lost items, Bluetooth trackers are increasingly exploited for malign purposes, such as unwanted location tracking. This study probes deeper into this issue, focusing on the widespread use of these devices for stalking. Following a dual approach, we analyzed user data from a widely used tracking detection app (over 200,000 active installations) and conducted a comprehensive online survey (N=5,253). Our data analysis reveals a significant prevalence of trackers from major brands such as Apple, Tile, and Samsung. The user data also shows that the app sends about 1,400 alarms daily for unwanted tracking. Survey insights reveal that 44.28% of stalking victims had been subjected to location tracking, with cars emerging as the most common hideout for misused trackers, followed by backpacks and purses. These findings underscore the urgency for more robust solutions. Despite ongoing efforts by manufacturers and researchers, the misuse of Bluetooth trackers remains a significant concern. We advocate for developing more effective tracking detection mechanisms integrated into smartphones by default and creating supportive measures for individuals without smartphone access.
APA, Harvard, Vancouver, ISO, and other styles
43

de Angel, Valeria, Serena Lewis, Sara Munir, Faith Matcham, Richard Dobson, and Matthew Hotopf. "Using digital health tools for the Remote Assessment of Treatment Prognosis in Depression (RAPID): a study protocol for a feasibility study." BMJ Open 12, no. 5 (2022): e059258. http://dx.doi.org/10.1136/bmjopen-2021-059258.

Full text
Abstract:
IntroductionDigital health tools such as smartphones and wearable devices could improve psychological treatment outcomes in depression through more accurate and comprehensive measures of patient behaviour. However, in this emerging field, most studies are small and based on student populations outside of a clinical setting. The current study aims to determine the feasibility and acceptability of using smartphones and wearable devices to collect behavioural and clinical data in people undergoing therapy for depressive disorders and establish the extent to which they can be potentially useful biomarkers of depression and recovery after treatment.Methods and analysisThis is an observational, prospective cohort study of 65 people attending psychological therapy for depression in multiple London-based sites. It will collect continuous passive data from smartphone sensors and a Fitbit fitness tracker, and deliver questionnaires, speech tasks and cognitive assessments through smartphone-based apps. Objective data on sleep, physical activity, location, Bluetooth contact, smartphone use and heart rate will be gathered for 7 months, and compared with clinical and contextual data. A mixed methods design, including a qualitative interview of patient experiences, will be used to evaluate key feasibility indicators, digital phenotypes of depression and therapy prognosis. Patient and public involvement was sought for participant-facing documents and the study design of the current research proposal.Ethics and disseminationEthical approval has been obtained from the London Westminster Research Ethics Committee, and the Health Research Authority, Integrated Research Application System (project ID: 270918). Privacy and confidentiality will be guaranteed and the procedures for handling, processing, storage and destruction of the data will comply with the General Data Protection Regulation. Findings from this study will form part of a doctoral thesis, will be presented at national and international meetings or academic conferences and will generate manuscripts to be submitted to peer-reviewed journals.Trial registration numberhttps://doi.org/10.17605/OSF.IO/PMYTA
APA, Harvard, Vancouver, ISO, and other styles
44

Zainelabdin, Fatima Abdelhadi. "The Negative Effects of Smart Phones on the Jordanian Children from the Perspective of Parents." Journal of Educational and Social Research 10, no. 5 (2020): 139. http://dx.doi.org/10.36941/jesr-2020-0095.

Full text
Abstract:
The study entitled "The Negative Effects of Smart Phones on the Jordanian Children from the Perspective of Parents" seeks to answer the following general question: What is the impact of using a smartphone on the socialization of Jordanian children from the perspective of parents? The descriptive study aimed to know the impact of using the smartphone on the socialization of the child and the nature of the values and behaviors acquired by the child as a result of using the smartphone. The researcher relied on the tools of scientific observation without the participation or a questionnaire was distributed on a sample estimated (300) parents, using the intentional sample of parents, in Amman; the researcher has reached the following results: 66% of children always use a smartphone, 36% of children started their interest in the smartphone from 3 to 5 years, 52% of children take half an hour to an hour using a smartphone, 34% of children use a smartphone depending on the circumstances, 39.33% of the children had a poor concentration after using the smartphone, 53.33% adopt negative behaviors as a result of using their smartphone, 48.66% of children become interacting with others after using the smartphone, 56.66% of children have diseases after they used a smartphone, including autism. The study recommends: The need to activate the role of social institutions, especially the family through the protection of children from programs, videos and applications and awareness of the seriousness of what is provided in the smartphone, parents were keen to establish good social habits that contribute to the formation of the child's personality, as well as the development of an accurate and structured program for children on the hours and times of their use of the smartphone so as not to affect their school hours.
APA, Harvard, Vancouver, ISO, and other styles
45

Sajikumar, Sariga, N. Ajithkumar, and Gopu Vijayan. "Exploring the Interplay of Privacy Concerns, Mobile Cybersecurity Awareness, and Protective Motivation Behavior." International Journal of Religion 5, no. 5 (2024): 612–19. http://dx.doi.org/10.61707/kqyq0505.

