The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study explored the factors that affect personal health information (PHI) disclosure via a mobile application (app) in Thailand. Since mobile apps are increasingly popular, as is the Thai people's concern on their health condition, many mobile app service providers want to know which factors would persuade customers to reveal their PHI via mobile apps. This research model was, therefore, developed...
With the increased popularity of mobile devices, hotels and online travel agencies have started focusing on mobile hotel booking (MHB) in recent years. However, there has been limited research on users” loyalty intentions toward MHB technology. This research attempted to provide an integrated theoretical model that examines the determinants of MHB loyalty. The proposed model, which incorporates personalization,...
In recent years, Brain-Computer Interfaces (BCIs) have gained popularity in non-medical domains such as the gaming, entertainment, personal health, and marketing industries. A growing number of companies offer various inexpensive consumer grade BCIs and some of these companies have recently introduced the concept of BCI "App stores" in order to facilitate the expansion of BCI applications...
App developers publish apps on different platforms, such as Google Play, App Store, and Windows Store, to maximize the user volumes and potential revenues. Due to the different characteristics of the platforms and the different user preference (e.g., Android is more customized than iOS), app testing cases on these three platforms should also be designed differently. Comprehensive app testing can be...
Android applications are subject to repackaging attacks, where popular applications are modified, often by inserting malicious logic, re-signed, and then uploaded to an online store to be later on downloaded and installed by unsuspicious users. This paper presents a set of protocols for increasing trust in special-purpose Android applications, termed secured trusted applications, during communication...
Rich contexts enable the provision of context-aware services on mobile smart phones, but they also introduce threats of privacy leakages. It is widely held that the key to privacy preservation is to achieve efficient tradeoffs between the utilization of contexts, the preservation of privacy. Götz et al. present δ privacy that exploits temporal relation to decide the release/suppression, this technique...
Lots of wireless devices, like mobile phones or RFID tags, could be traced by an adversary. Therefore, privacy-preserving authentication protocols prevail recently. To improve the efficiency, several protocols have been proposed, like tree-based, group-based or key-shared protocols. However, most of these protocols are vulnerable to compromise attacks, resynchronization attacks or traceability. This...
The real value of mobile applications is heavily dependent on consumers' trust in the privacy of their personal information and location data. However, research has generated few results based on actual information disclosure and even less that is based on longitudinal behavior. The purpose of this study is to execute a unique and authentic field experiment involving real risks and consumer behaviors...
The recent penetration of smart mobile devices into the consumer market sets a stage for novel network applications. In particular, we envision a paradigm shift in the commercial advertising model facilitated by the widespread uses of these devices: advertisements circulate in a word-of-mouth fashion among device users and reach potential customers based on the users' knowledge about their contacts...
This paper is predominantly a review of literature on the emerging mobile application area known as location-based social networking. The study applies the social informatics framework to the exploratory question of what effect location based social networking may have on relationships between people. The classification model used in the paper relates previous research on location based services and...
Location-based services are playing an increasingly important role in the rapidly evolving world of mobile applications. Despite this importance, there are numerous challenges to providing a widely implemented and usable service that spans multiple places, devices, and location technologies. This paper describes WhereAmI, a unique location services testbed that addresses these challenges and is enabling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.