The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smartphones and tablets have become important in daily life as they provide a convenient and mobile means to seek, access and share information. This convenience carries a downside in the rising concern with mobile security. Conveying the importance of personal digital security is notoriously difficult with adult users and perhaps more so for users who are children. Children are avid consumers of...
Geospatially-aware mobile devices and applications (GAMODAs) are increasingly penetrating both business and consumer markets. One of the primary concerns with GAMODAs is the new dimension of information privacy risk associated with users' location data. However, because this technology is relatively new, it is possible that much of this concern can be explained by the user's knowledge (or lack thereof)...
Accessing the Internet and specifically the World Wide Web from a mobile phone is common today. Especially since the usage fees for packet-data access dropped to a point where anybody who can can afford a mobile phone can afford mobile Internet access. Almost every mobile phone today comes with an integrated web browser that can display HTML web pages and execute JavaScript. Almost all major web sites...
Targeted Advertising has been there for a while. A supermarket distributing pamphlets about what it is selling, and the applicable discounts, to the residents in the locality, is a form of Targeted Advertising. A local cable television service provider overlaying advertisements on its channels is another form. This whitepaper describes Targeted Advertising for the Communication Service Provider (CSP)...
Web search providers have developed a highly successful business model, which has rendered them amongst some of the most profitable companies operating on the internet. Many observers regard mobile search as the next new big market. In contrast to search on PCs, however, the provision of search on mobiles is still in its infancy. In order to shed light on the real prospects of mobile search we performed...
The generation of young people who do not remember life before the Internet, who grew up surrounded by computing technology and mobile phones, are often referred to as `digital natives'. This generation has a special affinity to mobile devices - young people often carry their mobile phones with them at all times to keep a constant connection with their friends while also consuming and creating digital...
During the last few years there has been an increasing number of people-centric sensing projects. These combine location information with sensors available on mobile phones, giving birth to a different dimension in sensing our environment and providing us with new opportunities to create collective intelligence systems to address urban-scale problems such as air pollution, noise, and traffic. However,...
This paper is concerned with privacy management in mobile settings. We are also going to be looking at the type of applications that are starting to spin off from the Internet onto mobile phones, such as Messenger, Facebook and Twitter. Publication of the whereabouts and activities of the user is at the core of these systems. Many commentators worry about users forgetting that the social network may...
The combined use of the Internet and mobile technologies is leading to major changes in how individuals communicate, conduct business transactions and access resources and services. In such a scenario, digital identity management (DIM) technology is fundamental for enabling transactions and interactions across the Internet. In this demo, we demonstrate VeryIDX, a system for the privacy-preserving...
Cellular networks are the only means of digital communication for the vast majority of the world's population. Although such systems have traditionally been viewed as secure due to their relatively closed nature, their transition toward an all-IP infrastructure and convergence with the larger Internet creates the potential for new threats to users' security and privacy. This article considers a number...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.