Full text
Abstract:
This study delves into the uncharted realm of privacy concerns among Indian smartphone users, exploring their nexus with mobile cybersecurity awareness and protective behaviour. Employing the Mobile User's Information Privacy Concern (MUIPC) tool and Protection Motivation Theory (PMT), it addresses gaps by scrutinizing users' concerns, data protection motivations, and cybersecurity awareness impact. Focused on the Indian smartphone user base, this research illuminates crucial insights into mobile privacy dynamics, informing privacy policies, user education, and cybersecurity strategies. Surveys gathered 364 diverse responses. Statistical analysis using chi-square tests and PLS-SEM via smartpls4 revealed a significant positive association between MUIPC and Protective Motivation Behavior (PMB). Notably, mobile cybersecurity awareness partially mediated the link between MUIPC and PMB. These findings emphasize the intricate relationship between privacy concerns, cybersecurity awareness, and protective behaviours in India's mobile landscape.
APA, Harvard, Vancouver, ISO, and other styles
46

Anindya Dwi Putri Islamidina, Amang Sudarsono, and Titon Dutono. "Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection." EMITTER International Journal of Engineering Technology 8, no. 1 (2020): 102–25. http://dx.doi.org/10.24003/emitter.v8i1.486.

Full text
Abstract:
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.
APA, Harvard, Vancouver, ISO, and other styles
47

Seok Kim, Bong. "Development of autosensing for self-protection device based IOT." International Journal of Engineering & Technology 7, no. 2.12 (2018): 84. http://dx.doi.org/10.14419/ijet.v7i2.12.11041.

Full text
Abstract:
Background/Objectives: There is the needs for the service not only to keep a user informed of access to potentially dangerous people approaching from the rear by alarm sound or vibration through automatic sensor installed the device but to transmit location as well as sensing time to guardian through smartphone appwhen women are going off the beaten track on the way home late at nightMethods/Statistical analysis :It is composed of app that is interlocked with a protection device installed human body detection sensor and camera capable of autosensing potentially dangerous people approaching according to proximity sensor. This autodetection makes it possible not only to inform user on approaching the people by alarm sound as well as vibration but to transmit sensor detecting time and location to guardian.Findings: Self-protection device based IoT which not only is informed approaching a dangerous person by alarm and vibration using a device attached sensor in case of sensing the people’s approaching but catches danger through smartphone application to take a picture and images included time and location is developed in this study.Improvements/Applications: This device will be expected to use not only women but students who are bullied at school. Pictures at school violence are transmitted to guardian if the student who has a device attached to the front of himmay occur school violence. Other improvements including if the device is dropped or handled roughly are under active consideration to send pictures or explanation of situation for guardian.
APA, Harvard, Vancouver, ISO, and other styles
48

Zangana, Hewa M., and Marwan Omar. "Threats, Attacks, and Mitigations of Smartphone Security." Academic Journal of Nawroz University 9, no. 4 (2020): 324. http://dx.doi.org/10.25007/ajnu.v9n4a989.

Full text
Abstract:
Mobile devices such as Smart Phones and Personal Assistant Devices (PDA) that are Internet based are becoming much more capable of handling complex tasks such as online shopping, online banking as well as social media networking; However, the security mechanisms and defense measures that are built into those devices are not commensurate with those powerful communication and computational capabilities. This in turn, creates critical vulnerabilities thus promoting the chance for imminent security threats. The intent of this paper is to take a look into some of the vulnerabilities and risks associated with the use of smart phones that are Internet based, explore the current security mechanisms and strategies that are in place, and finally propose some proactive defense strategies to ensure appropriate protection of critical information contained in Smart phone devices.
APA, Harvard, Vancouver, ISO, and other styles
49

Skalkos, Andreas, Ioannis Stylios, Maria Karyda, and Spyros Kokolakis. "Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 743–66. http://dx.doi.org/10.3390/jcp1040036.

Full text
Abstract:
Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and mitigate users’ concerns. Until now, research in BBCA technologies has mainly focused on developing novel behavioral biometrics continuous authentication systems and their technical characteristics, overlooking users’ attitudes towards BBCA. To address this gap, we conducted a study grounded on a model that integrates users’ privacy concerns, trust in technology, and innovativeness with Protection Motivation Theory. A cross-sectional survey among 778 smartphone users was conducted via Amazon Mechanical Turk (MTurk) to explore the factors which can predict users’ intention to use BBCA technologies. Our findings demonstrate that privacy concerns towards intention to use BBCA technology have a significant impact on all components of PMT. Further to this, another important construct we identified that affects the usage intention of BBCA technology is innovativeness. Our findings posit the view that reliability and trustworthiness of security technologies, such as BBCA are important for users. Together, these results highlighted the importance of addressing users’ perceptions regarding BBCA technology.
APA, Harvard, Vancouver, ISO, and other styles
50

KARAHİSAR, Tüba. "SMARTPHONE USAGE AND AWARENESS OF PERSONAL DATA PROTECTION: CASE OF COLLAGE STUDENTS." INTERNATIONAL PEER-REVIEWED JOURNAL OF COMMUNICATION AND HUMANITIES RESEARCHES, no. 9 (December 30, 2015): 1. http://dx.doi.org/10.17361/uhive.2015914931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography