CINXE.COM
Mobile Technology Research Papers - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Mobile Technology Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="bnwZ5uR0zr9RL1Akzlx6XOK6KlBb-SzlpKd3jHUnda9SaGz_KxczYjVpUdccaFjJVgV10EAP8n-O4M0SKkO-Sw" /> <link href="/Documents/in/Mobile_Technology?after=50%2C18549366" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-2b6f90dbd75f5941bc38f4ad716615f3ac449e7398313bb3bc225fba451cd9fa.css" /> <meta name="description" content="View Mobile Technology Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = 'dc2ad41da5d7ea682babd20f90650302fb0a3a36'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":14016,"monthly_visitors":"99 million","monthly_visitor_count":99567017,"monthly_visitor_count_in_millions":99,"user_count":282990671,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1739802597000); window.Aedu.timeDifference = new Date().getTime() - 1739802597000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-40698df34f913bd208bb70f09d2feb7c6286046250be17a4db35bba2c08b0e2f.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-a22f75d8519394c21253dae46c8c5d60ad36ea68c7d494347ec64229d8c1cf85.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-5708a105dd66b4c7d0ef30b7c094b1048423f0042bd2a7b123f2d99ee3cf46d9.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Mobile_Technology" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Mobile Technology</h1><div class="u-tcGrayDark">195,701 Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in <b>Mobile Technology</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Mobile_Technology">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Mobile_Technology/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Mobile_Technology/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Mobile_Technology/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Mobile_Technology">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_16582447 coauthored" data-work_id="16582447" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/16582447/Introduction_Transforming_community_based_and_community_led_HIV_prevention_and_care_through_ICTs">Introduction: Transforming community-based and community-led HIV prevention and care through ICTs</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Information and communication technology (ICT) is transforming community-based and community-led HIV prevention and care services for gay men, other men who have sex with men (MSM) and transgender people. This book celebrates and shares... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_16582447" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Information and communication technology (ICT) is transforming<br />community-based and community-led HIV prevention and care services for gay men, other men who have sex with men (MSM) and transgender people. This book celebrates and shares crucial work of frontline HIV workers, activists, researchers and educators whom are using innovative ICT.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/16582447" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="86ac8cca417085178cc17cc484880ebc" rel="nofollow" data-download="{"attachment_id":39059968,"asset_id":16582447,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39059968/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="170387" href="https://vu.academia.edu/ChrisWalsh">Chris Walsh</a><script data-card-contents-for-user="170387" type="text/json">{"id":170387,"first_name":"Chris","last_name":"Walsh","domain_name":"vu","page_name":"ChrisWalsh","display_name":"Chris Walsh","profile_url":"https://vu.academia.edu/ChrisWalsh?f_ri=4198","photo":"https://0.academia-photos.com/170387/42849/18227853/s65_chris.walsh.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-16582447">+1</span><div class="hidden js-additional-users-16582447"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/RCameronWolf">R. Cameron Wolf</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-16582447'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-16582447').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_16582447 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="16582447"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 16582447, container: ".js-paper-rank-work_16582447", }); });</script></li><li class="js-percentile-work_16582447 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16582447; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_16582447"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_16582447 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="16582447"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16582447; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16582447]").text(description); $(".js-view-count-work_16582447").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_16582447").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="16582447"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">14</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="3611" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Technology">Digital Technology</a>, <script data-card-contents-for-ri="3611" type="text/json">{"id":3611,"name":"Digital Technology","url":"https://www.academia.edu/Documents/in/Digital_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4790" rel="nofollow" href="https://www.academia.edu/Documents/in/HIV_and_AIDS_education">HIV and AIDS education</a>, <script data-card-contents-for-ri="4790" type="text/json">{"id":4790,"name":"HIV and AIDS education","url":"https://www.academia.edu/Documents/in/HIV_and_AIDS_education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4814" rel="nofollow" href="https://www.academia.edu/Documents/in/HIV_AIDS">HIV/AIDS</a><script data-card-contents-for-ri="4814" type="text/json">{"id":4814,"name":"HIV/AIDS","url":"https://www.academia.edu/Documents/in/HIV_AIDS?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=16582447]'), work: {"id":16582447,"title":"Introduction: Transforming community-based and community-led HIV prevention and care through ICTs","created_at":"2015-10-08T16:48:36.695-07:00","url":"https://www.academia.edu/16582447/Introduction_Transforming_community_based_and_community_led_HIV_prevention_and_care_through_ICTs?f_ri=4198","dom_id":"work_16582447","summary":"Information and communication technology (ICT) is transforming\ncommunity-based and community-led HIV prevention and care services for gay men, other men who have sex with men (MSM) and transgender people. This book celebrates and shares crucial work of frontline HIV workers, activists, researchers and educators whom are using innovative ICT. ","downloadable_attachments":[{"id":39059968,"asset_id":16582447,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":170387,"first_name":"Chris","last_name":"Walsh","domain_name":"vu","page_name":"ChrisWalsh","display_name":"Chris Walsh","profile_url":"https://vu.academia.edu/ChrisWalsh?f_ri=4198","photo":"https://0.academia-photos.com/170387/42849/18227853/s65_chris.walsh.jpg"},{"id":21474106,"first_name":"R. Cameron","last_name":"Wolf","domain_name":"independent","page_name":"RCameronWolf","display_name":"R. Cameron Wolf","profile_url":"https://independent.academia.edu/RCameronWolf?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":3611,"name":"Digital Technology","url":"https://www.academia.edu/Documents/in/Digital_Technology?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4790,"name":"HIV and AIDS education","url":"https://www.academia.edu/Documents/in/HIV_and_AIDS_education?f_ri=4198","nofollow":true},{"id":4814,"name":"HIV/AIDS","url":"https://www.academia.edu/Documents/in/HIV_AIDS?f_ri=4198","nofollow":true},{"id":6810,"name":"Public Health Policy","url":"https://www.academia.edu/Documents/in/Public_Health_Policy?f_ri=4198"},{"id":11583,"name":"MLearning","url":"https://www.academia.edu/Documents/in/MLearning?f_ri=4198"},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health?f_ri=4198"},{"id":36787,"name":"HIV/AIDS (International Studies)","url":"https://www.academia.edu/Documents/in/HIV_AIDS_International_Studies_?f_ri=4198"},{"id":82849,"name":"ICTs","url":"https://www.academia.edu/Documents/in/ICTs?f_ri=4198"},{"id":89502,"name":"Information and Communication Technologies","url":"https://www.academia.edu/Documents/in/Information_and_Communication_Technologies?f_ri=4198"},{"id":94012,"name":"HIV and AIDS: prevention, care, ARV adherence","url":"https://www.academia.edu/Documents/in/HIV_and_AIDS_prevention_care_ARV_adherence?f_ri=4198"},{"id":96084,"name":"HIV and AIDS","url":"https://www.academia.edu/Documents/in/HIV_and_AIDS?f_ri=4198"},{"id":114641,"name":"Marginalised Groups","url":"https://www.academia.edu/Documents/in/Marginalised_Groups?f_ri=4198"},{"id":1193280,"name":"Elearning","url":"https://www.academia.edu/Documents/in/Elearning?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5554964" data-work_id="5554964" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5554964/Mediated_Agency_Music_and_Media_against_Corruption_in_Tanzania">Mediated Agency: Music and Media against Corruption in Tanzania</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This chapter explores the use of music and digital media in the Chanjo campaign against corruption in Tanzania, focusing on mediations of agency. Building on Latour (2005), I use the concept mediated agency to refer to a process in which... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_5554964" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This chapter explores the use of music and digital media in the Chanjo campaign against corruption in Tanzania, focusing on mediations of agency. Building on Latour (2005), I use the concept mediated agency to refer to a process in which different cultural forms (mediators) bring about social transformation (agency). In so doing I recognize the ‘agency of art,’ especially its embeddedness in networks of social relations and its ‘practical mediatory role’ in processes of social change (Gell 1998). Similarly, I appreciate media and other mediators in the broader sense of ‘social mediation,’ with an emphasis on social interaction and exchange (Boyer 2012). Thus, while understanding agency in the sense of transformative action or practice, I build on anthropological theories of mediation, focusing on social processes of intervention and interaction that include but go beyond different forms of media. In this chapter, I will argue that the Chanjo campaign creates a platform that mediates the agency of participants, empowering them to speak up against corruption. The music itself is of course an important form of mediation, but so is the method of delivery, not least the interaction with the audience, as well as the mobility of the campaign. These layers of mediation intersect in different ways, which enforces the process of social and cultural transformation. Through digital mediations and remediations (Bolter and Grusin 1999), especially through social and mobile media, the campaign expands in time and space, thus extending agency beyond the tour itself.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5554964" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b4a028a88bc877d1c282722427d7a4cb" rel="nofollow" data-download="{"attachment_id":32648341,"asset_id":5554964,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32648341/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="257875" href="https://su-se.academia.edu/PaulaUimonen">Paula Uimonen</a><script data-card-contents-for-user="257875" type="text/json">{"id":257875,"first_name":"Paula","last_name":"Uimonen","domain_name":"su-se","page_name":"PaulaUimonen","display_name":"Paula Uimonen","profile_url":"https://su-se.academia.edu/PaulaUimonen?f_ri=4198","photo":"https://0.academia-photos.com/257875/54822/119793418/s65_paula.uimonen.jpg"}</script></span></span></li><li class="js-paper-rank-work_5554964 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5554964"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5554964, container: ".js-paper-rank-work_5554964", }); });</script></li><li class="js-percentile-work_5554964 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5554964; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5554964"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5554964 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5554964"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5554964; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5554964]").text(description); $(".js-view-count-work_5554964").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5554964").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5554964"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="671" rel="nofollow" href="https://www.academia.edu/Documents/in/Music">Music</a>, <script data-card-contents-for-ri="671" type="text/json">{"id":671,"name":"Music","url":"https://www.academia.edu/Documents/in/Music?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="767" rel="nofollow" href="https://www.academia.edu/Documents/in/Anthropology">Anthropology</a>, <script data-card-contents-for-ri="767" type="text/json">{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4527" rel="nofollow" href="https://www.academia.edu/Documents/in/Africa">Africa</a><script data-card-contents-for-ri="4527" type="text/json">{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5554964]'), work: {"id":5554964,"title":"Mediated Agency: Music and Media against Corruption in Tanzania","created_at":"2013-12-29T16:35:32.974-08:00","url":"https://www.academia.edu/5554964/Mediated_Agency_Music_and_Media_against_Corruption_in_Tanzania?f_ri=4198","dom_id":"work_5554964","summary":"This chapter explores the use of music and digital media in the Chanjo campaign against corruption in Tanzania, focusing on mediations of agency. Building on Latour (2005), I use the concept mediated agency to refer to a process in which different cultural forms (mediators) bring about social transformation (agency). In so doing I recognize the ‘agency of art,’ especially its embeddedness in networks of social relations and its ‘practical mediatory role’ in processes of social change (Gell 1998). Similarly, I appreciate media and other mediators in the broader sense of ‘social mediation,’ with an emphasis on social interaction and exchange (Boyer 2012). Thus, while understanding agency in the sense of transformative action or practice, I build on anthropological theories of mediation, focusing on social processes of intervention and interaction that include but go beyond different forms of media. In this chapter, I will argue that the Chanjo campaign creates a platform that mediates the agency of participants, empowering them to speak up against corruption. The music itself is of course an important form of mediation, but so is the method of delivery, not least the interaction with the audience, as well as the mobility of the campaign. These layers of mediation intersect in different ways, which enforces the process of social and cultural transformation. Through digital mediations and remediations (Bolter and Grusin 1999), especially through social and mobile media, the campaign expands in time and space, thus extending agency beyond the tour itself. ","downloadable_attachments":[{"id":32648341,"asset_id":5554964,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":257875,"first_name":"Paula","last_name":"Uimonen","domain_name":"su-se","page_name":"PaulaUimonen","display_name":"Paula Uimonen","profile_url":"https://su-se.academia.edu/PaulaUimonen?f_ri=4198","photo":"https://0.academia-photos.com/257875/54822/119793418/s65_paula.uimonen.jpg"}],"research_interests":[{"id":671,"name":"Music","url":"https://www.academia.edu/Documents/in/Music?f_ri=4198","nofollow":true},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=4198","nofollow":true},{"id":11584,"name":"ICT for Development","url":"https://www.academia.edu/Documents/in/ICT_for_Development?f_ri=4198"},{"id":13872,"name":"Facebook","url":"https://www.academia.edu/Documents/in/Facebook?f_ri=4198"},{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=4198"},{"id":23241,"name":"Tanzania","url":"https://www.academia.edu/Documents/in/Tanzania?f_ri=4198"},{"id":27886,"name":"Social study of ICT","url":"https://www.academia.edu/Documents/in/Social_study_of_ICT?f_ri=4198"},{"id":73699,"name":"Corruption","url":"https://www.academia.edu/Documents/in/Corruption?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9309799" data-work_id="9309799" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/9309799/AN_EDUCATIONAL_BLUETOOTH_QUIZZING_APPLICATION_IN_ANDROID">AN EDUCATIONAL BLUETOOTH QUIZZING APPLICATION IN ANDROID</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions how to harness this technology in an educational manner in universities and schools. This paper is about a Bluetooth quizzing system... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_9309799" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions how to harness this technology in an educational manner in universities and schools. This paper is about a Bluetooth quizzing system which will be used to administer quizzes to students of a university. The Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a queuing system to allow many clients to connect simultaneously to the server. When clients connect, they can register or choose the option to complete a quiz that the lecturer selected. Results are automatically sent when quiz is done from the client application. Data analysis can then be done to review the progress of students.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9309799" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="829ae8d718d2de1a5e048dd184a0b664" rel="nofollow" data-download="{"attachment_id":35570104,"asset_id":9309799,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35570104/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15983581" rel="nofollow" href="https://independent.academia.edu/WirelessMobileNetworks">International Journal of Wireless & Mobile Networks (IJWMN) - ERA, WJCI Indexed</a><script data-card-contents-for-user="15983581" type="text/json">{"id":15983581,"first_name":"International Journal of Wireless \u0026 Mobile Networks","last_name":"(IJWMN) - ERA, WJCI Indexed","domain_name":"independent","page_name":"WirelessMobileNetworks","display_name":"International Journal of Wireless \u0026 Mobile Networks (IJWMN) - ERA, WJCI Indexed","profile_url":"https://independent.academia.edu/WirelessMobileNetworks?f_ri=4198","photo":"https://0.academia-photos.com/15983581/4331308/106344662/s65_international_journal_of_wireless_mobile_networks._ijwmn_-_era_wjci_indexed.jpg"}</script></span></span></li><li class="js-paper-rank-work_9309799 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9309799"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9309799, container: ".js-paper-rank-work_9309799", }); });</script></li><li class="js-percentile-work_9309799 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9309799; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9309799"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9309799 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9309799"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9309799; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9309799]").text(description); $(".js-view-count-work_9309799").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9309799").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9309799"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">13</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2339" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Ad_Hoc_Networks">Mobile Ad Hoc Networks</a>, <script data-card-contents-for-ri="2339" type="text/json">{"id":2339,"name":"Mobile Ad Hoc Networks","url":"https://www.academia.edu/Documents/in/Mobile_Ad_Hoc_Networks?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2345" rel="nofollow" href="https://www.academia.edu/Documents/in/Wireless_Communications">Wireless Communications</a>, <script data-card-contents-for-ri="2345" type="text/json">{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9309799]'), work: {"id":9309799,"title":"AN EDUCATIONAL BLUETOOTH QUIZZING APPLICATION IN ANDROID","created_at":"2014-11-14T12:23:57.094-08:00","url":"https://www.academia.edu/9309799/AN_EDUCATIONAL_BLUETOOTH_QUIZZING_APPLICATION_IN_ANDROID?f_ri=4198","dom_id":"work_9309799","summary":"Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions how to harness this technology in an educational manner in universities and schools. This paper is about a Bluetooth quizzing system which will be used to administer quizzes to students of a university. The Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a queuing system to allow many clients to connect simultaneously to the server. When clients connect, they can register or choose the option to complete a quiz that the lecturer selected. Results are automatically sent when quiz is done from the client application. Data analysis can then be done to review the progress of students.","downloadable_attachments":[{"id":35570104,"asset_id":9309799,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15983581,"first_name":"International Journal of Wireless \u0026 Mobile Networks","last_name":"(IJWMN) - ERA, WJCI Indexed","domain_name":"independent","page_name":"WirelessMobileNetworks","display_name":"International Journal of Wireless \u0026 Mobile Networks (IJWMN) - ERA, WJCI Indexed","profile_url":"https://independent.academia.edu/WirelessMobileNetworks?f_ri=4198","photo":"https://0.academia-photos.com/15983581/4331308/106344662/s65_international_journal_of_wireless_mobile_networks._ijwmn_-_era_wjci_indexed.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true},{"id":2339,"name":"Mobile Ad Hoc Networks","url":"https://www.academia.edu/Documents/in/Mobile_Ad_Hoc_Networks?f_ri=4198","nofollow":true},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4205,"name":"Data Analysis","url":"https://www.academia.edu/Documents/in/Data_Analysis?f_ri=4198"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=4198"},{"id":6203,"name":"Electronics \u0026 Telecommunication Engineering","url":"https://www.academia.edu/Documents/in/Electronics_and_Telecommunication_Engineering?f_ri=4198"},{"id":10297,"name":"Wireless Mesh Networks","url":"https://www.academia.edu/Documents/in/Wireless_Mesh_Networks?f_ri=4198"},{"id":22992,"name":"Wireless networks","url":"https://www.academia.edu/Documents/in/Wireless_networks?f_ri=4198"},{"id":73445,"name":"Bluetooth","url":"https://www.academia.edu/Documents/in/Bluetooth?f_ri=4198"},{"id":168121,"name":"Android Development","url":"https://www.academia.edu/Documents/in/Android_Development?f_ri=4198"},{"id":548431,"name":"Bluetooth Technology","url":"https://www.academia.edu/Documents/in/Bluetooth_Technology?f_ri=4198"},{"id":1668328,"name":"Educational applications","url":"https://www.academia.edu/Documents/in/Educational_applications?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_7359716" data-work_id="7359716" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/7359716/GDVCAMERA_BIO_WELL">GDVCAMERA BIO-WELL</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/7359716" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="db767d33a7e26b76099cde57b6b7ab8c" rel="nofollow" data-download="{"attachment_id":33957989,"asset_id":7359716,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33957989/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="12951914" href="https://independent.academia.edu/KirillKorotkov">Kir Korotkov</a><script data-card-contents-for-user="12951914" type="text/json">{"id":12951914,"first_name":"Kir","last_name":"Korotkov","domain_name":"independent","page_name":"KirillKorotkov","display_name":"Kir Korotkov","profile_url":"https://independent.academia.edu/KirillKorotkov?f_ri=4198","photo":"https://0.academia-photos.com/12951914/3665850/19920948/s65_kirill.korotkov.jpg"}</script></span></span></li><li class="js-paper-rank-work_7359716 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="7359716"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 7359716, container: ".js-paper-rank-work_7359716", }); });</script></li><li class="js-percentile-work_7359716 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7359716; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_7359716"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_7359716 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="7359716"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7359716; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7359716]").text(description); $(".js-view-count-work_7359716").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_7359716").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="7359716"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="502" rel="nofollow" href="https://www.academia.edu/Documents/in/Biophysics">Biophysics</a>, <script data-card-contents-for-ri="502" type="text/json">{"id":502,"name":"Biophysics","url":"https://www.academia.edu/Documents/in/Biophysics?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="923" rel="nofollow" href="https://www.academia.edu/Documents/in/Technology">Technology</a>, <script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=7359716]'), work: {"id":7359716,"title":"GDVCAMERA BIO-WELL","created_at":"2014-06-15T22:07:17.017-07:00","url":"https://www.academia.edu/7359716/GDVCAMERA_BIO_WELL?f_ri=4198","dom_id":"work_7359716","summary":null,"downloadable_attachments":[{"id":33957989,"asset_id":7359716,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":12951914,"first_name":"Kir","last_name":"Korotkov","domain_name":"independent","page_name":"KirillKorotkov","display_name":"Kir Korotkov","profile_url":"https://independent.academia.edu/KirillKorotkov?f_ri=4198","photo":"https://0.academia-photos.com/12951914/3665850/19920948/s65_kirill.korotkov.jpg"}],"research_interests":[{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true},{"id":502,"name":"Biophysics","url":"https://www.academia.edu/Documents/in/Biophysics?f_ri=4198","nofollow":true},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":5398,"name":"Biotechnology","url":"https://www.academia.edu/Documents/in/Biotechnology?f_ri=4198"},{"id":7710,"name":"Biology","url":"https://www.academia.edu/Documents/in/Biology?f_ri=4198"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine?f_ri=4198"},{"id":522782,"name":"Information Technology and System Integration","url":"https://www.academia.edu/Documents/in/Information_Technology_and_System_Integration?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_56526724" data-work_id="56526724" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/56526724/Mobile_technology_for_crime_scene_examination">Mobile technology for crime scene examination</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In this paper, the concept of distributed cognition is used to inform the design, development and trialling of technologies to support Crime Scene Examination is reported. A user trial, with trainee Crime Scene Examiners, was conducted to... