The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the proliferation of mobile devices, many users now take advantage of location-based services that use their current position. However, careful consideration should be made when sending one's location to another as the location often includes personal attributes such as home address and reveals private information such as health or religion. To resolve this issue, a dummy generation technique...
The trend of adapting BYOD or "Bring Your Own Device" concept in enterprise environment is increasing due to mutual benefits that the company and employees get. Organizations get benefit of increased productivity and reduced IT expenditure whereas the employees are able to use the mobile device which is comfortable and convenient for them. However, BYOD deployment brings serious security...
The recent years have seen a vast growth of location-based services (LBS) usage with the ubiquity of smart mobile devices. While reactive LBS act on the user's request, proactive LBS notify the user proactively of relevant location-specific content in case a dedicated area is entered. The usage scenarios of proactive LBS vary from location-based reminders to location-based marketing. With the increasing...
Smartphones, loaded with users' personal information have become the primary computing device for many. This makes privacy an increasingly important issue. To protect the privacy of the context based service users we propose CLOPRO framework (Context Cloaking Privacy Protection) using two non-colluding servers. Each service request has three parameters: identity, context and actual query. The proposed,...
The recent development of powerful mobile devices is encouraging people to take them as a computing platform. Users are expecting to personalize services to meet their individual needs and will no longer accept “one size fits all” approach. On the other hand, there is contention between personalization and privacy. This leads to the question of how to maximize the user's experience of personalized...
The fast economic growth lead by worlds emerging markets, has created the need for designing suitable Pervasive technology (aka PerComp), aimed at emerging markets. However, for designing suitable PerComp, it is essential to understand the implications of PerComp technology use in emerging market context. We studied information sharing practices and implications of technology use in two rural communities...
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which...
Nowadays, people tend to photograph with mobile phones more and more, in which way photo sharing in online SNS are much more convenient. But there remain challenges such as automatic sharing, album management and social sensing. This paper presents a participatory sensing based social photo sharing system-SoPhoNet. With the involved model "People, Photos and Photo Events", the participators...
Location-based services (LBS) have become an immensely valuable source of real-time information and guidance. Nonetheless, the potential abuse of users' sensitive personal data by an LBS server is evolving into a serious concern. Privacy concerns in LBS exist on two fronts: location privacy and query privacy. In this paper we investigate issues related to query privacy. In particular, we aim to prevent...
This paper aims to study the influence of user-context on mobile information needs with the following two objectives. (1) To identify the role of user-context as a trigger for mobile information needs and (2) To examine how user-context can affect the fulfillment of information needs via mobile devices either as impediments, facilitators or both. Data collection methods involved a one week diary study...
With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., images, video) collected by their mobile devices to central data servers. However, privacy concerns are becoming a major impediment in the success of many participatory sensing systems. While several privacy preserving techniques exist...
Geospatially-aware mobile devices and applications (GAMODAs) are increasingly penetrating both business and consumer markets. One of the primary concerns with GAMODAs is the new dimension of information privacy risk associated with users' location data. However, because this technology is relatively new, it is possible that much of this concern can be explained by the user's knowledge (or lack thereof)...
Issues in the development of location privacy theory are identified and organized based on both technological considerations and more general privacy theories. Three broad categories containing six issues are described: location (including sensing methods and location properties), privacy (including definition and subject identification), and information flows (from location information acquisition...
The present article shows the findings of research on a group of secondary school students from an agricultural district in inland Galicia. Research methods used include quantitative and qualitative techniques as well as participant observation. The authors analyze to what degree and for what purpose rural youth communicate via mobile telephone and if gender accounts for any significant differences...
The topic of mobile services has piqued the interest of practitioners. Mobile service providers invest many resources to provide mobile services of higher quality in the hope of gaining more business opportunities and higher customer satisfaction. They often increase the service quality through the use of personalization, i.e., generating customized mobile content for each individual. Despite the...
We envision a sensor-enabled mobile system to assist organizers and participants of public events in emergencies and evacuation situations using human computing principles. By autonomously detecting elements of emergent collective behavior (e.g. clogging, queuing, herding), efficient interaction and information sharing with specific groups in the crowd is enabled. We have previously shown the technological...
The primary aim of this study is to investigate the factors influencing audience attitudes towards such location-based advertising. The results indicate that entertainment, personalization and privacy concerns all have direct impacts on consumer attitudes, with situational context moderating the impacts of these factors on such consumer attitudes. We conclude by offering some practical suggestions...
Web search providers have developed a highly successful business model, which has rendered them amongst some of the most profitable companies operating on the internet. Many observers regard mobile search as the next new big market. In contrast to search on PCs, however, the provision of search on mobiles is still in its infancy. In order to shed light on the real prospects of mobile search we performed...
Advertisers are now enjoying the next stage of marketing where the mobile medium plays a significant role as a means of commercial communications. The effectiveness of this new channel can be witnessed through the rise in popularity of mobile advertising. The underlying reasons for this phenomenon could be the rapid proliferation of mobile platforms and the unique characteristics inherent in the mobile...
The paper presents a hierarchical construct PLS structural equation model to analyze mobile advertisement acceptance. Hypotheses are established and tested about the hierarchical structure and the effects of the factors that precede consumers' behavioral intention to accept mobile advertisement. The results suggest that valuable content and trust in advertisers are key predictors of mobile device...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.