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_56526724" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In this paper, the concept of distributed cognition is used to inform the design, development and trialling of technologies to support Crime Scene Examination is reported. A user trial, with trainee Crime Scene Examiners, was conducted to compare the ways in which evidence search and recovery could be combined with the production of a crime scene report (that must be written at the scene). Participants completed the crime scene report using either the conventional paper form, an electronic form on a tablet computer (to represent the current trend in digitisation of crime scene reports), or a wearable computer (with speech input). While both computer conditions (tablet and wearable) led to faster performance, when compared with the paper condition, there was no difference in content or quality of the reports produced in any of the three conditions; thus, the computer conditions produced acceptable reports in much faster time when compared to conventional practice. Furthermore, activity sampling analysis showed that participants found it much easier to integrate the wearable computer (than either paper forms or tablet computer) into their search and recovery activity.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/56526724" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9c453ecc42e967506b1a0640fab57896" rel="nofollow" data-download="{"attachment_id":71870369,"asset_id":56526724,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/71870369/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="40277325" href="https://independent.academia.edu/JamesCross20">James Cross</a><script data-card-contents-for-user="40277325" type="text/json">{"id":40277325,"first_name":"James","last_name":"Cross","domain_name":"independent","page_name":"JamesCross20","display_name":"James Cross","profile_url":"https://independent.academia.edu/JamesCross20?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_56526724 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="56526724"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 56526724, container: ".js-paper-rank-work_56526724", }); });</script></li><li class="js-percentile-work_56526724 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 56526724; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_56526724"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_56526724 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="56526724"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 56526724; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=56526724]").text(description); $(".js-view-count-work_56526724").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_56526724").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="56526724"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="189" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="923" rel="nofollow" href="https://www.academia.edu/Documents/in/Technology">Technology</a>, <script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4212" rel="nofollow" href="https://www.academia.edu/Documents/in/Cognition">Cognition</a><script data-card-contents-for-ri="4212" type="text/json">{"id":4212,"name":"Cognition","url":"https://www.academia.edu/Documents/in/Cognition?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=56526724]'), work: {"id":56526724,"title":"Mobile technology for crime scene examination","created_at":"2021-10-08T04:23:27.280-07:00","url":"https://www.academia.edu/56526724/Mobile_technology_for_crime_scene_examination?f_ri=4198","dom_id":"work_56526724","summary":"In this paper, the concept of distributed cognition is used to inform the design, development and trialling of technologies to support Crime Scene Examination is reported. A user trial, with trainee Crime Scene Examiners, was conducted to compare the ways in which evidence search and recovery could be combined with the production of a crime scene report (that must be written at the scene). Participants completed the crime scene report using either the conventional paper form, an electronic form on a tablet computer (to represent the current trend in digitisation of crime scene reports), or a wearable computer (with speech input). While both computer conditions (tablet and wearable) led to faster performance, when compared with the paper condition, there was no difference in content or quality of the reports produced in any of the three conditions; thus, the computer conditions produced acceptable reports in much faster time when compared to conventional practice. Furthermore, activity sampling analysis showed that participants found it much easier to integrate the wearable computer (than either paper forms or tablet computer) into their search and recovery activity.","downloadable_attachments":[{"id":71870369,"asset_id":56526724,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":40277325,"first_name":"James","last_name":"Cross","domain_name":"independent","page_name":"JamesCross20","display_name":"James Cross","profile_url":"https://independent.academia.edu/JamesCross20?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=4198","nofollow":true},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4212,"name":"Cognition","url":"https://www.academia.edu/Documents/in/Cognition?f_ri=4198","nofollow":true},{"id":4418,"name":"Distributed Cognition","url":"https://www.academia.edu/Documents/in/Distributed_Cognition?f_ri=4198"},{"id":11119,"name":"User Interface","url":"https://www.academia.edu/Documents/in/User_Interface?f_ri=4198"},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198"},{"id":38072,"name":"Annotation","url":"https://www.academia.edu/Documents/in/Annotation?f_ri=4198"},{"id":57531,"name":"Sampling","url":"https://www.academia.edu/Documents/in/Sampling?f_ri=4198"},{"id":115334,"name":"Wearable computers","url":"https://www.academia.edu/Documents/in/Wearable_computers?f_ri=4198"},{"id":275202,"name":"Wearable Computer","url":"https://www.academia.edu/Documents/in/Wearable_Computer?f_ri=4198"},{"id":2922956,"name":"Psychology and Cognitive Sciences","url":"https://www.academia.edu/Documents/in/Psychology_and_Cognitive_Sciences?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_40905844" data-work_id="40905844" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/40905844/Rapport_de_stage_finale">Rapport de stage finale</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/40905844" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ffd5c080929171f8e43119083a4380b4" rel="nofollow" data-download="{"attachment_id":61194227,"asset_id":40905844,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61194227/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="129904775" href="https://cdac.academia.edu/RabiiJaafari">Rabii Jaafri</a><script data-card-contents-for-user="129904775" type="text/json">{"id":129904775,"first_name":"Rabii","last_name":"Jaafri","domain_name":"cdac","page_name":"RabiiJaafari","display_name":"Rabii Jaafri","profile_url":"https://cdac.academia.edu/RabiiJaafari?f_ri=4198","photo":"https://0.academia-photos.com/129904775/35608280/117389534/s65_rabii.jaafri.jpg"}</script></span></span></li><li class="js-paper-rank-work_40905844 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="40905844"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 40905844, container: ".js-paper-rank-work_40905844", }); });</script></li><li class="js-percentile-work_40905844 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40905844; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_40905844"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_40905844 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="40905844"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40905844; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40905844]").text(description); $(".js-view-count-work_40905844").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_40905844").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="40905844"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="490" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Systems_Business_Informatics_">Information Systems (Business Informatics)</a>, <script data-card-contents-for-ri="490" type="text/json">{"id":490,"name":"Information Systems (Business Informatics)","url":"https://www.academia.edu/Documents/in/Information_Systems_Business_Informatics_?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="748" rel="nofollow" href="https://www.academia.edu/Documents/in/Financial_Economics">Financial Economics</a>, <script data-card-contents-for-ri="748" type="text/json">{"id":748,"name":"Financial Economics","url":"https://www.academia.edu/Documents/in/Financial_Economics?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5009" rel="nofollow" href="https://www.academia.edu/Documents/in/Strategic_Management">Strategic Management</a><script data-card-contents-for-ri="5009" type="text/json">{"id":5009,"name":"Strategic Management","url":"https://www.academia.edu/Documents/in/Strategic_Management?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=40905844]'), work: {"id":40905844,"title":"Rapport de stage finale","created_at":"2019-11-12T07:44:17.375-08:00","url":"https://www.academia.edu/40905844/Rapport_de_stage_finale?f_ri=4198","dom_id":"work_40905844","summary":null,"downloadable_attachments":[{"id":61194227,"asset_id":40905844,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":129904775,"first_name":"Rabii","last_name":"Jaafri","domain_name":"cdac","page_name":"RabiiJaafari","display_name":"Rabii Jaafri","profile_url":"https://cdac.academia.edu/RabiiJaafari?f_ri=4198","photo":"https://0.academia-photos.com/129904775/35608280/117389534/s65_rabii.jaafri.jpg"}],"research_interests":[{"id":490,"name":"Information Systems (Business Informatics)","url":"https://www.academia.edu/Documents/in/Information_Systems_Business_Informatics_?f_ri=4198","nofollow":true},{"id":748,"name":"Financial Economics","url":"https://www.academia.edu/Documents/in/Financial_Economics?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":5009,"name":"Strategic Management","url":"https://www.academia.edu/Documents/in/Strategic_Management?f_ri=4198","nofollow":true},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36816907" data-work_id="36816907" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36816907/The_effect_of_cellphones_on_attention_and_learning_The_influences_of_time_distraction_and_nomophobia">The effect of cellphones on attention and learning: The influences of time, distraction, and nomophobia</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Excessive cellphone use impacts attention and learning in classrooms. Given that attention declines over time, we investigated when during lecture cellphones might impair learning. Across two experiments, participants watched a 20-min... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36816907" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Excessive cellphone use impacts attention and learning in classrooms. Given that attention declines over time, we investigated when during lecture cellphones might impair learning. Across two experiments, participants watched a 20-min lecture under different cellphone conditions (keep or remove). Groups who kept their cellphones received distracting text messages during the lecture. Participants were quizzed on the lecture. Quiz questions were divided into four segments depending on when the material was presented. Lastly, participants' nomophobiadthe fear of being without access to one's cellpho-nedwas assessed. Participants who kept their cellphone performed worse on the quiz for material presented in the 3rd quarter of the lecture than those without cellphones. Distracted participants performed worse on the test for the same material than those who were not distracted. Participants higher in nomophobia, especially on subscales having to do with losing connectedness and giving up convenience , performed worse on the quiz for material that occurred in the 3rd quarter of the lecture. Findings indicate that having cellphones in a short lecture has its largest impact on attention and learning 10 e15 min into the lecture. This study provides novel insights into the interactions between technology and learning to help educators and students optimize learning.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36816907" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4efe2c4b1174c6743f891cb843a4b5bb" rel="nofollow" data-download="{"attachment_id":56767863,"asset_id":36816907,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56767863/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="150070" href="https://binghamton.academia.edu/IanMcDonough">Ian McDonough</a><script data-card-contents-for-user="150070" type="text/json">{"id":150070,"first_name":"Ian","last_name":"McDonough","domain_name":"binghamton","page_name":"IanMcDonough","display_name":"Ian McDonough","profile_url":"https://binghamton.academia.edu/IanMcDonough?f_ri=4198","photo":"https://0.academia-photos.com/150070/39609/64764332/s65_ian.mcdonough.jpg"}</script></span></span></li><li class="js-paper-rank-work_36816907 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36816907"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36816907, container: ".js-paper-rank-work_36816907", }); });</script></li><li class="js-percentile-work_36816907 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36816907; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36816907"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36816907 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36816907"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36816907; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36816907]").text(description); $(".js-view-count-work_36816907").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36816907").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36816907"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3457" rel="nofollow" href="https://www.academia.edu/Documents/in/Learning_and_Teaching">Learning and Teaching</a>, <script data-card-contents-for-ri="3457" type="text/json">{"id":3457,"name":"Learning and Teaching","url":"https://www.academia.edu/Documents/in/Learning_and_Teaching?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8202" rel="nofollow" href="https://www.academia.edu/Documents/in/Cell_Phones">Cell Phones</a>, <script data-card-contents-for-ri="8202" type="text/json">{"id":8202,"name":"Cell Phones","url":"https://www.academia.edu/Documents/in/Cell_Phones?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="18390" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Phones">Mobile Phones</a><script data-card-contents-for-ri="18390" type="text/json">{"id":18390,"name":"Mobile Phones","url":"https://www.academia.edu/Documents/in/Mobile_Phones?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36816907]'), work: {"id":36816907,"title":"The effect of cellphones on attention and learning: The influences of time, distraction, and nomophobia","created_at":"2018-06-10T12:47:44.618-07:00","url":"https://www.academia.edu/36816907/The_effect_of_cellphones_on_attention_and_learning_The_influences_of_time_distraction_and_nomophobia?f_ri=4198","dom_id":"work_36816907","summary":"Excessive cellphone use impacts attention and learning in classrooms. Given that attention declines over time, we investigated when during lecture cellphones might impair learning. Across two experiments, participants watched a 20-min lecture under different cellphone conditions (keep or remove). Groups who kept their cellphones received distracting text messages during the lecture. Participants were quizzed on the lecture. Quiz questions were divided into four segments depending on when the material was presented. Lastly, participants' nomophobiadthe fear of being without access to one's cellpho-nedwas assessed. Participants who kept their cellphone performed worse on the quiz for material presented in the 3rd quarter of the lecture than those without cellphones. Distracted participants performed worse on the test for the same material than those who were not distracted. Participants higher in nomophobia, especially on subscales having to do with losing connectedness and giving up convenience , performed worse on the quiz for material that occurred in the 3rd quarter of the lecture. Findings indicate that having cellphones in a short lecture has its largest impact on attention and learning 10 e15 min into the lecture. This study provides novel insights into the interactions between technology and learning to help educators and students optimize learning.","downloadable_attachments":[{"id":56767863,"asset_id":36816907,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":150070,"first_name":"Ian","last_name":"McDonough","domain_name":"binghamton","page_name":"IanMcDonough","display_name":"Ian McDonough","profile_url":"https://binghamton.academia.edu/IanMcDonough?f_ri=4198","photo":"https://0.academia-photos.com/150070/39609/64764332/s65_ian.mcdonough.jpg"}],"research_interests":[{"id":3457,"name":"Learning and Teaching","url":"https://www.academia.edu/Documents/in/Learning_and_Teaching?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":8202,"name":"Cell Phones","url":"https://www.academia.edu/Documents/in/Cell_Phones?f_ri=4198","nofollow":true},{"id":18390,"name":"Mobile Phones","url":"https://www.academia.edu/Documents/in/Mobile_Phones?f_ri=4198","nofollow":true},{"id":397542,"name":"Cellphone","url":"https://www.academia.edu/Documents/in/Cellphone?f_ri=4198"},{"id":737450,"name":"The Effect of Using Cellphone of Student","url":"https://www.academia.edu/Documents/in/The_Effect_of_Using_Cellphone_of_Student?f_ri=4198"},{"id":1194127,"name":"Nomophobia","url":"https://www.academia.edu/Documents/in/Nomophobia?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_77625372" data-work_id="77625372" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/77625372/Comparison_of_Deep_Learning_Techniques_for_Classification_of_the_Insects_in_Order_Level_With_Mobile_Software_Application">Comparison of Deep Learning Techniques for Classification of the Insects in Order Level With Mobile Software Application</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Insects are a class of the arthropod branch and the most crowded animal group in terms of species and taxonomy. Due to destruction and forest fires, some insect species could go extinct without being detected. Identifying new insects and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_77625372" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Insects are a class of the arthropod branch and the most crowded animal group in terms of species and taxonomy. Due to destruction and forest fires, some insect species could go extinct without being detected. Identifying new insects and having knowledge about insects in terms of biodiversity will contribute positively to the studies carried out, especially in entomology, agriculture, the pharmaceutical industry, medicine, robotics, and other branches. In this study, we produced a mobile-based decision support software with a deep learning model to classify and detect insects at the order level. We also presented the comparative analysis results of SSD MobileNET, YoloV4, and Faster R-CNN InceptionV3 deep learning methods and adapting processes for order-level insect classification. Our approach studies the suitability of existing models towards such an objective, and we conclude that Faster R-CNN InceptionV3 performs the best at classifying and detecting insects at the order level. In addition, we shared 25820 training and 1500 test data in the kaggle database in order to contribute studies to be carried out in this area. As a result, we believe that this research will be beneficial to entomologists, naturalists, and other researchers in related fields.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/77625372" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="58c7d1cc693de6e95fb3b3676e56e939" rel="nofollow" data-download="{"attachment_id":84944612,"asset_id":77625372,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84944612/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="148315141" href="https://independent.academia.edu/SelmanKu">Selman Kunduraci</a><script data-card-contents-for-user="148315141" type="text/json">{"id":148315141,"first_name":"Selman","last_name":"Kunduraci","domain_name":"independent","page_name":"SelmanKu","display_name":"Selman Kunduraci","profile_url":"https://independent.academia.edu/SelmanKu?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_77625372 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="77625372"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 77625372, container: ".js-paper-rank-work_77625372", }); });</script></li><li class="js-percentile-work_77625372 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 77625372; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_77625372"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_77625372 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="77625372"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 77625372; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=77625372]").text(description); $(".js-view-count-work_77625372").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_77625372").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="77625372"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2008" rel="nofollow" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>, <script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="81182" rel="nofollow" href="https://www.academia.edu/Documents/in/Deep_Learning">Deep Learning</a>, <script data-card-contents-for-ri="81182" type="text/json">{"id":81182,"name":"Deep Learning","url":"https://www.academia.edu/Documents/in/Deep_Learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="537085" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Software">Mobile Software</a><script data-card-contents-for-ri="537085" type="text/json">{"id":537085,"name":"Mobile Software","url":"https://www.academia.edu/Documents/in/Mobile_Software?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=77625372]'), work: {"id":77625372,"title":"Comparison of Deep Learning Techniques for Classification of the Insects in Order Level With Mobile Software Application","created_at":"2022-04-25T22:20:35.039-07:00","url":"https://www.academia.edu/77625372/Comparison_of_Deep_Learning_Techniques_for_Classification_of_the_Insects_in_Order_Level_With_Mobile_Software_Application?f_ri=4198","dom_id":"work_77625372","summary":"Insects are a class of the arthropod branch and the most crowded animal group in terms of species and taxonomy. Due to destruction and forest fires, some insect species could go extinct without being detected. Identifying new insects and having knowledge about insects in terms of biodiversity will contribute positively to the studies carried out, especially in entomology, agriculture, the pharmaceutical industry, medicine, robotics, and other branches. In this study, we produced a mobile-based decision support software with a deep learning model to classify and detect insects at the order level. We also presented the comparative analysis results of SSD MobileNET, YoloV4, and Faster R-CNN InceptionV3 deep learning methods and adapting processes for order-level insect classification. Our approach studies the suitability of existing models towards such an objective, and we conclude that Faster R-CNN InceptionV3 performs the best at classifying and detecting insects at the order level. In addition, we shared 25820 training and 1500 test data in the kaggle database in order to contribute studies to be carried out in this area. As a result, we believe that this research will be beneficial to entomologists, naturalists, and other researchers in related fields.","downloadable_attachments":[{"id":84944612,"asset_id":77625372,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":148315141,"first_name":"Selman","last_name":"Kunduraci","domain_name":"independent","page_name":"SelmanKu","display_name":"Selman Kunduraci","profile_url":"https://independent.academia.edu/SelmanKu?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":81182,"name":"Deep Learning","url":"https://www.academia.edu/Documents/in/Deep_Learning?f_ri=4198","nofollow":true},{"id":537085,"name":"Mobile Software","url":"https://www.academia.edu/Documents/in/Mobile_Software?f_ri=4198","nofollow":true},{"id":3029652,"name":"Detection of Insects","url":"https://www.academia.edu/Documents/in/Detection_of_Insects?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_68066543" data-work_id="68066543" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/68066543/Mobile_experiences_of_historical_place_A_multimodal_analysis_of_emotional_engagement">Mobile experiences of historical place: A multimodal analysis of emotional engagement</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper explores how to research the opportunities for emotional engagement that mobile technologies provide for the design and enactment of learning environments. In the context of mobile technologies that foster location based... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_68066543" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper explores how to research the opportunities for emotional engagement that mobile technologies provide for the design and enactment of learning environments. In the context of mobile technologies that foster location based linking, we make the case for the centrality of in-situ real-time observational research on how emotional engagement unfolds and for the inclusion of bodily aspects of interaction. We propose that multimodal methods offer tools for observing emotion as a central facet of person-environment interaction, and provide an example of these methods put into practice for a study of emotional engagement in mobile history learning. A multimodal analysis of video data from sixteen pairs of 9-10 year olds learning about the WWII history of their local Common is used to illustrate how students’ emotional engagement was supported by their use of mobile devices through: multimodal layering and linking of stimuli; the creation of digital artefacts, and changes in pace. T...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/68066543" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3b28fda06ed62625ca042fa7e8badcfa" rel="nofollow" data-download="{"attachment_id":78677327,"asset_id":68066543,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/78677327/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="83363466" href="https://ioe.academia.edu/Jewitt">Carey Jewitt</a><script data-card-contents-for-user="83363466" type="text/json">{"id":83363466,"first_name":"Carey","last_name":"Jewitt","domain_name":"ioe","page_name":"Jewitt","display_name":"Carey Jewitt","profile_url":"https://ioe.academia.edu/Jewitt?f_ri=4198","photo":"https://0.academia-photos.com/83363466/21293263/20719078/s65_carey.jewitt.jpg"}</script></span></span></li><li class="js-paper-rank-work_68066543 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="68066543"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 68066543, container: ".js-paper-rank-work_68066543", }); });</script></li><li class="js-percentile-work_68066543 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 68066543; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_68066543"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_68066543 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="68066543"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 68066543; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=68066543]").text(description); $(".js-view-count-work_68066543").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_68066543").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="68066543"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="221" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>, <script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="21201" rel="nofollow" href="https://www.academia.edu/Documents/in/Multimodality">Multimodality</a>, <script data-card-contents-for-ri="21201" type="text/json">{"id":21201,"name":"Multimodality","url":"https://www.academia.edu/Documents/in/Multimodality?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="23997" rel="nofollow" href="https://www.academia.edu/Documents/in/HCI">HCI</a><script data-card-contents-for-ri="23997" type="text/json">{"id":23997,"name":"HCI","url":"https://www.academia.edu/Documents/in/HCI?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=68066543]'), work: {"id":68066543,"title":"Mobile experiences of historical place: A multimodal analysis of emotional engagement","created_at":"2022-01-14T01:02:00.647-08:00","url":"https://www.academia.edu/68066543/Mobile_experiences_of_historical_place_A_multimodal_analysis_of_emotional_engagement?f_ri=4198","dom_id":"work_68066543","summary":"This paper explores how to research the opportunities for emotional engagement that mobile technologies provide for the design and enactment of learning environments. In the context of mobile technologies that foster location based linking, we make the case for the centrality of in-situ real-time observational research on how emotional engagement unfolds and for the inclusion of bodily aspects of interaction. We propose that multimodal methods offer tools for observing emotion as a central facet of person-environment interaction, and provide an example of these methods put into practice for a study of emotional engagement in mobile history learning. A multimodal analysis of video data from sixteen pairs of 9-10 year olds learning about the WWII history of their local Common is used to illustrate how students’ emotional engagement was supported by their use of mobile devices through: multimodal layering and linking of stimuli; the creation of digital artefacts, and changes in pace. T...","downloadable_attachments":[{"id":78677327,"asset_id":68066543,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":83363466,"first_name":"Carey","last_name":"Jewitt","domain_name":"ioe","page_name":"Jewitt","display_name":"Carey Jewitt","profile_url":"https://ioe.academia.edu/Jewitt?f_ri=4198","photo":"https://0.academia-photos.com/83363466/21293263/20719078/s65_carey.jewitt.jpg"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":21201,"name":"Multimodality","url":"https://www.academia.edu/Documents/in/Multimodality?f_ri=4198","nofollow":true},{"id":23997,"name":"HCI","url":"https://www.academia.edu/Documents/in/HCI?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4514987" data-work_id="4514987" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4514987/Learning_Mobile_enabled_Educational_Technology">Learning Mobile enabled Educational Technology</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The proposed paper will exemplify the dynamics of M-learning and its pedagogical implications within the Indian rural education ecology. This study seeks to benefit various stakeholders in the education, telecom, rural industry and policy... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_4514987" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The proposed paper will exemplify the dynamics of M-learning and its pedagogical implications within the Indian rural education ecology. This study seeks to benefit various stakeholders in the education, telecom, rural industry and policy making sectors by providing meaningful insight into the macro and micro challenges and proposing innovative application, service and system solutions to address the same.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4514987" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8d300409126773254f6ec111a68b2bf6" rel="nofollow" data-download="{"attachment_id":31906974,"asset_id":4514987,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31906974/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5607928" href="https://independent.academia.edu/DivyaDatta">Divya Datta</a><script data-card-contents-for-user="5607928" type="text/json">{"id":5607928,"first_name":"Divya","last_name":"Datta","domain_name":"independent","page_name":"DivyaDatta","display_name":"Divya Datta","profile_url":"https://independent.academia.edu/DivyaDatta?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_4514987 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4514987"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4514987, container: ".js-paper-rank-work_4514987", }); });</script></li><li class="js-percentile-work_4514987 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4514987; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4514987"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4514987 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4514987"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4514987; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4514987]").text(description); $(".js-view-count-work_4514987").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4514987").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4514987"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="922" rel="nofollow" href="https://www.academia.edu/Documents/in/Education">Education</a>, <script data-card-contents-for-ri="922" type="text/json">{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2606" rel="nofollow" href="https://www.academia.edu/Documents/in/Innovation_statistics">Innovation statistics</a>, <script data-card-contents-for-ri="2606" type="text/json">{"id":2606,"name":"Innovation statistics","url":"https://www.academia.edu/Documents/in/Innovation_statistics?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4514987]'), work: {"id":4514987,"title":"Learning Mobile enabled Educational Technology","created_at":"2013-09-17T17:25:26.672-07:00","url":"https://www.academia.edu/4514987/Learning_Mobile_enabled_Educational_Technology?f_ri=4198","dom_id":"work_4514987","summary":"The proposed paper will exemplify the dynamics of M-learning and its pedagogical implications within the Indian rural education ecology. This study seeks to benefit various stakeholders in the education, telecom, rural industry and policy making sectors by providing meaningful insight into the macro and micro challenges and proposing innovative application, service and system solutions to address the same.","downloadable_attachments":[{"id":31906974,"asset_id":4514987,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5607928,"first_name":"Divya","last_name":"Datta","domain_name":"independent","page_name":"DivyaDatta","display_name":"Divya Datta","profile_url":"https://independent.academia.edu/DivyaDatta?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=4198","nofollow":true},{"id":2606,"name":"Innovation statistics","url":"https://www.academia.edu/Documents/in/Innovation_statistics?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_75875648" data-work_id="75875648" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/75875648/English_Students_Perceptions_of_Using_WhatsApp_in_Paragraph_Writing_Class">English Students' Perceptions of Using WhatsApp in Paragraph Writing Class</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This research aims to investigate English students&#39; perceptions of using WhatsApp in paragraph writing class in one public university. Paragraph writing class is a part of language disciplines which may get some benefits from the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_75875648" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This research aims to investigate English students&#39; perceptions of using WhatsApp in paragraph writing class in one public university. Paragraph writing class is a part of language disciplines which may get some benefits from the usage of SNS. This qualitative research with a case study approach explores the perceptions of English students on the benefits and limitations of using WhatsApp during their learning activities. There were six participants in this research that the researcher got through purposive sampling; two students who got high, average, and low score of pre-test. The data were collected through questionnaire and interview. The data were analyzed in three major themes; 1. General background of the participants using WhatsApp, 2. Benefits of WhatsApp in paragraph writing class, and 3. Limitations of WhatsApp in paragraph writing class. The findings of the current research indicate that there were positive perceptions of the students in using WhatsApp in paragraph w...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/75875648" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="100672429" href="https://independent.academia.edu/nurulfadilah246">nurul fadilah</a><script data-card-contents-for-user="100672429" type="text/json">{"id":100672429,"first_name":"nurul","last_name":"fadilah","domain_name":"independent","page_name":"nurulfadilah246","display_name":"nurul fadilah","profile_url":"https://independent.academia.edu/nurulfadilah246?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_75875648 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="75875648"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 75875648, container: ".js-paper-rank-work_75875648", }); });</script></li><li class="js-percentile-work_75875648 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 75875648; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_75875648"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_75875648 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="75875648"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 75875648; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=75875648]").text(description); $(".js-view-count-work_75875648").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_75875648").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="75875648"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">17</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1003" rel="nofollow" href="https://www.academia.edu/Documents/in/Educational_Technology">Educational Technology</a>, <script data-card-contents-for-ri="1003" type="text/json">{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1007" rel="nofollow" href="https://www.academia.edu/Documents/in/Teaching_English_as_a_Second_Language">Teaching English as a Second Language</a>, <script data-card-contents-for-ri="1007" type="text/json">{"id":1007,"name":"Teaching English as a Second Language","url":"https://www.academia.edu/Documents/in/Teaching_English_as_a_Second_Language?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1601" rel="nofollow" href="https://www.academia.edu/Documents/in/Teacher_Education">Teacher Education</a>, <script data-card-contents-for-ri="1601" type="text/json">{"id":1601,"name":"Teacher Education","url":"https://www.academia.edu/Documents/in/Teacher_Education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3457" rel="nofollow" href="https://www.academia.edu/Documents/in/Learning_and_Teaching">Learning and Teaching</a><script data-card-contents-for-ri="3457" type="text/json">{"id":3457,"name":"Learning and Teaching","url":"https://www.academia.edu/Documents/in/Learning_and_Teaching?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=75875648]'), work: {"id":75875648,"title":"English Students' Perceptions of Using WhatsApp in Paragraph Writing Class","created_at":"2022-04-08T22:44:09.001-07:00","url":"https://www.academia.edu/75875648/English_Students_Perceptions_of_Using_WhatsApp_in_Paragraph_Writing_Class?f_ri=4198","dom_id":"work_75875648","summary":"This research aims to investigate English students\u0026#39; perceptions of using WhatsApp in paragraph writing class in one public university. Paragraph writing class is a part of language disciplines which may get some benefits from the usage of SNS. This qualitative research with a case study approach explores the perceptions of English students on the benefits and limitations of using WhatsApp during their learning activities. There were six participants in this research that the researcher got through purposive sampling; two students who got high, average, and low score of pre-test. The data were collected through questionnaire and interview. The data were analyzed in three major themes; 1. General background of the participants using WhatsApp, 2. Benefits of WhatsApp in paragraph writing class, and 3. Limitations of WhatsApp in paragraph writing class. The findings of the current research indicate that there were positive perceptions of the students in using WhatsApp in paragraph w...","downloadable_attachments":[],"ordered_authors":[{"id":100672429,"first_name":"nurul","last_name":"fadilah","domain_name":"independent","page_name":"nurulfadilah246","display_name":"nurul fadilah","profile_url":"https://independent.academia.edu/nurulfadilah246?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=4198","nofollow":true},{"id":1007,"name":"Teaching English as a Second Language","url":"https://www.academia.edu/Documents/in/Teaching_English_as_a_Second_Language?f_ri=4198","nofollow":true},{"id":1601,"name":"Teacher Education","url":"https://www.academia.edu/Documents/in/Teacher_Education?f_ri=4198","nofollow":true},{"id":3457,"name":"Learning and Teaching","url":"https://www.academia.edu/Documents/in/Learning_and_Teaching?f_ri=4198","nofollow":true},{"id":3979,"name":"English language","url":"https://www.academia.edu/Documents/in/English_language?f_ri=4198"},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":6223,"name":"English","url":"https://www.academia.edu/Documents/in/English?f_ri=4198"},{"id":7210,"name":"Technology in Teacher Education","url":"https://www.academia.edu/Documents/in/Technology_in_Teacher_Education?f_ri=4198"},{"id":15439,"name":"Teaching English As A Foreign Language","url":"https://www.academia.edu/Documents/in/Teaching_English_As_A_Foreign_Language?f_ri=4198"},{"id":46596,"name":"English language teaching","url":"https://www.academia.edu/Documents/in/English_language_teaching?f_ri=4198"},{"id":47979,"name":"Educational Technologies","url":"https://www.academia.edu/Documents/in/Educational_Technologies?f_ri=4198"},{"id":51126,"name":"English Education","url":"https://www.academia.edu/Documents/in/English_Education?f_ri=4198"},{"id":99517,"name":"English as a Foreign Language (EFL)","url":"https://www.academia.edu/Documents/in/English_as_a_Foreign_Language_EFL_?f_ri=4198"},{"id":255429,"name":"Technology \u0026 Scientific Breakthroughs","url":"https://www.academia.edu/Documents/in/Technology_and_Scientific_Breakthroughs?f_ri=4198"},{"id":620077,"name":"English Language Teaching","url":"https://www.academia.edu/Documents/in/English_Language_Teaching-1?f_ri=4198"},{"id":624707,"name":"English Language","url":"https://www.academia.edu/Documents/in/English_Language-2?f_ri=4198"},{"id":1215270,"name":"ICT In Teaching and Learning English Language","url":"https://www.academia.edu/Documents/in/ICT_In_Teaching_and_Learning_English_Language-1?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_73932150 coauthored" data-work_id="73932150" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/73932150/Exploring_the_potential_of_applying_information_and_communication_technology_among_the_farming_community_in_Malaysia">Exploring the potential of applying information and communication technology among the farming community in Malaysia</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Context. The arctic ground squirrel (Urocitellus parryii) comprised 17% of the biomass of herbivores in the Yukon boreal forest during the summer months from 1987 to 1996 and was responsible for 23% of the energy flow at the herbivore... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_73932150" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Context. The arctic ground squirrel (Urocitellus parryii) comprised 17% of the biomass of herbivores in the Yukon boreal forest during the summer months from 1987 to 1996 and was responsible for 23% of the energy flow at the herbivore level. By 2000, ground squirrel populations in this region collapsed to nearly zero and have remained there. Aims. We summarise the population monitoring (since 1975) and recent experimental work that has been done on this key herbivore in the Kluane area of the southern Yukon to test one mechanistic hypothesis as the possible explanation for this population collapse and subsequent lack of recovery: predation. Methods. Ground squirrels are the preferred summer prey of bird and mammal predators when snowshoe hare (Lepus americanus) populations are declining. We used translocations into formerly occupied habitat and radiotelemetry to determine movements and causes of death from 2009 to 2014. We surveyed 158 sites between 2008 and 2013 to measure the disappearance of colonies in alpine and forest habitats over 25 000 km 2. Key results. Ground squirrels from 2000 to 2013 comprised a small fraction of the herbivore biomass in the boreal forest zone, down from 17% earlier. Most forest populations (~95%) are currently extinct, whereas just over half (65%) of low-elevation meadow populations are locally extinct. One hypothesis is that ground squirrels in the forest have been driven into a predator pit from which they cannot recover. They remain abundant in alpine tundra (93% occupancy rate) and around airport runways and human habitations (97% occupancy), but there is no apparent dispersal from alpine areas down into the boreal forest. Conclusion. The predator pit hypothesis is a likely explanation for the initial collapse and sustained decline in population size from 2000 to 2013. Recent attenuation of the hare cycle and milder winter climate have allowed shrubs to expand throughout the forest, thereby reducing visibility and increasing predation risk. This conclusion will be tested in further research using reintroductions to formerly occupied sites. Implication. If the loss of this herbivore from the boreal forest is not reversed, predator pressure on the other major herbivores of the montane forest zone is likely to change significantly.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/73932150" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4208d477e2ae957f244bccc947076bfe" rel="nofollow" data-download="{"attachment_id":82268962,"asset_id":73932150,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82268962/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="217863257" href="https://independent.academia.edu/MalimNurul">Nurul Malim</a><script data-card-contents-for-user="217863257" type="text/json">{"id":217863257,"first_name":"Nurul","last_name":"Malim","domain_name":"independent","page_name":"MalimNurul","display_name":"Nurul Malim","profile_url":"https://independent.academia.edu/MalimNurul?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-73932150">+1</span><div class="hidden js-additional-users-73932150"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/HengLee8">Heng Lee</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-73932150'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-73932150').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_73932150 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="73932150"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 73932150, container: ".js-paper-rank-work_73932150", }); });</script></li><li class="js-percentile-work_73932150 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 73932150; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_73932150"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_73932150 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="73932150"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 73932150; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=73932150]").text(description); $(".js-view-count-work_73932150").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_73932150").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="73932150"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="859" rel="nofollow" href="https://www.academia.edu/Documents/in/Communication">Communication</a>, <script data-card-contents-for-ri="859" type="text/json">{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=73932150]'), work: {"id":73932150,"title":"Exploring the potential of applying information and communication technology among the farming community in Malaysia","created_at":"2022-03-17T01:31:35.396-07:00","url":"https://www.academia.edu/73932150/Exploring_the_potential_of_applying_information_and_communication_technology_among_the_farming_community_in_Malaysia?f_ri=4198","dom_id":"work_73932150","summary":"Context. The arctic ground squirrel (Urocitellus parryii) comprised 17% of the biomass of herbivores in the Yukon boreal forest during the summer months from 1987 to 1996 and was responsible for 23% of the energy flow at the herbivore level. By 2000, ground squirrel populations in this region collapsed to nearly zero and have remained there. Aims. We summarise the population monitoring (since 1975) and recent experimental work that has been done on this key herbivore in the Kluane area of the southern Yukon to test one mechanistic hypothesis as the possible explanation for this population collapse and subsequent lack of recovery: predation. Methods. Ground squirrels are the preferred summer prey of bird and mammal predators when snowshoe hare (Lepus americanus) populations are declining. We used translocations into formerly occupied habitat and radiotelemetry to determine movements and causes of death from 2009 to 2014. We surveyed 158 sites between 2008 and 2013 to measure the disappearance of colonies in alpine and forest habitats over 25 000 km 2. Key results. Ground squirrels from 2000 to 2013 comprised a small fraction of the herbivore biomass in the boreal forest zone, down from 17% earlier. Most forest populations (~95%) are currently extinct, whereas just over half (65%) of low-elevation meadow populations are locally extinct. One hypothesis is that ground squirrels in the forest have been driven into a predator pit from which they cannot recover. They remain abundant in alpine tundra (93% occupancy rate) and around airport runways and human habitations (97% occupancy), but there is no apparent dispersal from alpine areas down into the boreal forest. Conclusion. The predator pit hypothesis is a likely explanation for the initial collapse and sustained decline in population size from 2000 to 2013. Recent attenuation of the hare cycle and milder winter climate have allowed shrubs to expand throughout the forest, thereby reducing visibility and increasing predation risk. This conclusion will be tested in further research using reintroductions to formerly occupied sites. Implication. If the loss of this herbivore from the boreal forest is not reversed, predator pressure on the other major herbivores of the montane forest zone is likely to change significantly.","downloadable_attachments":[{"id":82268962,"asset_id":73932150,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":217863257,"first_name":"Nurul","last_name":"Malim","domain_name":"independent","page_name":"MalimNurul","display_name":"Nurul Malim","profile_url":"https://independent.academia.edu/MalimNurul?f_ri=4198","photo":"/images/s65_no_pic.png"},{"id":219013752,"first_name":"Heng","last_name":"Lee","domain_name":"independent","page_name":"HengLee8","display_name":"Heng Lee","profile_url":"https://independent.academia.edu/HengLee8?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":10225,"name":"Agriculture","url":"https://www.academia.edu/Documents/in/Agriculture?f_ri=4198"},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE?f_ri=4198"},{"id":142536,"name":"Crops","url":"https://www.academia.edu/Documents/in/Crops?f_ri=4198"},{"id":1191356,"name":"Internet","url":"https://www.academia.edu/Documents/in/Internet?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_58281840" data-work_id="58281840" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/58281840/Examining_cognitive_function_across_the_lifespan_using_a_mobile_application">Examining cognitive function across the lifespan using a mobile application</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Many studies conducted in a laboratory or university setting are limited by funding, personnel, space, and time constraints. In the present study, we introduce a method of data collection using a mobile application that circumvents these... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_58281840" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Many studies conducted in a laboratory or university setting are limited by funding, personnel, space, and time constraints. In the present study, we introduce a method of data collection using a mobile application that circumvents these typical experiment administration issues. Using the application, we examined cross-sectional age differences in cognitive function. We obtained data from more than 15,000 participants and replicated specific patterns of age-related differences in cognition. Using a subset of these ...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/58281840" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="397c10360bd0bdb178c321d5f82aa49b" rel="nofollow" data-download="{"attachment_id":72770385,"asset_id":58281840,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/72770385/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="129069748" href="https://illinois.academia.edu/HyunkyuLee">Hyunkyu Lee</a><script data-card-contents-for-user="129069748" type="text/json">{"id":129069748,"first_name":"Hyunkyu","last_name":"Lee","domain_name":"illinois","page_name":"HyunkyuLee","display_name":"Hyunkyu Lee","profile_url":"https://illinois.academia.edu/HyunkyuLee?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_58281840 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="58281840"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 58281840, container: ".js-paper-rank-work_58281840", }); });</script></li><li class="js-percentile-work_58281840 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 58281840; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_58281840"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_58281840 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="58281840"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 58281840; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=58281840]").text(description); $(".js-view-count-work_58281840").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_58281840").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="58281840"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">13</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="161" rel="nofollow" href="https://www.academia.edu/Documents/in/Neuroscience">Neuroscience</a>, <script data-card-contents-for-ri="161" type="text/json">{"id":161,"name":"Neuroscience","url":"https://www.academia.edu/Documents/in/Neuroscience?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="221" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>, <script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="237" rel="nofollow" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a><script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=58281840]'), work: {"id":58281840,"title":"Examining cognitive function across the lifespan using a mobile application","created_at":"2021-10-15T22:26:01.895-07:00","url":"https://www.academia.edu/58281840/Examining_cognitive_function_across_the_lifespan_using_a_mobile_application?f_ri=4198","dom_id":"work_58281840","summary":"Many studies conducted in a laboratory or university setting are limited by funding, personnel, space, and time constraints. In the present study, we introduce a method of data collection using a mobile application that circumvents these typical experiment administration issues. Using the application, we examined cross-sectional age differences in cognitive function. We obtained data from more than 15,000 participants and replicated specific patterns of age-related differences in cognition. Using a subset of these ...","downloadable_attachments":[{"id":72770385,"asset_id":58281840,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":129069748,"first_name":"Hyunkyu","last_name":"Lee","domain_name":"illinois","page_name":"HyunkyuLee","display_name":"Hyunkyu Lee","profile_url":"https://illinois.academia.edu/HyunkyuLee?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=4198","nofollow":true},{"id":161,"name":"Neuroscience","url":"https://www.academia.edu/Documents/in/Neuroscience?f_ri=4198","nofollow":true},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=4198","nofollow":true},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":6791,"name":"Aging","url":"https://www.academia.edu/Documents/in/Aging?f_ri=4198"},{"id":21548,"name":"Cognitive Neuroscience","url":"https://www.academia.edu/Documents/in/Cognitive_Neuroscience?f_ri=4198"},{"id":26399,"name":"Aging \u0026 the life course","url":"https://www.academia.edu/Documents/in/Aging_and_the_life_course?f_ri=4198"},{"id":33732,"name":"Executive Function","url":"https://www.academia.edu/Documents/in/Executive_Function?f_ri=4198"},{"id":33733,"name":"Cognitive Aging","url":"https://www.academia.edu/Documents/in/Cognitive_Aging?f_ri=4198"},{"id":40118,"name":"Mobile Health","url":"https://www.academia.edu/Documents/in/Mobile_Health?f_ri=4198"},{"id":135185,"name":"Exercise","url":"https://www.academia.edu/Documents/in/Exercise?f_ri=4198"},{"id":1011475,"name":"Computers In Human Behavior","url":"https://www.academia.edu/Documents/in/Computers_In_Human_Behavior?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_50808072" data-work_id="50808072" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/50808072/Mobile_banking_and_economic_development_linking_adoption_impact_and_use">Mobile banking and economic development: linking adoption, impact, and use</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Around the globe, various initiatives use the mobile phone to provide financial services to those without access to traditional banks. Yet relatively little scholarly research explores the use of these m-banking/m-payments systems. This... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_50808072" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Around the globe, various initiatives use the mobile phone to provide financial services to those without access to traditional banks. Yet relatively little scholarly research explores the use of these m-banking/m-payments systems. This paper calls attention to this gap in the research literature, emphasizing the need for research focusing on the context(s) of m-banking/mpayments use. Presenting illustrative data from exploratory work with small enterprises in urban India, it argues that contextual research is a critical input to effective "adoption" or "impact" research. Further, it suggests that the challenges of linking studies of use to those of adoption and impact reflect established dynamics within the Information and Communication Technologies and Development (ICTD) research community. The paper identifies three crosscutting themes from the broader literature-amplification vs. change, simultaneous causality, and a multidimensional definition of trust-each of which can offer increased theoretical clarity to future research on m-banking/m-payments systems. Notes on contributors Jonathan Donner is a researcher in the Technology for Emerging Markets Group at Microsoft Research, where he studies the social and economic impacts of mobile communication technologies in developing countries. Camilo Tellez is a doctoral student in the department of Information Systems at the London School of Economics and Political Science, where he specializes in IT for development issues. m-banking Pre-publication draft. Edits possible.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/50808072" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="37fd56da54018ab56a79e38388fc151d" rel="nofollow" data-download="{"attachment_id":68673841,"asset_id":50808072,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68673841/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="144016216" href="https://independent.academia.edu/AndresRuedaTellez">Andres Rueda Tellez</a><script data-card-contents-for-user="144016216" type="text/json">{"id":144016216,"first_name":"Andres","last_name":"Rueda Tellez","domain_name":"independent","page_name":"AndresRuedaTellez","display_name":"Andres Rueda Tellez","profile_url":"https://independent.academia.edu/AndresRuedaTellez?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_50808072 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="50808072"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 50808072, container: ".js-paper-rank-work_50808072", }); });</script></li><li class="js-percentile-work_50808072 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 50808072; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_50808072"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_50808072 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="50808072"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 50808072; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=50808072]").text(description); $(".js-view-count-work_50808072").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_50808072").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="50808072"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">17</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6664" rel="nofollow" href="https://www.academia.edu/Documents/in/Adoption">Adoption</a>, <script data-card-contents-for-ri="6664" type="text/json">{"id":6664,"name":"Adoption","url":"https://www.academia.edu/Documents/in/Adoption?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11395" rel="nofollow" href="https://www.academia.edu/Documents/in/Economic_Development">Economic Development</a>, <script data-card-contents-for-ri="11395" type="text/json">{"id":11395,"name":"Economic Development","url":"https://www.academia.edu/Documents/in/Economic_Development?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11584" rel="nofollow" href="https://www.academia.edu/Documents/in/ICT_for_Development">ICT for Development</a><script data-card-contents-for-ri="11584" type="text/json">{"id":11584,"name":"ICT for Development","url":"https://www.academia.edu/Documents/in/ICT_for_Development?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=50808072]'), work: {"id":50808072,"title":"Mobile banking and economic development: linking adoption, impact, and use","created_at":"2021-08-09T13:32:37.249-07:00","url":"https://www.academia.edu/50808072/Mobile_banking_and_economic_development_linking_adoption_impact_and_use?f_ri=4198","dom_id":"work_50808072","summary":"Around the globe, various initiatives use the mobile phone to provide financial services to those without access to traditional banks. Yet relatively little scholarly research explores the use of these m-banking/m-payments systems. This paper calls attention to this gap in the research literature, emphasizing the need for research focusing on the context(s) of m-banking/mpayments use. Presenting illustrative data from exploratory work with small enterprises in urban India, it argues that contextual research is a critical input to effective \"adoption\" or \"impact\" research. Further, it suggests that the challenges of linking studies of use to those of adoption and impact reflect established dynamics within the Information and Communication Technologies and Development (ICTD) research community. The paper identifies three crosscutting themes from the broader literature-amplification vs. change, simultaneous causality, and a multidimensional definition of trust-each of which can offer increased theoretical clarity to future research on m-banking/m-payments systems. Notes on contributors Jonathan Donner is a researcher in the Technology for Emerging Markets Group at Microsoft Research, where he studies the social and economic impacts of mobile communication technologies in developing countries. Camilo Tellez is a doctoral student in the department of Information Systems at the London School of Economics and Political Science, where he specializes in IT for development issues. m-banking Pre-publication draft. Edits possible.","downloadable_attachments":[{"id":68673841,"asset_id":50808072,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":144016216,"first_name":"Andres","last_name":"Rueda Tellez","domain_name":"independent","page_name":"AndresRuedaTellez","display_name":"Andres Rueda Tellez","profile_url":"https://independent.academia.edu/AndresRuedaTellez?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":6664,"name":"Adoption","url":"https://www.academia.edu/Documents/in/Adoption?f_ri=4198","nofollow":true},{"id":11395,"name":"Economic Development","url":"https://www.academia.edu/Documents/in/Economic_Development?f_ri=4198","nofollow":true},{"id":11584,"name":"ICT for Development","url":"https://www.academia.edu/Documents/in/ICT_for_Development?f_ri=4198","nofollow":true},{"id":18035,"name":"Mobile Banking","url":"https://www.academia.edu/Documents/in/Mobile_Banking?f_ri=4198"},{"id":18814,"name":"Information and Communication technology","url":"https://www.academia.edu/Documents/in/Information_and_Communication_technology-1?f_ri=4198"},{"id":59277,"name":"Mobile telephony","url":"https://www.academia.edu/Documents/in/Mobile_telephony?f_ri=4198"},{"id":83315,"name":"Diffusion","url":"https://www.academia.edu/Documents/in/Diffusion?f_ri=4198"},{"id":94661,"name":"Financial Services","url":"https://www.academia.edu/Documents/in/Financial_Services?f_ri=4198"},{"id":142522,"name":"Domestication","url":"https://www.academia.edu/Documents/in/Domestication?f_ri=4198"},{"id":171574,"name":"Payment System","url":"https://www.academia.edu/Documents/in/Payment_System?f_ri=4198"},{"id":217280,"name":"Mobile phone","url":"https://www.academia.edu/Documents/in/Mobile_phone?f_ri=4198"},{"id":235619,"name":"Mobile Banking in Developing Countries","url":"https://www.academia.edu/Documents/in/Mobile_Banking_in_Developing_Countries?f_ri=4198"},{"id":395704,"name":"Communication and media Studies","url":"https://www.academia.edu/Documents/in/Communication_and_media_Studies?f_ri=4198"},{"id":434438,"name":"Small Medium Enterprise","url":"https://www.academia.edu/Documents/in/Small_Medium_Enterprise?f_ri=4198"},{"id":555831,"name":"Asian communication","url":"https://www.academia.edu/Documents/in/Asian_communication?f_ri=4198"},{"id":983454,"name":"Multi Dimensional","url":"https://www.academia.edu/Documents/in/Multi_Dimensional?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43557087 coauthored" data-work_id="43557087" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43557087/MOBILE_APPLICATION_FOR_TEACHING_AND_ASSESSING_STUDENTS_NEEDING_ADDITIONAL_CURRICULAR_SUPPORT_SNACS_IN_DENTAL_EDUCATION">MOBILE APPLICATION FOR TEACHING AND ASSESSING STUDENTS NEEDING ADDITIONAL CURRICULAR SUPPORT (SNACS) IN DENTAL EDUCATION</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The current web 2.0 generation of students are having more technological literacy than their subject literacy. Development of innovative mobile application with different teacher and student interface for teaching and assessment is not... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43557087" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The current web 2.0 generation of students are having more technological literacy than their subject literacy. Development of innovative mobile application with different teacher and student interface for teaching and assessment is not much studied in dental education.The basic requirements needed for a mobile application to be used by the students and the teachers were chosen. The teacher interface was enabled to create and send short study material, assignments and objective type tests. The students' interface was enabled to receive the notifications and answer the objective tests. The teacher would be able to monitor the individual progress of all the enrolled students. The first year undergraduate dental students from a private dental college enrolled and used the app with a mentor on teacher interface. Qualitative analysis of the efficacy of mobile application was studied using questionnaire and focus group discussion. The mobile application "SNACS" was successfully devised. The students used the application for that academic year and gave a positive feedback. The app was found to be more user-friendly and improved the academic performance of the students. It helped them to change their study habits positively.Within the limitations of the study, the mobile application "SNACS" was working effectively in the android mobiles and it helped the Students Needing Additional Curricular Support to improve their academic performance.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43557087" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f5f088ad07fad9ffe9e36511db7ed5ae" rel="nofollow" data-download="{"attachment_id":63864979,"asset_id":43557087,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63864979/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="47028536" href="https://independent.academia.edu/shivasakthy">Shivasakthy Manivasakan</a><script data-card-contents-for-user="47028536" type="text/json">{"id":47028536,"first_name":"Shivasakthy","last_name":"Manivasakan","domain_name":"independent","page_name":"shivasakthy","display_name":"Shivasakthy Manivasakan","profile_url":"https://independent.academia.edu/shivasakthy?f_ri=4198","photo":"https://0.academia-photos.com/47028536/16710322/43665698/s65_shivasakthy.manivasakan.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-43557087">+1</span><div class="hidden js-additional-users-43557087"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/PradeepThangamuthu">Pradeep Thangamuthu</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-43557087'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-43557087').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_43557087 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43557087"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43557087, container: ".js-paper-rank-work_43557087", }); });</script></li><li class="js-percentile-work_43557087 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43557087; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43557087"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43557087 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43557087"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43557087; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43557087]").text(description); $(".js-view-count-work_43557087").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43557087").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43557087"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1609" rel="nofollow" href="https://www.academia.edu/Documents/in/E-learning">E-learning</a>, <script data-card-contents-for-ri="1609" type="text/json">{"id":1609,"name":"E-learning","url":"https://www.academia.edu/Documents/in/E-learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2621" rel="nofollow" href="https://www.academia.edu/Documents/in/Higher_Education">Higher Education</a>, <script data-card-contents-for-ri="2621" type="text/json">{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="65030" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_apps">Mobile apps</a><script data-card-contents-for-ri="65030" type="text/json">{"id":65030,"name":"Mobile apps","url":"https://www.academia.edu/Documents/in/Mobile_apps?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43557087]'), work: {"id":43557087,"title":"MOBILE APPLICATION FOR TEACHING AND ASSESSING STUDENTS NEEDING ADDITIONAL CURRICULAR SUPPORT (SNACS) IN DENTAL EDUCATION","created_at":"2020-07-08T08:51:32.828-07:00","url":"https://www.academia.edu/43557087/MOBILE_APPLICATION_FOR_TEACHING_AND_ASSESSING_STUDENTS_NEEDING_ADDITIONAL_CURRICULAR_SUPPORT_SNACS_IN_DENTAL_EDUCATION?f_ri=4198","dom_id":"work_43557087","summary":"The current web 2.0 generation of students are having more technological literacy than their subject literacy. Development of innovative mobile application with different teacher and student interface for teaching and assessment is not much studied in dental education.The basic requirements needed for a mobile application to be used by the students and the teachers were chosen. The teacher interface was enabled to create and send short study material, assignments and objective type tests. The students' interface was enabled to receive the notifications and answer the objective tests. The teacher would be able to monitor the individual progress of all the enrolled students. The first year undergraduate dental students from a private dental college enrolled and used the app with a mentor on teacher interface. Qualitative analysis of the efficacy of mobile application was studied using questionnaire and focus group discussion. The mobile application \"SNACS\" was successfully devised. The students used the application for that academic year and gave a positive feedback. The app was found to be more user-friendly and improved the academic performance of the students. It helped them to change their study habits positively.Within the limitations of the study, the mobile application \"SNACS\" was working effectively in the android mobiles and it helped the Students Needing Additional Curricular Support to improve their academic performance.","downloadable_attachments":[{"id":63864979,"asset_id":43557087,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":47028536,"first_name":"Shivasakthy","last_name":"Manivasakan","domain_name":"independent","page_name":"shivasakthy","display_name":"Shivasakthy Manivasakan","profile_url":"https://independent.academia.edu/shivasakthy?f_ri=4198","photo":"https://0.academia-photos.com/47028536/16710322/43665698/s65_shivasakthy.manivasakan.jpg"},{"id":164040486,"first_name":"Pradeep","last_name":"Thangamuthu","domain_name":"independent","page_name":"PradeepThangamuthu","display_name":"Pradeep Thangamuthu","profile_url":"https://independent.academia.edu/PradeepThangamuthu?f_ri=4198","photo":"https://gravatar.com/avatar/80a11f9ff58e84616de256674033cea0?s=65"}],"research_interests":[{"id":1609,"name":"E-learning","url":"https://www.academia.edu/Documents/in/E-learning?f_ri=4198","nofollow":true},{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":65030,"name":"Mobile apps","url":"https://www.academia.edu/Documents/in/Mobile_apps?f_ri=4198","nofollow":true},{"id":1462551,"name":"Teachers and Slow Learners","url":"https://www.academia.edu/Documents/in/Teachers_and_Slow_Learners?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_41132260" data-work_id="41132260" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/41132260/Science_Education_and_Mobile_Learning_A_Content_Analysis_Review_of_the_Web_of_Science_Science_Education_and_Mobile_Learning_A_Content_Analysis_Review_of_the_Web_of_Science_database">Science Education and Mobile Learning: A Content Analysis Review of the Web of Science… Science Education and Mobile Learning: A Content Analysis Review of the Web of Science database</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The use of mobile technologies in education has appealed considerable interest and attention from educators and researchers in the last decade. Nonetheless, the effects of mobile learning on students' learning outcome in science education... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_41132260" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The use of mobile technologies in education has appealed considerable interest and attention from educators and researchers in the last decade. Nonetheless, the effects of mobile learning on students' learning outcome in science education are still ambiguous. The time and place flexibility, ubiquity and easy accessibility of mobile devices are among the features that make them valuable in m-learning, especially in science education, at present times. Despite the large number of researches conducted, no bibliometrics study has been carried out in this topic so far. The aim of this review is to assess the progress of international publications in the area of science education and mobile learning. This content analysis review shows the trends in publications regarding mobile learning and science education researches indexed in Web of Science database between years 2004-2019. Out of 57 documents related to the topic of interest found in the database of Web of Science, the results demonstrate that the publication frequency has increased after 2012 where the most productive year was 2016. Most of the published documents were proceedings papers and original articles. Taiwan and United States are the countries with most work published where Pa-kistan, Taiwan and China are the countries that funded the most scientific research. The top journal involving the publications associated with this topic is Computers & Education journal. A more comprehensive criteria has been used in this content analysis which has interpreted in detail. This study can provide a much clear picture of the field to researchers, educational leaders and funders to incorporate new understandings into their research.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/41132260" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="585ae32c918e09955a4ca5456adf7f1d" rel="nofollow" data-download="{"attachment_id":61382242,"asset_id":41132260,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61382242/download_file?st=MTczOTgwMjU5Niw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="117461773" href="https://warwick.academia.edu/MetinOdabasi">Metin Odabasi</a><script data-card-contents-for-user="117461773" type="text/json">{"id":117461773,"first_name":"Metin","last_name":"Odabasi","domain_name":"warwick","page_name":"MetinOdabasi","display_name":"Metin Odabasi","profile_url":"https://warwick.academia.edu/MetinOdabasi?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_41132260 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="41132260"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 41132260, container: ".js-paper-rank-work_41132260", }); });</script></li><li class="js-percentile-work_41132260 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 41132260; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_41132260"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_41132260 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="41132260"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 41132260; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=41132260]").text(description); $(".js-view-count-work_41132260").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_41132260").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="41132260"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="422" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="922" rel="nofollow" href="https://www.academia.edu/Documents/in/Education">Education</a>, <script data-card-contents-for-ri="922" type="text/json">{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1003" rel="nofollow" href="https://www.academia.edu/Documents/in/Educational_Technology">Educational Technology</a>, <script data-card-contents-for-ri="1003" type="text/json">{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1609" rel="nofollow" href="https://www.academia.edu/Documents/in/E-learning">E-learning</a><script data-card-contents-for-ri="1609" type="text/json">{"id":1609,"name":"E-learning","url":"https://www.academia.edu/Documents/in/E-learning?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=41132260]'), work: {"id":41132260,"title":"Science Education and Mobile Learning: A Content Analysis Review of the Web of Science… Science Education and Mobile Learning: A Content Analysis Review of the Web of Science database","created_at":"2019-11-30T06:32:21.355-08:00","url":"https://www.academia.edu/41132260/Science_Education_and_Mobile_Learning_A_Content_Analysis_Review_of_the_Web_of_Science_Science_Education_and_Mobile_Learning_A_Content_Analysis_Review_of_the_Web_of_Science_database?f_ri=4198","dom_id":"work_41132260","summary":"The use of mobile technologies in education has appealed considerable interest and attention from educators and researchers in the last decade. Nonetheless, the effects of mobile learning on students' learning outcome in science education are still ambiguous. The time and place flexibility, ubiquity and easy accessibility of mobile devices are among the features that make them valuable in m-learning, especially in science education, at present times. Despite the large number of researches conducted, no bibliometrics study has been carried out in this topic so far. The aim of this review is to assess the progress of international publications in the area of science education and mobile learning. This content analysis review shows the trends in publications regarding mobile learning and science education researches indexed in Web of Science database between years 2004-2019. Out of 57 documents related to the topic of interest found in the database of Web of Science, the results demonstrate that the publication frequency has increased after 2012 where the most productive year was 2016. Most of the published documents were proceedings papers and original articles. Taiwan and United States are the countries with most work published where Pa-kistan, Taiwan and China are the countries that funded the most scientific research. The top journal involving the publications associated with this topic is Computers \u0026 Education journal. A more comprehensive criteria has been used in this content analysis which has interpreted in detail. This study can provide a much clear picture of the field to researchers, educational leaders and funders to incorporate new understandings into their research.","downloadable_attachments":[{"id":61382242,"asset_id":41132260,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":117461773,"first_name":"Metin","last_name":"Odabasi","domain_name":"warwick","page_name":"MetinOdabasi","display_name":"Metin Odabasi","profile_url":"https://warwick.academia.edu/MetinOdabasi?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=4198","nofollow":true},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=4198","nofollow":true},{"id":1609,"name":"E-learning","url":"https://www.academia.edu/Documents/in/E-learning?f_ri=4198","nofollow":true},{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=4198"},{"id":1763,"name":"Mobile Learning","url":"https://www.academia.edu/Documents/in/Mobile_Learning?f_ri=4198"},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":6426,"name":"Content Analysis","url":"https://www.academia.edu/Documents/in/Content_Analysis?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38945391" data-work_id="38945391" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38945391/SMS_SOS_a_randomized_controlled_trial_to_reduce_self_harm_and_suicide_attempts_using_SMS_text_messaging">SMS SOS: a randomized controlled trial to reduce self-harm and suicide attempts using SMS text messaging</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Background:Hospital-treated deliberate self-harm (DSH) is common, costly and has high repetition rates. Sincebrief contact interventions (BCIs) may reduce the risk of DSH repetition, we aim to evaluate whether a SMS (ShortMessage Service)... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38945391" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Background:Hospital-treated deliberate self-harm (DSH) is common, costly and has high repetition rates. Sincebrief contact interventions (BCIs) may reduce the risk of DSH repetition, we aim to evaluate whether a SMS (ShortMessage Service) text message Intervention plus Treatment As Usual (TAU) compared to TAU alone will reducehospital DSH re-presentation rates in Western Sydney public hospitals in Australia.Methods/design:Our study is a 24-month randomized controlled trial (RCT). Adult patients who present with DSHto hospital emergency, psychiatric, and mental health triage and assessment departments will be randomly assigned toan Intervention condition plus TAU receiving nine SMS text messages at 1, 2, 3, 4, 5, 6, 8, 10 and 12-monthspost-discharge. Each message will contain telephone numbers for two mental health crises support tele-services.Primary outcomes will be the difference in the number of DSH re-presentations, and the time to first re-presentation,within 12-months of discharge.Discussion:This study protocol describes the design and implementation of an RCT using SMS text messages, whichaim to reduce hospital re-presentation rates for DSH. Positive study findings would support the translation ofan SMS-aftercare protocol into mental health services at minimal expense.Trial registration and ethics approval:This trial has been registered with the Australian and New ZealandClinical Trials Registry (Trial registration:ACTRN12617000607370. Registered 28 April 2017) and has beenapproved by two Local Health Districts (LHDs). Western Sydney LHD Human Research Ethics Committeeapproved the study for Westmead Hospital and Blacktown Hospital (Protocol: HREC/16/WMEAD/336). NepeanBlue Mountains LHD Research Governance Office approved the study for Nepean Hospital (SSA/16/Nepean/170).Keywords:Deliberate self-harm, Intentional self-harm, Prevention, Randomized controlled trial, Reattempt, Re-present, Short message service, SMS, Suicide, Text message</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38945391" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="880c836b0f5d1c27aca6e7093990987e" rel="nofollow" data-download="{"attachment_id":59047293,"asset_id":38945391,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59047293/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="57559054" href="https://sydney.academia.edu/TrentHammond">Trent E Hammond</a><script data-card-contents-for-user="57559054" type="text/json">{"id":57559054,"first_name":"Trent","last_name":"Hammond","domain_name":"sydney","page_name":"TrentHammond","display_name":"Trent E Hammond","profile_url":"https://sydney.academia.edu/TrentHammond?f_ri=4198","photo":"https://0.academia-photos.com/57559054/15098558/15810027/s65_trent.hammond.jpg"}</script></span></span></li><li class="js-paper-rank-work_38945391 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38945391"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38945391, container: ".js-paper-rank-work_38945391", }); });</script></li><li class="js-percentile-work_38945391 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38945391; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38945391"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38945391 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38945391"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38945391; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38945391]").text(description); $(".js-view-count-work_38945391").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38945391").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38945391"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2827" rel="nofollow" href="https://www.academia.edu/Documents/in/Mental_Health">Mental Health</a>, <script data-card-contents-for-ri="2827" type="text/json">{"id":2827,"name":"Mental Health","url":"https://www.academia.edu/Documents/in/Mental_Health?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="112818" rel="nofollow" href="https://www.academia.edu/Documents/in/Hospital">Hospital</a>, <script data-card-contents-for-ri="112818" type="text/json">{"id":112818,"name":"Hospital","url":"https://www.academia.edu/Documents/in/Hospital?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2783853" rel="nofollow" href="https://www.academia.edu/Documents/in/Suicide_and_Deliberate_self_harm">Suicide and Deliberate self harm</a><script data-card-contents-for-ri="2783853" type="text/json">{"id":2783853,"name":"Suicide and Deliberate self harm","url":"https://www.academia.edu/Documents/in/Suicide_and_Deliberate_self_harm?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38945391]'), work: {"id":38945391,"title":"SMS SOS: a randomized controlled trial to reduce self-harm and suicide attempts using SMS text messaging","created_at":"2019-04-27T01:59:43.444-07:00","url":"https://www.academia.edu/38945391/SMS_SOS_a_randomized_controlled_trial_to_reduce_self_harm_and_suicide_attempts_using_SMS_text_messaging?f_ri=4198","dom_id":"work_38945391","summary":"Background:Hospital-treated deliberate self-harm (DSH) is common, costly and has high repetition rates. Sincebrief contact interventions (BCIs) may reduce the risk of DSH repetition, we aim to evaluate whether a SMS (ShortMessage Service) text message Intervention plus Treatment As Usual (TAU) compared to TAU alone will reducehospital DSH re-presentation rates in Western Sydney public hospitals in Australia.Methods/design:Our study is a 24-month randomized controlled trial (RCT). Adult patients who present with DSHto hospital emergency, psychiatric, and mental health triage and assessment departments will be randomly assigned toan Intervention condition plus TAU receiving nine SMS text messages at 1, 2, 3, 4, 5, 6, 8, 10 and 12-monthspost-discharge. Each message will contain telephone numbers for two mental health crises support tele-services.Primary outcomes will be the difference in the number of DSH re-presentations, and the time to first re-presentation,within 12-months of discharge.Discussion:This study protocol describes the design and implementation of an RCT using SMS text messages, whichaim to reduce hospital re-presentation rates for DSH. Positive study findings would support the translation ofan SMS-aftercare protocol into mental health services at minimal expense.Trial registration and ethics approval:This trial has been registered with the Australian and New ZealandClinical Trials Registry (Trial registration:ACTRN12617000607370. Registered 28 April 2017) and has beenapproved by two Local Health Districts (LHDs). Western Sydney LHD Human Research Ethics Committeeapproved the study for Westmead Hospital and Blacktown Hospital (Protocol: HREC/16/WMEAD/336). NepeanBlue Mountains LHD Research Governance Office approved the study for Nepean Hospital (SSA/16/Nepean/170).Keywords:Deliberate self-harm, Intentional self-harm, Prevention, Randomized controlled trial, Reattempt, Re-present, Short message service, SMS, Suicide, Text message","downloadable_attachments":[{"id":59047293,"asset_id":38945391,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":57559054,"first_name":"Trent","last_name":"Hammond","domain_name":"sydney","page_name":"TrentHammond","display_name":"Trent E Hammond","profile_url":"https://sydney.academia.edu/TrentHammond?f_ri=4198","photo":"https://0.academia-photos.com/57559054/15098558/15810027/s65_trent.hammond.jpg"}],"research_interests":[{"id":2827,"name":"Mental Health","url":"https://www.academia.edu/Documents/in/Mental_Health?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":112818,"name":"Hospital","url":"https://www.academia.edu/Documents/in/Hospital?f_ri=4198","nofollow":true},{"id":2783853,"name":"Suicide and Deliberate self harm","url":"https://www.academia.edu/Documents/in/Suicide_and_Deliberate_self_harm?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9592587" data-work_id="9592587" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/9592587/Android_Malware_Detection_Using_Parallel_Machine_Learning_Classifiers">Android Malware Detection Using Parallel Machine Learning Classifiers</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms in the mobile... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_9592587" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms in the mobile smart devices market. Recently, a new generation of Android malware families has emerged with advanced evasion capabilities which make them much more difficult to detect using conventional methods. This paper proposes and investigates a parallel machine learning based classification approach for early detection of Android malware. Using real malware samples and benign applications, a composite classification model is developed from parallel combination of heterogeneous classifiers. The empirical evaluation of the model under different combination schemes demonstrates its efficacy and potential to improve detection accuracy. More importantly, by utilizing several classifiers with diverse characteristics, their strengths can be harnessed not only for enhanced Android malware detection but also quicker white box analysis by means of the more interpretable constituent classifiers.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9592587" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="24399784b249375add378c59aa62a93b" rel="nofollow" data-download="{"attachment_id":35803014,"asset_id":9592587,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35803014/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="22349507" href="https://dum.academia.edu/SuleimanYerima">Suleiman Y Yerima</a><script data-card-contents-for-user="22349507" type="text/json">{"id":22349507,"first_name":"Suleiman","last_name":"Yerima","domain_name":"dum","page_name":"SuleimanYerima","display_name":"Suleiman Y Yerima","profile_url":"https://dum.academia.edu/SuleimanYerima?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_9592587 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9592587"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9592587, container: ".js-paper-rank-work_9592587", }); });</script></li><li class="js-percentile-work_9592587 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9592587; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9592587"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9592587 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9592587"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9592587; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9592587]").text(description); $(".js-view-count-work_9592587").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9592587").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9592587"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">19</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2008" rel="nofollow" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>, <script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2009" rel="nofollow" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a>, <script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="10005" rel="nofollow" href="https://www.academia.edu/Documents/in/Applications_of_Machine_Learning">Applications of Machine Learning</a><script data-card-contents-for-ri="10005" type="text/json">{"id":10005,"name":"Applications of Machine Learning","url":"https://www.academia.edu/Documents/in/Applications_of_Machine_Learning?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9592587]'), work: {"id":9592587,"title":"Android Malware Detection Using Parallel Machine Learning Classifiers","created_at":"2014-12-02T06:11:03.529-08:00","url":"https://www.academia.edu/9592587/Android_Malware_Detection_Using_Parallel_Machine_Learning_Classifiers?f_ri=4198","dom_id":"work_9592587","summary":"Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms in the mobile smart devices market. Recently, a new generation of Android malware families has emerged with advanced evasion capabilities which make them much more difficult to detect using conventional methods. This paper proposes and investigates a parallel machine learning based classification approach for early detection of Android malware. Using real malware samples and benign applications, a composite classification model is developed from parallel combination of heterogeneous classifiers. The empirical evaluation of the model under different combination schemes demonstrates its efficacy and potential to improve detection accuracy. More importantly, by utilizing several classifiers with diverse characteristics, their strengths can be harnessed not only for enhanced Android malware detection but also quicker white box analysis by means of the more interpretable constituent classifiers.","downloadable_attachments":[{"id":35803014,"asset_id":9592587,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":22349507,"first_name":"Suleiman","last_name":"Yerima","domain_name":"dum","page_name":"SuleimanYerima","display_name":"Suleiman Y Yerima","profile_url":"https://dum.academia.edu/SuleimanYerima?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=4198","nofollow":true},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":10005,"name":"Applications of Machine Learning","url":"https://www.academia.edu/Documents/in/Applications_of_Machine_Learning?f_ri=4198","nofollow":true},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=4198"},{"id":16090,"name":"Usable Security (Computer Security)","url":"https://www.academia.edu/Documents/in/Usable_Security_Computer_Security_?f_ri=4198"},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198"},{"id":41005,"name":"Malware Analysis","url":"https://www.academia.edu/Documents/in/Malware_Analysis?f_ri=4198"},{"id":49878,"name":"Computer Malware","url":"https://www.academia.edu/Documents/in/Computer_Malware?f_ri=4198"},{"id":57349,"name":"Application Security","url":"https://www.academia.edu/Documents/in/Application_Security?f_ri=4198"},{"id":60329,"name":"Mobile Security","url":"https://www.academia.edu/Documents/in/Mobile_Security?f_ri=4198"},{"id":66882,"name":"Computer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security Ontologies","url":"https://www.academia.edu/Documents/in/Computer_and_Network_Security_Information_Assurance_and_Security_Cyber_Security_Access_Control_in_Co?f_ri=4198"},{"id":78529,"name":"Malware Detection","url":"https://www.academia.edu/Documents/in/Malware_Detection?f_ri=4198"},{"id":143038,"name":"Machine Learning and Pattern Recognition","url":"https://www.academia.edu/Documents/in/Machine_Learning_and_Pattern_Recognition?f_ri=4198"},{"id":266218,"name":"Malware Analysis and Detection","url":"https://www.academia.edu/Documents/in/Malware_Analysis_and_Detection?f_ri=4198"},{"id":299701,"name":"Malware Detection, Internet Security","url":"https://www.academia.edu/Documents/in/Malware_Detection_Internet_Security?f_ri=4198"},{"id":368313,"name":"Mobile malwares","url":"https://www.academia.edu/Documents/in/Mobile_malwares?f_ri=4198"},{"id":372137,"name":"Malware Detection Techniques","url":"https://www.academia.edu/Documents/in/Malware_Detection_Techniques?f_ri=4198"},{"id":1372493,"name":"Malware Analysis Android","url":"https://www.academia.edu/Documents/in/Malware_Analysis_Android?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_76207742" data-work_id="76207742" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/76207742/Rethinking_gender_and_technology_within_intersections_in_the_Global_South">Rethinking gender and technology within intersections in the Global South</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">This is a self-archived version of an original article. This version may differ from the original in pagination and typographic details.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/76207742" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e9e0acdc00c32fcb9f76dd2aeb340326" rel="nofollow" data-download="{"attachment_id":83962749,"asset_id":76207742,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/83962749/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="532245" href="https://jyu.academia.edu/LauraStark">Laura Stark</a><script data-card-contents-for-user="532245" type="text/json">{"id":532245,"first_name":"Laura","last_name":"Stark","domain_name":"jyu","page_name":"LauraStark","display_name":"Laura Stark","profile_url":"https://jyu.academia.edu/LauraStark?f_ri=4198","photo":"https://0.academia-photos.com/532245/189532/125266794/s65_laura.stark.png"}</script></span></span></li><li class="js-paper-rank-work_76207742 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="76207742"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 76207742, container: ".js-paper-rank-work_76207742", }); });</script></li><li class="js-percentile-work_76207742 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 76207742; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_76207742"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_76207742 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="76207742"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 76207742; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=76207742]").text(description); $(".js-view-count-work_76207742").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_76207742").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="76207742"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="261" rel="nofollow" href="https://www.academia.edu/Documents/in/Geography">Geography</a>, <script data-card-contents-for-ri="261" type="text/json">{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="696" rel="nofollow" href="https://www.academia.edu/Documents/in/Gender_Studies">Gender Studies</a>, <script data-card-contents-for-ri="696" type="text/json">{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="977" rel="nofollow" href="https://www.academia.edu/Documents/in/Development_Studies">Development Studies</a>, <script data-card-contents-for-ri="977" type="text/json">{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1192" rel="nofollow" href="https://www.academia.edu/Documents/in/Feminist_Theory">Feminist Theory</a><script data-card-contents-for-ri="1192" type="text/json">{"id":1192,"name":"Feminist Theory","url":"https://www.academia.edu/Documents/in/Feminist_Theory?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=76207742]'), work: {"id":76207742,"title":"Rethinking gender and technology within intersections in the Global South","created_at":"2022-04-12T03:03:32.578-07:00","url":"https://www.academia.edu/76207742/Rethinking_gender_and_technology_within_intersections_in_the_Global_South?f_ri=4198","dom_id":"work_76207742","summary":"This is a self-archived version of an original article. This version may differ from the original in pagination and typographic details.","downloadable_attachments":[{"id":83962749,"asset_id":76207742,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":532245,"first_name":"Laura","last_name":"Stark","domain_name":"jyu","page_name":"LauraStark","display_name":"Laura Stark","profile_url":"https://jyu.academia.edu/LauraStark?f_ri=4198","photo":"https://0.academia-photos.com/532245/189532/125266794/s65_laura.stark.png"}],"research_interests":[{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=4198","nofollow":true},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=4198","nofollow":true},{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=4198","nofollow":true},{"id":1192,"name":"Feminist Theory","url":"https://www.academia.edu/Documents/in/Feminist_Theory?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=4198"},{"id":7024,"name":"Gender","url":"https://www.academia.edu/Documents/in/Gender?f_ri=4198"},{"id":9815,"name":"Developing Countries","url":"https://www.academia.edu/Documents/in/Developing_Countries?f_ri=4198"},{"id":18391,"name":"Mobile Communication","url":"https://www.academia.edu/Documents/in/Mobile_Communication?f_ri=4198"},{"id":953669,"name":"Routledge","url":"https://www.academia.edu/Documents/in/Routledge?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_53680966" data-work_id="53680966" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/53680966/How_to_covertly_leak_data_from_iOS">How to covertly leak data from iOS?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">iOS has proven to resist against information hiding techniques. However, Siri, a native service to control iPhone/iPad via voice commands, could change this trend in the near future.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/53680966" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c68cfc4240ff2c570739369a7b528c44" rel="nofollow" data-download="{"attachment_id":70411445,"asset_id":53680966,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/70411445/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5425175" href="https://cnr-it.academia.edu/LucaCaviglione">Luca Caviglione</a><script data-card-contents-for-user="5425175" type="text/json">{"id":5425175,"first_name":"Luca","last_name":"Caviglione","domain_name":"cnr-it","page_name":"LucaCaviglione","display_name":"Luca Caviglione","profile_url":"https://cnr-it.academia.edu/LucaCaviglione?f_ri=4198","photo":"https://0.academia-photos.com/5425175/12959777/19565342/s65_luca.caviglione.jpg"}</script></span></span></li><li class="js-paper-rank-work_53680966 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="53680966"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 53680966, container: ".js-paper-rank-work_53680966", }); });</script></li><li class="js-percentile-work_53680966 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 53680966; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_53680966"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_53680966 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="53680966"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 53680966; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=53680966]").text(description); $(".js-view-count-work_53680966").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_53680966").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="53680966"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="18391" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Communication">Mobile Communication</a>, <script data-card-contents-for-ri="18391" type="text/json">{"id":18391,"name":"Mobile Communication","url":"https://www.academia.edu/Documents/in/Mobile_Communication?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="26162" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_application_development">Mobile application development</a>, <script data-card-contents-for-ri="26162" type="text/json">{"id":26162,"name":"Mobile application development","url":"https://www.academia.edu/Documents/in/Mobile_application_development?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="26825" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Computing">Mobile Computing</a><script data-card-contents-for-ri="26825" type="text/json">{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=53680966]'), work: {"id":53680966,"title":"How to covertly leak data from iOS?","created_at":"2021-09-28T04:38:15.167-07:00","url":"https://www.academia.edu/53680966/How_to_covertly_leak_data_from_iOS?f_ri=4198","dom_id":"work_53680966","summary":"iOS has proven to resist against information hiding techniques. However, Siri, a native service to control iPhone/iPad via voice commands, could change this trend in the near future.","downloadable_attachments":[{"id":70411445,"asset_id":53680966,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5425175,"first_name":"Luca","last_name":"Caviglione","domain_name":"cnr-it","page_name":"LucaCaviglione","display_name":"Luca Caviglione","profile_url":"https://cnr-it.academia.edu/LucaCaviglione?f_ri=4198","photo":"https://0.academia-photos.com/5425175/12959777/19565342/s65_luca.caviglione.jpg"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":18391,"name":"Mobile Communication","url":"https://www.academia.edu/Documents/in/Mobile_Communication?f_ri=4198","nofollow":true},{"id":26162,"name":"Mobile application development","url":"https://www.academia.edu/Documents/in/Mobile_application_development?f_ri=4198","nofollow":true},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198","nofollow":true},{"id":36424,"name":"Mobile Technology Applications","url":"https://www.academia.edu/Documents/in/Mobile_Technology_Applications?f_ri=4198"},{"id":37882,"name":"Apple","url":"https://www.academia.edu/Documents/in/Apple?f_ri=4198"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=4198"},{"id":65030,"name":"Mobile apps","url":"https://www.academia.edu/Documents/in/Mobile_apps?f_ri=4198"},{"id":78636,"name":"Mobile Applications and Web Applications development","url":"https://www.academia.edu/Documents/in/Mobile_Applications_and_Web_Applications_development?f_ri=4198"},{"id":100171,"name":"Mobile Applications","url":"https://www.academia.edu/Documents/in/Mobile_Applications?f_ri=4198"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=4198"},{"id":551117,"name":"Java applets","url":"https://www.academia.edu/Documents/in/Java_applets?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_51214172" data-work_id="51214172" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/51214172/Potential_GPRS_900_180_MHz_and_WCDMA_1900_MHz_Interference_to_Medical_Devices">Potential GPRS 900/180-MHz and WCDMA 1900-MHz Interference to Medical Devices</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This study compared the potential for interference to medical devices from radio frequency (RF) fields radiated by GSM 900/1800-MHz, general packet radio service (GPRS) 900/1800-MHz, and wideband code division multiple access (WCDMA)... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_51214172" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This study compared the potential for interference to medical devices from radio frequency (RF) fields radiated by GSM 900/1800-MHz, general packet radio service (GPRS) 900/1800-MHz, and wideband code division multiple access (WCDMA) 1900-MHz handsets. The study used a balanced half-wave dipole antenna, which was energized with a signal at the standard power level for each technology, and then brought towards the medical device while noting the distance at which interference became apparent. Additional testing was performed with signals that comply with the requirements of the international immunity standard to RF fields, IEC 61000-4-3. The testing provides a sense of the overall interference impact that GPRS and WCDMA (frequency division duplex) may have, relative to current mobile technologies, and to the internationally recognized standard for radiated RF immunity. Ten medical devices were tested: two pulse oximeters, a blood pressure monitor, a patient monitor, a humidifier, three models of cardiac defibrillator, and two models of infusion pump. Our conclusion from this and a related study on consumer devices is that WCDMA handsets are unlikely to be a significant interference threat to medical electronics at typical separation distances.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/51214172" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b229cc02e179ffa170ca42f2b4cd6f78" rel="nofollow" data-download="{"attachment_id":69030546,"asset_id":51214172,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/69030546/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="42255294" href="https://independent.academia.edu/MckenzieRaymond">Raymond Mckenzie</a><script data-card-contents-for-user="42255294" type="text/json">{"id":42255294,"first_name":"Raymond","last_name":"Mckenzie","domain_name":"independent","page_name":"MckenzieRaymond","display_name":"Raymond Mckenzie","profile_url":"https://independent.academia.edu/MckenzieRaymond?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_51214172 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="51214172"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 51214172, container: ".js-paper-rank-work_51214172", }); });</script></li><li class="js-percentile-work_51214172 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 51214172; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_51214172"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_51214172 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="51214172"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 51214172; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=51214172]").text(description); $(".js-view-count-work_51214172").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_51214172").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="51214172"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">19</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1131" rel="nofollow" href="https://www.academia.edu/Documents/in/Biomedical_Engineering">Biomedical Engineering</a>, <script data-card-contents-for-ri="1131" type="text/json">{"id":1131,"name":"Biomedical Engineering","url":"https://www.academia.edu/Documents/in/Biomedical_Engineering?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5560" rel="nofollow" href="https://www.academia.edu/Documents/in/Electromagnetic_Compatibility">Electromagnetic Compatibility</a>, <script data-card-contents-for-ri="5560" type="text/json">{"id":5560,"name":"Electromagnetic Compatibility","url":"https://www.academia.edu/Documents/in/Electromagnetic_Compatibility?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8202" rel="nofollow" href="https://www.academia.edu/Documents/in/Cell_Phones">Cell Phones</a><script data-card-contents-for-ri="8202" type="text/json">{"id":8202,"name":"Cell Phones","url":"https://www.academia.edu/Documents/in/Cell_Phones?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=51214172]'), work: {"id":51214172,"title":"Potential GPRS 900/180-MHz and WCDMA 1900-MHz Interference to Medical Devices","created_at":"2021-09-03T16:02:12.272-07:00","url":"https://www.academia.edu/51214172/Potential_GPRS_900_180_MHz_and_WCDMA_1900_MHz_Interference_to_Medical_Devices?f_ri=4198","dom_id":"work_51214172","summary":"This study compared the potential for interference to medical devices from radio frequency (RF) fields radiated by GSM 900/1800-MHz, general packet radio service (GPRS) 900/1800-MHz, and wideband code division multiple access (WCDMA) 1900-MHz handsets. The study used a balanced half-wave dipole antenna, which was energized with a signal at the standard power level for each technology, and then brought towards the medical device while noting the distance at which interference became apparent. Additional testing was performed with signals that comply with the requirements of the international immunity standard to RF fields, IEC 61000-4-3. The testing provides a sense of the overall interference impact that GPRS and WCDMA (frequency division duplex) may have, relative to current mobile technologies, and to the internationally recognized standard for radiated RF immunity. Ten medical devices were tested: two pulse oximeters, a blood pressure monitor, a patient monitor, a humidifier, three models of cardiac defibrillator, and two models of infusion pump. Our conclusion from this and a related study on consumer devices is that WCDMA handsets are unlikely to be a significant interference threat to medical electronics at typical separation distances.","downloadable_attachments":[{"id":69030546,"asset_id":51214172,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":42255294,"first_name":"Raymond","last_name":"Mckenzie","domain_name":"independent","page_name":"MckenzieRaymond","display_name":"Raymond Mckenzie","profile_url":"https://independent.academia.edu/MckenzieRaymond?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1131,"name":"Biomedical Engineering","url":"https://www.academia.edu/Documents/in/Biomedical_Engineering?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":5560,"name":"Electromagnetic Compatibility","url":"https://www.academia.edu/Documents/in/Electromagnetic_Compatibility?f_ri=4198","nofollow":true},{"id":8202,"name":"Cell Phones","url":"https://www.academia.edu/Documents/in/Cell_Phones?f_ri=4198","nofollow":true},{"id":18391,"name":"Mobile Communication","url":"https://www.academia.edu/Documents/in/Mobile_Communication?f_ri=4198"},{"id":19751,"name":"Electromagnetic Interference","url":"https://www.academia.edu/Documents/in/Electromagnetic_Interference?f_ri=4198"},{"id":129388,"name":"Patient Monitoring","url":"https://www.academia.edu/Documents/in/Patient_Monitoring?f_ri=4198"},{"id":153283,"name":"Medical Device","url":"https://www.academia.edu/Documents/in/Medical_Device?f_ri=4198"},{"id":159012,"name":"Radio Frequency","url":"https://www.academia.edu/Documents/in/Radio_Frequency?f_ri=4198"},{"id":172678,"name":"Artifacts","url":"https://www.academia.edu/Documents/in/Artifacts?f_ri=4198"},{"id":375321,"name":"Blood Pressure Monitoring","url":"https://www.academia.edu/Documents/in/Blood_Pressure_Monitoring?f_ri=4198"},{"id":439473,"name":"Microwaves","url":"https://www.academia.edu/Documents/in/Microwaves?f_ri=4198"},{"id":1157424,"name":"Equipment Failure Analysis","url":"https://www.academia.edu/Documents/in/Equipment_Failure_Analysis?f_ri=4198"},{"id":1231359,"name":"Code Division Multiple Access","url":"https://www.academia.edu/Documents/in/Code_Division_Multiple_Access?f_ri=4198"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering?f_ri=4198"},{"id":1286978,"name":"Equipment and Supplies","url":"https://www.academia.edu/Documents/in/Equipment_and_Supplies?f_ri=4198"},{"id":2474027,"name":"General packet radio service (GPRS)","url":"https://www.academia.edu/Documents/in/General_packet_radio_service_GPRS_?f_ri=4198"},{"id":2741995,"name":"frequency division duplex (FDD)","url":"https://www.academia.edu/Documents/in/frequency_division_duplex_FDD_?f_ri=4198"},{"id":2837323,"name":"Equipment failure","url":"https://www.academia.edu/Documents/in/Equipment_failure?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_6256334" data-work_id="6256334" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/6256334/Mystery_in_the_museum_collaborative_learning_activities_using_handheld_devices">Mystery in the museum: collaborative learning activities using handheld devices</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a "Mystery in the Museum" story, involves collaboration of small groups of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_6256334" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a "Mystery in the Museum" story, involves collaboration of small groups of students through mobile handheld devices. An application has been built that permits authoring of such activities, while a usability evaluation study was performed that revealed some of the limitations of the design. The reported findings can be of use to those interested in following similar approaches in cultural and educational settings, and draw conclusions of general interest relating to interaction and collaboration through mobile technology.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/6256334" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="789d81e807143ee7e467f4a2de9111bd" rel="nofollow" data-download="{"attachment_id":33113427,"asset_id":6256334,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33113427/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9642374" href="https://hs-pforzheim.academia.edu/JorgeCabrera">Jorge Cabrera</a><script data-card-contents-for-user="9642374" type="text/json">{"id":9642374,"first_name":"Jorge","last_name":"Cabrera","domain_name":"hs-pforzheim","page_name":"JorgeCabrera","display_name":"Jorge Cabrera","profile_url":"https://hs-pforzheim.academia.edu/JorgeCabrera?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_6256334 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="6256334"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 6256334, container: ".js-paper-rank-work_6256334", }); });</script></li><li class="js-percentile-work_6256334 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 6256334; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_6256334"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_6256334 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="6256334"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 6256334; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=6256334]").text(description); $(".js-view-count-work_6256334").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_6256334").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="6256334"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="35254" rel="nofollow" href="https://www.academia.edu/Documents/in/Collaborative_Learning">Collaborative Learning</a>, <script data-card-contents-for-ri="35254" type="text/json">{"id":35254,"name":"Collaborative Learning","url":"https://www.academia.edu/Documents/in/Collaborative_Learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="71548" rel="nofollow" href="https://www.academia.edu/Documents/in/Usability_Evaluation">Usability Evaluation</a>, <script data-card-contents-for-ri="71548" type="text/json">{"id":71548,"name":"Usability Evaluation","url":"https://www.academia.edu/Documents/in/Usability_Evaluation?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="74026" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_technologies">Mobile technologies</a><script data-card-contents-for-ri="74026" type="text/json">{"id":74026,"name":"Mobile technologies","url":"https://www.academia.edu/Documents/in/Mobile_technologies?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=6256334]'), work: {"id":6256334,"title":"Mystery in the museum: collaborative learning activities using handheld devices","created_at":"2014-03-02T00:42:42.141-08:00","url":"https://www.academia.edu/6256334/Mystery_in_the_museum_collaborative_learning_activities_using_handheld_devices?f_ri=4198","dom_id":"work_6256334","summary":"In this paper, we describe the experience of designing a collaborative learning activity for a traditional historical/cultural museum. The activity, based on a \"Mystery in the Museum\" story, involves collaboration of small groups of students through mobile handheld devices. An application has been built that permits authoring of such activities, while a usability evaluation study was performed that revealed some of the limitations of the design. The reported findings can be of use to those interested in following similar approaches in cultural and educational settings, and draw conclusions of general interest relating to interaction and collaboration through mobile technology.","downloadable_attachments":[{"id":33113427,"asset_id":6256334,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9642374,"first_name":"Jorge","last_name":"Cabrera","domain_name":"hs-pforzheim","page_name":"JorgeCabrera","display_name":"Jorge Cabrera","profile_url":"https://hs-pforzheim.academia.edu/JorgeCabrera?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":35254,"name":"Collaborative Learning","url":"https://www.academia.edu/Documents/in/Collaborative_Learning?f_ri=4198","nofollow":true},{"id":71548,"name":"Usability Evaluation","url":"https://www.academia.edu/Documents/in/Usability_Evaluation?f_ri=4198","nofollow":true},{"id":74026,"name":"Mobile technologies","url":"https://www.academia.edu/Documents/in/Mobile_technologies?f_ri=4198","nofollow":true},{"id":106165,"name":"Handheld Device Use","url":"https://www.academia.edu/Documents/in/Handheld_Device_Use?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4191753 coauthored" data-work_id="4191753" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4191753/O_Marketing_de_geolocaliza%C3%A7%C3%A3o_em_Bibliotecas_Universit%C3%A1rias_o_uso_dos_dispositivos_m%C3%B3veis_para_promover_as_bibliotecas">O Marketing de geolocalização em Bibliotecas Universitárias: o uso dos dispositivos móveis para promover as bibliotecas.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">A proliferação de dispositivos móveis entre os usuários de bibliotecas nos últimos anos está ocasionando a necessidade do desenvolvimento de sítios web e catálogos OPAC formatados para estes artefatos. Neste sentido, as bibliotecas... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_4191753" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">A proliferação de dispositivos móveis entre os usuários de bibliotecas nos últimos anos está ocasionando a necessidade do desenvolvimento de sítios web e catálogos OPAC formatados para estes artefatos. Neste sentido, as bibliotecas universitárias devem promover este novo espaço de interlocução utilizando para isso aplicativos que fazem uso da geolocalização para que os usuários possam interagir com seus pares que se encontram naquele ambiente trazendo sugestões e conquistando prêmios de forma lúdica e inovadora. O artigo apresenta um olhar do marketing baseado na geolocalização utilizando-se de dispositivos móveis em bibliotecas universitárias.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4191753" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9cfd1f1a5d9450e62f3cc6ef6794ee4a" rel="nofollow" data-download="{"attachment_id":31688941,"asset_id":4191753,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31688941/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="137225" href="https://ufca.academia.edu/DVIEIRA">David Vernon Vieira</a><script data-card-contents-for-user="137225" type="text/json">{"id":137225,"first_name":"David Vernon","last_name":"Vieira","domain_name":"ufca","page_name":"DVIEIRA","display_name":"David Vernon Vieira","profile_url":"https://ufca.academia.edu/DVIEIRA?f_ri=4198","photo":"https://0.academia-photos.com/137225/36411/2430557/s65_david_vernon.vieira.gif"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-4191753">+1</span><div class="hidden js-additional-users-4191753"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://unb.academia.edu/MuriloCunha">Murilo Cunha</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-4191753'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-4191753').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_4191753 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4191753"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4191753, container: ".js-paper-rank-work_4191753", }); });</script></li><li class="js-percentile-work_4191753 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4191753; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4191753"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4191753 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4191753"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4191753; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4191753]").text(description); $(".js-view-count-work_4191753").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4191753").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4191753"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">23</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="459" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Science">Information Science</a>, <script data-card-contents-for-ri="459" type="text/json">{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="472" rel="nofollow" href="https://www.academia.edu/Documents/in/Human_Computer_Interaction">Human Computer Interaction</a>, <script data-card-contents-for-ri="472" type="text/json">{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="984" rel="nofollow" href="https://www.academia.edu/Documents/in/Web_2.0">Web 2.0</a>, <script data-card-contents-for-ri="984" type="text/json">{"id":984,"name":"Web 2.0","url":"https://www.academia.edu/Documents/in/Web_2.0?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1233" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Networks">Social Networks</a><script data-card-contents-for-ri="1233" type="text/json">{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4191753]'), work: {"id":4191753,"title":"O Marketing de geolocalização em Bibliotecas Universitárias: o uso dos dispositivos móveis para promover as bibliotecas.","created_at":"2013-08-07T08:13:39.803-07:00","url":"https://www.academia.edu/4191753/O_Marketing_de_geolocaliza%C3%A7%C3%A3o_em_Bibliotecas_Universit%C3%A1rias_o_uso_dos_dispositivos_m%C3%B3veis_para_promover_as_bibliotecas?f_ri=4198","dom_id":"work_4191753","summary":"A proliferação de dispositivos móveis entre os usuários de bibliotecas nos últimos anos está ocasionando a necessidade do desenvolvimento de sítios web e catálogos OPAC formatados para estes artefatos. Neste sentido, as bibliotecas universitárias devem promover este novo espaço de interlocução utilizando para isso aplicativos que fazem uso da geolocalização para que os usuários possam interagir com seus pares que se encontram naquele ambiente trazendo sugestões e conquistando prêmios de forma lúdica e inovadora. O artigo apresenta um olhar do marketing baseado na geolocalização utilizando-se de dispositivos móveis em bibliotecas universitárias.","downloadable_attachments":[{"id":31688941,"asset_id":4191753,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":137225,"first_name":"David Vernon","last_name":"Vieira","domain_name":"ufca","page_name":"DVIEIRA","display_name":"David Vernon Vieira","profile_url":"https://ufca.academia.edu/DVIEIRA?f_ri=4198","photo":"https://0.academia-photos.com/137225/36411/2430557/s65_david_vernon.vieira.gif"},{"id":89073,"first_name":"Murilo","last_name":"Cunha","domain_name":"unb","page_name":"MuriloCunha","display_name":"Murilo Cunha","profile_url":"https://unb.academia.edu/MuriloCunha?f_ri=4198","photo":"https://0.academia-photos.com/89073/2923154/3419009/s65_murilo.cunha.jpg"}],"research_interests":[{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=4198","nofollow":true},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=4198","nofollow":true},{"id":984,"name":"Web 2.0","url":"https://www.academia.edu/Documents/in/Web_2.0?f_ri=4198","nofollow":true},{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=4198","nofollow":true},{"id":1615,"name":"Usability","url":"https://www.academia.edu/Documents/in/Usability?f_ri=4198"},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=4198"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=4198"},{"id":2927,"name":"Internet science","url":"https://www.academia.edu/Documents/in/Internet_science?f_ri=4198"},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":5639,"name":"Text Mining","url":"https://www.academia.edu/Documents/in/Text_Mining?f_ri=4198"},{"id":9223,"name":"Digital Preservation","url":"https://www.academia.edu/Documents/in/Digital_Preservation?f_ri=4198"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=4198"},{"id":13739,"name":"Social Network Analysis (SNA)","url":"https://www.academia.edu/Documents/in/Social_Network_Analysis_SNA_?f_ri=4198"},{"id":13873,"name":"Twitter","url":"https://www.academia.edu/Documents/in/Twitter?f_ri=4198"},{"id":21389,"name":"E-Government","url":"https://www.academia.edu/Documents/in/E-Government?f_ri=4198"},{"id":44873,"name":"Web 3.0","url":"https://www.academia.edu/Documents/in/Web_3.0?f_ri=4198"},{"id":45540,"name":"Geolocation","url":"https://www.academia.edu/Documents/in/Geolocation?f_ri=4198"},{"id":63224,"name":"Mobile Communications","url":"https://www.academia.edu/Documents/in/Mobile_Communications?f_ri=4198"},{"id":97585,"name":"User interfaces","url":"https://www.academia.edu/Documents/in/User_interfaces?f_ri=4198"},{"id":212421,"name":"Microblogging","url":"https://www.academia.edu/Documents/in/Microblogging?f_ri=4198"},{"id":295949,"name":"Digital Era","url":"https://www.academia.edu/Documents/in/Digital_Era?f_ri=4198"},{"id":597612,"name":"Library and Archival Science","url":"https://www.academia.edu/Documents/in/Library_and_Archival_Science?f_ri=4198"},{"id":1251235,"name":"Science maps","url":"https://www.academia.edu/Documents/in/Science_maps?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_79903316" data-work_id="79903316" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/79903316/Risk_and_the_Pluralism_of_Digital_Human_Rights_Fact_Finding_and_Advocacy">Risk and the Pluralism of Digital Human Rights Fact-Finding and Advocacy</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The rise of information and communication technologies (ICTs) has captivated many human rights practitioners and scholars. Particular interest, mine included, is focused on the potential of using ICTs to support the pluralism of human... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_79903316" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The rise of information and communication technologies (ICTs) has captivated many human rights practitioners and scholars. Particular interest, mine included, is focused on the potential of using ICTs to support the pluralism of human rights factfinding and advocacy. 2 In theory, now anyone with a cell phone and Internet access can document and disseminate evidence of human rights abuses. But what happens when this theory is put into practice? 3 What happens when ICTs are adopted in empirical realities shaped by unique contexts, distributions of resources, and power relations? 4 I will argue that, while the rise of ICTs has certainly created new opportunities, it has also created new riskor negative outcomesfor human rights practitioners. This risk is silencing, and unequally so. In this chapter, I focus on human rights fact-finding and advocacy from the perspective of practitioners at human rights NGOs, while acknowledging that the range of practices and actors involved in human rights work is much broader. 5 These practices form a communication chain: information moves from witnesses on the ground to human rights practitioners during fact-finding, who gather and evaluate this information for evidence of violations. This evidence is then packaged and communicated to audiences such as journalists, policy-makers, and publics as 1 This work was supported by the Economic and Social Research Council (grant no. ES/K009850/1) and the Isaac Newton Trust. 2 I lead a project at the University of Cambridge called "The Whistle," which is a digital app we are developing to facilitate human rights reporting and verification. See <a href="http://www.thewhistle.org" rel="nofollow">www.thewhistle.org</a>. 3 I draw on my ongoing digital ethnography of human rights practices in the digital age for examples of empirical realities.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/79903316" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d1fee406c15bae315b90e97cfedb3303" rel="nofollow" data-download="{"attachment_id":86462322,"asset_id":79903316,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/86462322/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="39594" href="https://cambridge.academia.edu/EllaMcPherson">Ella McPherson</a><script data-card-contents-for-user="39594" type="text/json">{"id":39594,"first_name":"Ella","last_name":"McPherson","domain_name":"cambridge","page_name":"EllaMcPherson","display_name":"Ella McPherson","profile_url":"https://cambridge.academia.edu/EllaMcPherson?f_ri=4198","photo":"https://0.academia-photos.com/39594/13162/18289983/s65_ella.mcpherson.jpeg"}</script></span></span></li><li class="js-paper-rank-work_79903316 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="79903316"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 79903316, container: ".js-paper-rank-work_79903316", }); });</script></li><li class="js-percentile-work_79903316 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 79903316; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_79903316"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_79903316 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="79903316"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 79903316; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=79903316]").text(description); $(".js-view-count-work_79903316").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_79903316").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="79903316"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="815" rel="nofollow" href="https://www.academia.edu/Documents/in/Epistemology">Epistemology</a>, <script data-card-contents-for-ri="815" type="text/json">{"id":815,"name":"Epistemology","url":"https://www.academia.edu/Documents/in/Epistemology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="859" rel="nofollow" href="https://www.academia.edu/Documents/in/Communication">Communication</a><script data-card-contents-for-ri="859" type="text/json">{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=79903316]'), work: {"id":79903316,"title":"Risk and the Pluralism of Digital Human Rights Fact-Finding and Advocacy","created_at":"2022-05-25T08:33:50.063-07:00","url":"https://www.academia.edu/79903316/Risk_and_the_Pluralism_of_Digital_Human_Rights_Fact_Finding_and_Advocacy?f_ri=4198","dom_id":"work_79903316","summary":"The rise of information and communication technologies (ICTs) has captivated many human rights practitioners and scholars. Particular interest, mine included, is focused on the potential of using ICTs to support the pluralism of human rights factfinding and advocacy. 2 In theory, now anyone with a cell phone and Internet access can document and disseminate evidence of human rights abuses. But what happens when this theory is put into practice? 3 What happens when ICTs are adopted in empirical realities shaped by unique contexts, distributions of resources, and power relations? 4 I will argue that, while the rise of ICTs has certainly created new opportunities, it has also created new riskor negative outcomesfor human rights practitioners. This risk is silencing, and unequally so. In this chapter, I focus on human rights fact-finding and advocacy from the perspective of practitioners at human rights NGOs, while acknowledging that the range of practices and actors involved in human rights work is much broader. 5 These practices form a communication chain: information moves from witnesses on the ground to human rights practitioners during fact-finding, who gather and evaluate this information for evidence of violations. This evidence is then packaged and communicated to audiences such as journalists, policy-makers, and publics as 1 This work was supported by the Economic and Social Research Council (grant no. ES/K009850/1) and the Isaac Newton Trust. 2 I lead a project at the University of Cambridge called \"The Whistle,\" which is a digital app we are developing to facilitate human rights reporting and verification. See www.thewhistle.org. 3 I draw on my ongoing digital ethnography of human rights practices in the digital age for examples of empirical realities.","downloadable_attachments":[{"id":86462322,"asset_id":79903316,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":39594,"first_name":"Ella","last_name":"McPherson","domain_name":"cambridge","page_name":"EllaMcPherson","display_name":"Ella McPherson","profile_url":"https://cambridge.academia.edu/EllaMcPherson?f_ri=4198","photo":"https://0.academia-photos.com/39594/13162/18289983/s65_ella.mcpherson.jpeg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=4198","nofollow":true},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true},{"id":815,"name":"Epistemology","url":"https://www.academia.edu/Documents/in/Epistemology?f_ri=4198","nofollow":true},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=4198","nofollow":true},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198"},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=4198"},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=4198"},{"id":8207,"name":"Risk","url":"https://www.academia.edu/Documents/in/Risk?f_ri=4198"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=4198"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=4198"},{"id":15542,"name":"Transnational Advocacy Networks","url":"https://www.academia.edu/Documents/in/Transnational_Advocacy_Networks?f_ri=4198"},{"id":16127,"name":"Sociology of Technology","url":"https://www.academia.edu/Documents/in/Sociology_of_Technology?f_ri=4198"},{"id":18750,"name":"Nonprofit Advocacy","url":"https://www.academia.edu/Documents/in/Nonprofit_Advocacy?f_ri=4198"},{"id":32938,"name":"Pluralism","url":"https://www.academia.edu/Documents/in/Pluralism?f_ri=4198"},{"id":43386,"name":"Advocacy and Activism","url":"https://www.academia.edu/Documents/in/Advocacy_and_Activism?f_ri=4198"},{"id":89502,"name":"Information and Communication Technologies","url":"https://www.academia.edu/Documents/in/Information_and_Communication_Technologies?f_ri=4198"},{"id":140689,"name":"Advocacy","url":"https://www.academia.edu/Documents/in/Advocacy?f_ri=4198"},{"id":240789,"name":"Fact Finding","url":"https://www.academia.edu/Documents/in/Fact_Finding?f_ri=4198"},{"id":599635,"name":"Cambridge University","url":"https://www.academia.edu/Documents/in/Cambridge_University?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44170755 coauthored" data-work_id="44170755" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44170755/USEFULNESS_OF_MOBILE_TEACHING_AND_LEARNING_AS_PERCEIVED_BY_ROMANIAN_AND_LITHUANIAN_SCIENCE_TEACHERS">USEFULNESS OF MOBILE TEACHING AND LEARNING AS PERCEIVED BY ROMANIAN AND LITHUANIAN SCIENCE TEACHERS</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">With the explosion of mobile technologies, mobile teaching and learning became an important educational challenge. Since both teachers and students are increasingly using mobile devices in their everyday life, the question is why so... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44170755" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">With the explosion of mobile technologies, mobile teaching and learning became an important educational challenge. Since both teachers and students are increasingly using mobile devices in their everyday life, the question is why so little progress has been made in this direction. Clearly, the initiative of introducing mobile technology in class should come from teachers. Existing research shows a large diversity of factors that are influencing their perception as regards the usefulness and opportunity of mobile teaching and learning. This research aims to understand the extent to which the expectancy of increased students' motivation and better understanding are influencing the perception of mobile teaching usefulness. A structural model has been developed and tested on two samples of science education teachers, one from Romania and the other from Lithuania. The results show that the expectancy of a better understanding of lessons by students has an important effect on the teachers' perception of mobile teaching and learning.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44170755" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="046bf01a8e00372aeacad72e0e91a20c" rel="nofollow" data-download="{"attachment_id":64529675,"asset_id":44170755,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64529675/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="644934" href="https://projektas.academia.edu/VincentasLamanauskas">Vincentas Lamanauskas</a><script data-card-contents-for-user="644934" type="text/json">{"id":644934,"first_name":"Vincentas","last_name":"Lamanauskas","domain_name":"projektas","page_name":"VincentasLamanauskas","display_name":"Vincentas Lamanauskas","profile_url":"https://projektas.academia.edu/VincentasLamanauskas?f_ri=4198","photo":"https://0.academia-photos.com/644934/222112/259779/s65_vincentas.lamanauskas.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-44170755">+1</span><div class="hidden js-additional-users-44170755"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/CPribeanu">Costin Pribeanu</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-44170755'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-44170755').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_44170755 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44170755"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44170755, container: ".js-paper-rank-work_44170755", }); });</script></li><li class="js-percentile-work_44170755 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44170755; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44170755"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44170755 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44170755"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44170755; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44170755]").text(description); $(".js-view-count-work_44170755").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44170755").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44170755"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="158059" rel="nofollow" href="https://www.academia.edu/Documents/in/MOBILE_TEACHING_AND_LEARNING_TECHNOLOGY">MOBILE TEACHING AND LEARNING TECHNOLOGY</a>, <script data-card-contents-for-ri="158059" type="text/json">{"id":158059,"name":"MOBILE TEACHING AND LEARNING TECHNOLOGY","url":"https://www.academia.edu/Documents/in/MOBILE_TEACHING_AND_LEARNING_TECHNOLOGY?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="569499" rel="nofollow" href="https://www.academia.edu/Documents/in/Learning_Motivation">Learning Motivation</a>, <script data-card-contents-for-ri="569499" type="text/json">{"id":569499,"name":"Learning Motivation","url":"https://www.academia.edu/Documents/in/Learning_Motivation?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3772296" rel="nofollow" href="https://www.academia.edu/Documents/in/pilot_research">pilot research </a><script data-card-contents-for-ri="3772296" type="text/json">{"id":3772296,"name":"pilot research ","url":"https://www.academia.edu/Documents/in/pilot_research?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44170755]'), work: {"id":44170755,"title":"USEFULNESS OF MOBILE TEACHING AND LEARNING AS PERCEIVED BY ROMANIAN AND LITHUANIAN SCIENCE TEACHERS","created_at":"2020-09-26T09:47:29.359-07:00","url":"https://www.academia.edu/44170755/USEFULNESS_OF_MOBILE_TEACHING_AND_LEARNING_AS_PERCEIVED_BY_ROMANIAN_AND_LITHUANIAN_SCIENCE_TEACHERS?f_ri=4198","dom_id":"work_44170755","summary":"With the explosion of mobile technologies, mobile teaching and learning became an important educational challenge. Since both teachers and students are increasingly using mobile devices in their everyday life, the question is why so little progress has been made in this direction. Clearly, the initiative of introducing mobile technology in class should come from teachers. Existing research shows a large diversity of factors that are influencing their perception as regards the usefulness and opportunity of mobile teaching and learning. This research aims to understand the extent to which the expectancy of increased students' motivation and better understanding are influencing the perception of mobile teaching usefulness. A structural model has been developed and tested on two samples of science education teachers, one from Romania and the other from Lithuania. The results show that the expectancy of a better understanding of lessons by students has an important effect on the teachers' perception of mobile teaching and learning.","downloadable_attachments":[{"id":64529675,"asset_id":44170755,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":644934,"first_name":"Vincentas","last_name":"Lamanauskas","domain_name":"projektas","page_name":"VincentasLamanauskas","display_name":"Vincentas Lamanauskas","profile_url":"https://projektas.academia.edu/VincentasLamanauskas?f_ri=4198","photo":"https://0.academia-photos.com/644934/222112/259779/s65_vincentas.lamanauskas.jpg"},{"id":137107007,"first_name":"Costin","last_name":"Pribeanu","domain_name":"independent","page_name":"CPribeanu","display_name":"Costin Pribeanu","profile_url":"https://independent.academia.edu/CPribeanu?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":158059,"name":"MOBILE TEACHING AND LEARNING TECHNOLOGY","url":"https://www.academia.edu/Documents/in/MOBILE_TEACHING_AND_LEARNING_TECHNOLOGY?f_ri=4198","nofollow":true},{"id":569499,"name":"Learning Motivation","url":"https://www.academia.edu/Documents/in/Learning_Motivation?f_ri=4198","nofollow":true},{"id":3772296,"name":"pilot research ","url":"https://www.academia.edu/Documents/in/pilot_research?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36011184" data-work_id="36011184" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36011184/Like_Rome_a_mobile_operators_empire_wasnt_built_in_a_day_A_journey_through_the_rise_and_fall_of_mobile_network_operators">Like Rome, a mobile operator's empire wasn't built in a day! A journey through the rise and fall of mobile network operators</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This research provides insights on the key strategic management issues, which lay the basis of a network operator overall competitive strategy. This is done assuming the perspective of a mobile network operator. Through example stemming... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36011184" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This research provides insights on the key strategic management issues, which lay the basis of a network operator overall competitive strategy. This is done assuming the perspective of a mobile network operator. Through example stemming mainly from the Danish and Italian mobile markets, our paper proposes a model for the management of mobile services, which resembles a lifecycle model. As the Mobile Management Model resembles the rise and fall of network operators, the reader is accompanied on a journey through its four phases. Characteristics of the phases are described in details, and suggestions are derived for optimal strategic behaviors of network operators. The model is supported by evidences from the Danish and Italian mobile markets.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36011184" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="40e863f78a60ad48d16b4abcbc97d863" rel="nofollow" data-download="{"attachment_id":55897689,"asset_id":36011184,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55897689/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="37013497" href="https://cbs.academia.edu/JanDamsgaard">Jan Damsgaard</a><script data-card-contents-for-user="37013497" type="text/json">{"id":37013497,"first_name":"Jan","last_name":"Damsgaard","domain_name":"cbs","page_name":"JanDamsgaard","display_name":"Jan Damsgaard","profile_url":"https://cbs.academia.edu/JanDamsgaard?f_ri=4198","photo":"https://0.academia-photos.com/37013497/10540479/11763475/s65_jan.damsgaard.jpg"}</script></span></span></li><li class="js-paper-rank-work_36011184 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36011184"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36011184, container: ".js-paper-rank-work_36011184", }); });</script></li><li class="js-percentile-work_36011184 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36011184; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36011184"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36011184 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36011184"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36011184; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36011184]").text(description); $(".js-view-count-work_36011184").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36011184").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36011184"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="144712" rel="nofollow" href="https://www.academia.edu/Documents/in/IT_infrastructure">IT infrastructure</a><script data-card-contents-for-ri="144712" type="text/json">{"id":144712,"name":"IT infrastructure","url":"https://www.academia.edu/Documents/in/IT_infrastructure?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36011184]'), work: {"id":36011184,"title":"Like Rome, a mobile operator's empire wasn't built in a day! A journey through the rise and fall of mobile network operators","created_at":"2018-02-25T08:44:13.273-08:00","url":"https://www.academia.edu/36011184/Like_Rome_a_mobile_operators_empire_wasnt_built_in_a_day_A_journey_through_the_rise_and_fall_of_mobile_network_operators?f_ri=4198","dom_id":"work_36011184","summary":"This research provides insights on the key strategic management issues, which lay the basis of a network operator overall competitive strategy. This is done assuming the perspective of a mobile network operator. Through example stemming mainly from the Danish and Italian mobile markets, our paper proposes a model for the management of mobile services, which resembles a lifecycle model. As the Mobile Management Model resembles the rise and fall of network operators, the reader is accompanied on a journey through its four phases. Characteristics of the phases are described in details, and suggestions are derived for optimal strategic behaviors of network operators. The model is supported by evidences from the Danish and Italian mobile markets.","downloadable_attachments":[{"id":55897689,"asset_id":36011184,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":37013497,"first_name":"Jan","last_name":"Damsgaard","domain_name":"cbs","page_name":"JanDamsgaard","display_name":"Jan Damsgaard","profile_url":"https://cbs.academia.edu/JanDamsgaard?f_ri=4198","photo":"https://0.academia-photos.com/37013497/10540479/11763475/s65_jan.damsgaard.jpg"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":144712,"name":"IT infrastructure","url":"https://www.academia.edu/Documents/in/IT_infrastructure?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35877422" data-work_id="35877422" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35877422/O_FAZER_PESQUISA_EM_LINGU%C3%8DSTICA_APLICADA_CONSIDERA%C3%87%C3%95ES_ACERCA_DA_LINGUAGEM_DO_DISCURSO_E_DA_PERFORMANCE_NO_CONTEXTO_DE_ENSINAGEM_M%C3%93VEL">O FAZER PESQUISA EM LINGUÍSTICA APLICADA: CONSIDERAÇÕES ACERCA DA LINGUAGEM, DO DISCURSO E DA PERFORMANCE NO CONTEXTO DE ENSINAGEM MÓVEL</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Este artigo visa discutir sobre o fazer pesquisa em Linguística Aplicada, tida como uma área que atravessa fronteiras disciplinares na contemporaneidade (SIGNORINI, 1998/2004; PENNYCOOK, 2006) e que considera os sujeitos como seres... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35877422" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Este artigo visa discutir sobre o fazer pesquisa em Linguística Aplicada, tida como uma área que<br />atravessa fronteiras disciplinares na contemporaneidade (SIGNORINI, 1998/2004; PENNYCOOK,<br />2006) e que considera os sujeitos como seres heterogêneos, fragmentados e fluidos (MOITA<br />LOPES, 2006). Devido ao uso de tecnologias móveis no processo de ensinagem, que se considere os<br />impactos da linguagem – não tida como essencialista e cristalizada – e cultura (KRAMSCH, 2014)<br />na constituição dos sujeitos, assim como os contextos micro e macro (BLOMMAERT, 2005) nas<br />performances discursivas dos aprendizes, enquanto eles co-constroem o conhecimento com o uso<br />de diferentes recursos multissemióticos (ROJO, 2013) nas relações dialógicas (FARACO, 2009).</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35877422" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="deab68811f4802b9da7b1b0333273fc1" rel="nofollow" data-download="{"attachment_id":55757350,"asset_id":35877422,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55757350/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="14850567" href="https://ufrj.academia.edu/VanessaMota">Vanessa M Mota</a><script data-card-contents-for-user="14850567" type="text/json">{"id":14850567,"first_name":"Vanessa","last_name":"Mota","domain_name":"ufrj","page_name":"VanessaMota","display_name":"Vanessa M Mota","profile_url":"https://ufrj.academia.edu/VanessaMota?f_ri=4198","photo":"https://0.academia-photos.com/14850567/5951001/73188658/s65_vanessa.mota.jpg"}</script></span></span></li><li class="js-paper-rank-work_35877422 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35877422"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35877422, container: ".js-paper-rank-work_35877422", }); });</script></li><li class="js-percentile-work_35877422 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35877422; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35877422"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35877422 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35877422"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35877422; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35877422]").text(description); $(".js-view-count-work_35877422").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35877422").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35877422"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1763" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Learning">Mobile Learning</a>, <script data-card-contents-for-ri="1763" type="text/json">{"id":1763,"name":"Mobile Learning","url":"https://www.academia.edu/Documents/in/Mobile_Learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="92083" rel="nofollow" href="https://www.academia.edu/Documents/in/Linguistica_aplicada">Linguistica aplicada</a>, <script data-card-contents-for-ri="92083" type="text/json">{"id":92083,"name":"Linguistica aplicada","url":"https://www.academia.edu/Documents/in/Linguistica_aplicada?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="368989" rel="nofollow" href="https://www.academia.edu/Documents/in/Discurso">Discurso</a><script data-card-contents-for-ri="368989" type="text/json">{"id":368989,"name":"Discurso","url":"https://www.academia.edu/Documents/in/Discurso?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35877422]'), work: {"id":35877422,"title":"O FAZER PESQUISA EM LINGUÍSTICA APLICADA: CONSIDERAÇÕES ACERCA DA LINGUAGEM, DO DISCURSO E DA PERFORMANCE NO CONTEXTO DE ENSINAGEM MÓVEL","created_at":"2018-02-09T02:39:37.388-08:00","url":"https://www.academia.edu/35877422/O_FAZER_PESQUISA_EM_LINGU%C3%8DSTICA_APLICADA_CONSIDERA%C3%87%C3%95ES_ACERCA_DA_LINGUAGEM_DO_DISCURSO_E_DA_PERFORMANCE_NO_CONTEXTO_DE_ENSINAGEM_M%C3%93VEL?f_ri=4198","dom_id":"work_35877422","summary":"Este artigo visa discutir sobre o fazer pesquisa em Linguística Aplicada, tida como uma área que\natravessa fronteiras disciplinares na contemporaneidade (SIGNORINI, 1998/2004; PENNYCOOK,\n2006) e que considera os sujeitos como seres heterogêneos, fragmentados e fluidos (MOITA\nLOPES, 2006). Devido ao uso de tecnologias móveis no processo de ensinagem, que se considere os\nimpactos da linguagem – não tida como essencialista e cristalizada – e cultura (KRAMSCH, 2014)\nna constituição dos sujeitos, assim como os contextos micro e macro (BLOMMAERT, 2005) nas\nperformances discursivas dos aprendizes, enquanto eles co-constroem o conhecimento com o uso\nde diferentes recursos multissemióticos (ROJO, 2013) nas relações dialógicas (FARACO, 2009).","downloadable_attachments":[{"id":55757350,"asset_id":35877422,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":14850567,"first_name":"Vanessa","last_name":"Mota","domain_name":"ufrj","page_name":"VanessaMota","display_name":"Vanessa M Mota","profile_url":"https://ufrj.academia.edu/VanessaMota?f_ri=4198","photo":"https://0.academia-photos.com/14850567/5951001/73188658/s65_vanessa.mota.jpg"}],"research_interests":[{"id":1763,"name":"Mobile Learning","url":"https://www.academia.edu/Documents/in/Mobile_Learning?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":92083,"name":"Linguistica aplicada","url":"https://www.academia.edu/Documents/in/Linguistica_aplicada?f_ri=4198","nofollow":true},{"id":368989,"name":"Discurso","url":"https://www.academia.edu/Documents/in/Discurso?f_ri=4198","nofollow":true},{"id":440595,"name":"Linguagem","url":"https://www.academia.edu/Documents/in/Linguagem?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25759855 coauthored" data-work_id="25759855" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25759855/Establishing_Mesh_Network_Amongst_Infantry_Personnel_During_Military_Operations_A_Preliminary_Study">Establishing Mesh Network Amongst Infantry Personnel During Military Operations: A Preliminary Study</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">— This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_25759855" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">— This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient closed network structure. Closed and secure are among reliable network features for this mesh network.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25759855" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9df5812dc8bcefdc7946376dd30b6619" rel="nofollow" data-download="{"attachment_id":46116905,"asset_id":25759855,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46116905/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33546781" href="https://independent.academia.edu/MohdNazriBinIsmail">Mohd Nazri Bin. Ismail</a><script data-card-contents-for-user="33546781" type="text/json">{"id":33546781,"first_name":"Mohd Nazri Bin.","last_name":"Ismail","domain_name":"independent","page_name":"MohdNazriBinIsmail","display_name":"Mohd Nazri Bin. Ismail","profile_url":"https://independent.academia.edu/MohdNazriBinIsmail?f_ri=4198","photo":"https://0.academia-photos.com/33546781/17074258/17245344/s65_mohd_nazri_bin..ismail.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-25759855">+1</span><div class="hidden js-additional-users-25759855"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://upnm.academia.edu/MohdNazriIsmail">Mohd Nazri Ismail</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-25759855'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-25759855').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_25759855 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25759855"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25759855, container: ".js-paper-rank-work_25759855", }); });</script></li><li class="js-percentile-work_25759855 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25759855; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25759855"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25759855 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25759855"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25759855; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25759855]").text(description); $(".js-view-count-work_25759855").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25759855").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25759855"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="133" rel="nofollow" href="https://www.academia.edu/Documents/in/Military_History">Military History</a>, <script data-card-contents-for-ri="133" type="text/json">{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="579" rel="nofollow" href="https://www.academia.edu/Documents/in/Strategy_Military_Science_">Strategy (Military Science)</a>, <script data-card-contents-for-ri="579" type="text/json">{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2339" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Ad_Hoc_Networks">Mobile Ad Hoc Networks</a>, <script data-card-contents-for-ri="2339" type="text/json">{"id":2339,"name":"Mobile Ad Hoc Networks","url":"https://www.academia.edu/Documents/in/Mobile_Ad_Hoc_Networks?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25759855]'), work: {"id":25759855,"title":"Establishing Mesh Network Amongst Infantry Personnel During Military Operations: A Preliminary Study","created_at":"2016-05-31T20:17:07.284-07:00","url":"https://www.academia.edu/25759855/Establishing_Mesh_Network_Amongst_Infantry_Personnel_During_Military_Operations_A_Preliminary_Study?f_ri=4198","dom_id":"work_25759855","summary":"— This paper describes a preliminary study for proposing a viable mesh network communication for knowledge sharing platform. This network structure is to support military infantry personnel for utilizing mobile knowledge based system in restricted operation areas. The study investigates several components for implementing an effective and efficient closed network structure. Closed and secure are among reliable network features for this mesh network.","downloadable_attachments":[{"id":46116905,"asset_id":25759855,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":33546781,"first_name":"Mohd Nazri Bin.","last_name":"Ismail","domain_name":"independent","page_name":"MohdNazriBinIsmail","display_name":"Mohd Nazri Bin. Ismail","profile_url":"https://independent.academia.edu/MohdNazriBinIsmail?f_ri=4198","photo":"https://0.academia-photos.com/33546781/17074258/17245344/s65_mohd_nazri_bin..ismail.jpg"},{"id":5216963,"first_name":"Mohd Nazri","last_name":"Ismail","domain_name":"upnm","page_name":"MohdNazriIsmail","display_name":"Mohd Nazri Ismail","profile_url":"https://upnm.academia.edu/MohdNazriIsmail?f_ri=4198","photo":"https://0.academia-photos.com/5216963/2297936/26923932/s65_mohd_nazri.ismail.jpg"}],"research_interests":[{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=4198","nofollow":true},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=4198","nofollow":true},{"id":2339,"name":"Mobile Ad Hoc Networks","url":"https://www.academia.edu/Documents/in/Mobile_Ad_Hoc_Networks?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198"},{"id":37939,"name":"Arduino","url":"https://www.academia.edu/Documents/in/Arduino?f_ri=4198"},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=4198"},{"id":1019269,"name":"Security in wireless ad hoc, mesh, sensor networks","url":"https://www.academia.edu/Documents/in/Security_in_wireless_ad_hoc_mesh_sensor_networks?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_79847246" data-work_id="79847246" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/79847246/Location_based_moblogging_as_method_New_views_into_the_use_and_practices_of_personal_social_and_mobile_technologies">Location-based moblogging as method: New views into the use and practices of personal, social and mobile technologies</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Much of the public discourse and research on mobile media has focused on how they disrupt the integrity of locations such as restaurants, movies, and public transportation, or are an unwanted presence during times when people are... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_79847246" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Much of the public discourse and research on mobile media has focused on how they disrupt the integrity of locations such as restaurants, movies, and public transportation, or are an unwanted presence during times when people are physically co-present In addressing these issues, research has tended to focus on a specific device—the mobile phone—as the central player in new practices of communicating and accessing information while on the go. Our prior work was also focused on mobile phone based communications ...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/79847246" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a398e5ad6e4f07790ede3995ed859e9d" rel="nofollow" data-download="{"attachment_id":86424457,"asset_id":79847246,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/86424457/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="54039408" href="https://independent.academia.edu/kenanderson11">ken anderson</a><script data-card-contents-for-user="54039408" type="text/json">{"id":54039408,"first_name":"ken","last_name":"anderson","domain_name":"independent","page_name":"kenanderson11","display_name":"ken anderson","profile_url":"https://independent.academia.edu/kenanderson11?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_79847246 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="79847246"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 79847246, container: ".js-paper-rank-work_79847246", }); });</script></li><li class="js-percentile-work_79847246 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 79847246; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_79847246"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_79847246 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="79847246"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 79847246; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=79847246]").text(description); $(".js-view-count-work_79847246").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_79847246").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="79847246"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=79847246]'), work: {"id":79847246,"title":"Location-based moblogging as method: New views into the use and practices of personal, social and mobile technologies","created_at":"2022-05-24T14:59:30.618-07:00","url":"https://www.academia.edu/79847246/Location_based_moblogging_as_method_New_views_into_the_use_and_practices_of_personal_social_and_mobile_technologies?f_ri=4198","dom_id":"work_79847246","summary":"Much of the public discourse and research on mobile media has focused on how they disrupt the integrity of locations such as restaurants, movies, and public transportation, or are an unwanted presence during times when people are physically co-present In addressing these issues, research has tended to focus on a specific device—the mobile phone—as the central player in new practices of communicating and accessing information while on the go. Our prior work was also focused on mobile phone based communications ...","downloadable_attachments":[{"id":86424457,"asset_id":79847246,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":54039408,"first_name":"ken","last_name":"anderson","domain_name":"independent","page_name":"kenanderson11","display_name":"ken anderson","profile_url":"https://independent.academia.edu/kenanderson11?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_77063045" data-work_id="77063045" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/77063045/Using_Epistemic_Network_Analysis_to_Examine_Discourse_and_Scientific_Practice_During_a_Collaborative_Game">Using Epistemic Network Analysis to Examine Discourse and Scientific Practice During a Collaborative Game</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">According to the National Research Council, the ability to collaboratively solve problems is of the utmost importance in scientific careers, yet students are not exposed to learning experiences that promote such expertise. Recent studies... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_77063045" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">According to the National Research Council, the ability to collaboratively solve problems is of the utmost importance in scientific careers, yet students are not exposed to learning experiences that promote such expertise. Recent studies have found that interdependent roles used within collaborative mobile games are an effective way to scaffold collaborative problem solving. School Scene Investigators: The Case of the Mystery Powder, a collaborative mobile game, incorporated interdependent roles in order to foster collaborative problem solving and promote scientific practice. Using epistemic network analysis (ENA), this study examined the conversational discourse of game teams to determine what connections exist between communication responses, language style, and scientific practice. Data included audio transcripts of three teams that played through the game. Transcripts were qualitatively coded for five types of scientific practice aligned to the National Research Council framework for K-12 science education, three types of communication responses (accept/discuss/reject), and an emergent language style (communal). ENA revealed that students developed scientific practices during gameplay. ENA also identified engaged communication responses and communal language style as two types of collaborative discourse used within School Scene Investigators: The Case of the Mystery Powder that fostered key linkages to effective data analysis and interpretation.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/77063045" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5b6b793c70fd1bbe984b22668fe0a9db" rel="nofollow" data-download="{"attachment_id":84562340,"asset_id":77063045,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84562340/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="656933" href="https://ets.academia.edu/DeniseBressler">Denise Bressler</a><script data-card-contents-for-user="656933" type="text/json">{"id":656933,"first_name":"Denise","last_name":"Bressler","domain_name":"ets","page_name":"DeniseBressler","display_name":"Denise Bressler","profile_url":"https://ets.academia.edu/DeniseBressler?f_ri=4198","photo":"https://0.academia-photos.com/656933/425636/56650152/s65_denise.bressler.jpg"}</script></span></span></li><li class="js-paper-rank-work_77063045 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="77063045"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 77063045, container: ".js-paper-rank-work_77063045", }); });</script></li><li class="js-percentile-work_77063045 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 77063045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_77063045"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_77063045 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="77063045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 77063045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=77063045]").text(description); $(".js-view-count-work_77063045").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_77063045").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="77063045"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" rel="nofollow" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1736" rel="nofollow" href="https://www.academia.edu/Documents/in/Science_Education">Science Education</a>, <script data-card-contents-for-ri="1736" type="text/json">{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8668" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Supported_Collaborative_Learning_CSCL">Computer Supported Collaborative Learning CSCL</a><script data-card-contents-for-ri="8668" type="text/json">{"id":8668,"name":"Computer Supported Collaborative Learning CSCL","url":"https://www.academia.edu/Documents/in/Computer_Supported_Collaborative_Learning_CSCL?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=77063045]'), work: {"id":77063045,"title":"Using Epistemic Network Analysis to Examine Discourse and Scientific Practice During a Collaborative Game","created_at":"2022-04-20T05:01:23.621-07:00","url":"https://www.academia.edu/77063045/Using_Epistemic_Network_Analysis_to_Examine_Discourse_and_Scientific_Practice_During_a_Collaborative_Game?f_ri=4198","dom_id":"work_77063045","summary":"According to the National Research Council, the ability to collaboratively solve problems is of the utmost importance in scientific careers, yet students are not exposed to learning experiences that promote such expertise. Recent studies have found that interdependent roles used within collaborative mobile games are an effective way to scaffold collaborative problem solving. School Scene Investigators: The Case of the Mystery Powder, a collaborative mobile game, incorporated interdependent roles in order to foster collaborative problem solving and promote scientific practice. Using epistemic network analysis (ENA), this study examined the conversational discourse of game teams to determine what connections exist between communication responses, language style, and scientific practice. Data included audio transcripts of three teams that played through the game. Transcripts were qualitatively coded for five types of scientific practice aligned to the National Research Council framework for K-12 science education, three types of communication responses (accept/discuss/reject), and an emergent language style (communal). ENA revealed that students developed scientific practices during gameplay. ENA also identified engaged communication responses and communal language style as two types of collaborative discourse used within School Scene Investigators: The Case of the Mystery Powder that fostered key linkages to effective data analysis and interpretation.","downloadable_attachments":[{"id":84562340,"asset_id":77063045,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":656933,"first_name":"Denise","last_name":"Bressler","domain_name":"ets","page_name":"DeniseBressler","display_name":"Denise Bressler","profile_url":"https://ets.academia.edu/DeniseBressler?f_ri=4198","photo":"https://0.academia-photos.com/656933/425636/56650152/s65_denise.bressler.jpg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=4198","nofollow":true},{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":8668,"name":"Computer Supported Collaborative Learning CSCL","url":"https://www.academia.edu/Documents/in/Computer_Supported_Collaborative_Learning_CSCL?f_ri=4198","nofollow":true},{"id":10641,"name":"Game Based Learning","url":"https://www.academia.edu/Documents/in/Game_Based_Learning?f_ri=4198"},{"id":35254,"name":"Collaborative Learning","url":"https://www.academia.edu/Documents/in/Collaborative_Learning?f_ri=4198"},{"id":41030,"name":"Mobile Augmented Reality","url":"https://www.academia.edu/Documents/in/Mobile_Augmented_Reality?f_ri=4198"},{"id":274163,"name":"Science and Technology Education","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Education?f_ri=4198"},{"id":508371,"name":"Curriculum and Pedagogy","url":"https://www.academia.edu/Documents/in/Curriculum_and_Pedagogy?f_ri=4198"},{"id":3372255,"name":"Epistemic Network Analysis","url":"https://www.academia.edu/Documents/in/Epistemic_Network_Analysis?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_72888786" data-work_id="72888786" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/72888786/A_system_for_reliable_and_scalable_ground_truth_generation_and_traffic_classification_of_mobile_apps_encrypted_traffic">A system for reliable and scalable ground truth generation and traffic classification of mobile apps encrypted traffic</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_72888786" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the kind of traffic that travels over home and enterprise networks and the Internet. TC comes with its own challenges and requirements that are even exacerbated in a mobile-traffic context, such as: (a) the adoption of encrypted protocols (b) a large number of apps to discriminate from, (c) the dynamic nature of network traffic and, more importantly, (d) the lack of a satisfactory flow-level Ground Truth (GT) to train the classification algorithms on, and test and compare them against. For this reason, this work proposes a novel self-supervised TC architecture composed of two main blocks: (i) an automatic GT generation tool and (ii) a Multi-Classifier System (MCS). The first block automatically produces a corpus of traffic traces with flow-level labelin...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/72888786" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="104646146" href="https://unina.academia.edu/AntonioMontieri">Antonio Montieri</a><script data-card-contents-for-user="104646146" type="text/json">{"id":104646146,"first_name":"Antonio","last_name":"Montieri","domain_name":"unina","page_name":"AntonioMontieri","display_name":"Antonio Montieri","profile_url":"https://unina.academia.edu/AntonioMontieri?f_ri=4198","photo":"https://0.academia-photos.com/104646146/23572292/22618934/s65_antonio.montieri.jpg"}</script></span></span></li><li class="js-paper-rank-work_72888786 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="72888786"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 72888786, container: ".js-paper-rank-work_72888786", }); });</script></li><li class="js-percentile-work_72888786 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 72888786; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_72888786"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_72888786 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="72888786"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 72888786; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=72888786]").text(description); $(".js-view-count-work_72888786").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_72888786").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="72888786"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="195045" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Traffic_Classification">Internet Traffic Classification</a><script data-card-contents-for-ri="195045" type="text/json">{"id":195045,"name":"Internet Traffic Classification","url":"https://www.academia.edu/Documents/in/Internet_Traffic_Classification?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=72888786]'), work: {"id":72888786,"title":"A system for reliable and scalable ground truth generation and traffic classification of mobile apps encrypted traffic","created_at":"2022-03-03T01:50:41.580-08:00","url":"https://www.academia.edu/72888786/A_system_for_reliable_and_scalable_ground_truth_generation_and_traffic_classification_of_mobile_apps_encrypted_traffic?f_ri=4198","dom_id":"work_72888786","summary":"The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the kind of traffic that travels over home and enterprise networks and the Internet. TC comes with its own challenges and requirements that are even exacerbated in a mobile-traffic context, such as: (a) the adoption of encrypted protocols (b) a large number of apps to discriminate from, (c) the dynamic nature of network traffic and, more importantly, (d) the lack of a satisfactory flow-level Ground Truth (GT) to train the classification algorithms on, and test and compare them against. For this reason, this work proposes a novel self-supervised TC architecture composed of two main blocks: (i) an automatic GT generation tool and (ii) a Multi-Classifier System (MCS). The first block automatically produces a corpus of traffic traces with flow-level labelin...","downloadable_attachments":[],"ordered_authors":[{"id":104646146,"first_name":"Antonio","last_name":"Montieri","domain_name":"unina","page_name":"AntonioMontieri","display_name":"Antonio Montieri","profile_url":"https://unina.academia.edu/AntonioMontieri?f_ri=4198","photo":"https://0.academia-photos.com/104646146/23572292/22618934/s65_antonio.montieri.jpg"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":195045,"name":"Internet Traffic Classification","url":"https://www.academia.edu/Documents/in/Internet_Traffic_Classification?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_69800078" data-work_id="69800078" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/69800078/A_Support_Vector_Machine_Classification_of_Computational_Capabilities_of_3D_Map_on_Mobile_Device_for_Navigation_Aid">A Support Vector Machine Classification of Computational Capabilities of 3D Map on Mobile Device for Navigation Aid</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">3D map for mobile devices provide more realistic view of an environment and serves as better navigation aid. Previous research studies shows differences in 3D maps effect on acquiring of spatial knowledge. This is attributed to the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_69800078" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">3D map for mobile devices provide more realistic view of an environment and serves as better navigation aid. Previous research studies shows differences in 3D maps effect on acquiring of spatial knowledge. This is attributed to the differences in mobile device computational capabilities. Crucial to this, is the time it takes for 3D map dataset to be rendered for a required complete navigation task. Different findings suggest different approach on solving the problem of time require for both in-core (inside mobile) and out-core (remote) rendering of 3D dataset. Unfortunately, studies on analytical techniques required to shows the impact of computational resources required for the use of 3D map on mobile device were neglected by the research communities. This paper uses Support Vector Machine (SVM) to analytically classify mobile device computational capabilities required for 3D map that will be suitable for use as navigation aid. Fifty different Smart phones were categorized on the b...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/69800078" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="91d36e2be45e0b859f4fdc750211f79e" rel="nofollow" data-download="{"attachment_id":79756834,"asset_id":69800078,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/79756834/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="140906133" href="https://atbunet.academia.edu/AbdulsalamGital">Abdulsalam Gital</a><script data-card-contents-for-user="140906133" type="text/json">{"id":140906133,"first_name":"Abdulsalam","last_name":"Gital","domain_name":"atbunet","page_name":"AbdulsalamGital","display_name":"Abdulsalam Gital","profile_url":"https://atbunet.academia.edu/AbdulsalamGital?f_ri=4198","photo":"https://0.academia-photos.com/140906133/39495576/32664291/s65_abdulsalam.gital.jpg"}</script></span></span></li><li class="js-paper-rank-work_69800078 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="69800078"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 69800078, container: ".js-paper-rank-work_69800078", }); });</script></li><li class="js-percentile-work_69800078 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 69800078; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_69800078"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_69800078 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="69800078"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 69800078; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=69800078]").text(description); $(".js-view-count-work_69800078").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_69800078").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="69800078"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="440" rel="nofollow" href="https://www.academia.edu/Documents/in/Distributed_Computing">Distributed Computing</a>, <script data-card-contents-for-ri="440" type="text/json">{"id":440,"name":"Distributed Computing","url":"https://www.academia.edu/Documents/in/Distributed_Computing?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="59695" rel="nofollow" href="https://www.academia.edu/Documents/in/Navigation">Navigation</a>, <script data-card-contents-for-ri="59695" type="text/json">{"id":59695,"name":"Navigation","url":"https://www.academia.edu/Documents/in/Navigation?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="191289" rel="nofollow" href="https://www.academia.edu/Documents/in/Support_vector_machine">Support vector machine</a><script data-card-contents-for-ri="191289" type="text/json">{"id":191289,"name":"Support vector machine","url":"https://www.academia.edu/Documents/in/Support_vector_machine?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=69800078]'), work: {"id":69800078,"title":"A Support Vector Machine Classification of Computational Capabilities of 3D Map on Mobile Device for Navigation Aid","created_at":"2022-01-28T08:38:32.565-08:00","url":"https://www.academia.edu/69800078/A_Support_Vector_Machine_Classification_of_Computational_Capabilities_of_3D_Map_on_Mobile_Device_for_Navigation_Aid?f_ri=4198","dom_id":"work_69800078","summary":"3D map for mobile devices provide more realistic view of an environment and serves as better navigation aid. Previous research studies shows differences in 3D maps effect on acquiring of spatial knowledge. This is attributed to the differences in mobile device computational capabilities. Crucial to this, is the time it takes for 3D map dataset to be rendered for a required complete navigation task. Different findings suggest different approach on solving the problem of time require for both in-core (inside mobile) and out-core (remote) rendering of 3D dataset. Unfortunately, studies on analytical techniques required to shows the impact of computational resources required for the use of 3D map on mobile device were neglected by the research communities. This paper uses Support Vector Machine (SVM) to analytically classify mobile device computational capabilities required for 3D map that will be suitable for use as navigation aid. Fifty different Smart phones were categorized on the b...","downloadable_attachments":[{"id":79756834,"asset_id":69800078,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":140906133,"first_name":"Abdulsalam","last_name":"Gital","domain_name":"atbunet","page_name":"AbdulsalamGital","display_name":"Abdulsalam Gital","profile_url":"https://atbunet.academia.edu/AbdulsalamGital?f_ri=4198","photo":"https://0.academia-photos.com/140906133/39495576/32664291/s65_abdulsalam.gital.jpg"}],"research_interests":[{"id":440,"name":"Distributed Computing","url":"https://www.academia.edu/Documents/in/Distributed_Computing?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":59695,"name":"Navigation","url":"https://www.academia.edu/Documents/in/Navigation?f_ri=4198","nofollow":true},{"id":191289,"name":"Support vector machine","url":"https://www.academia.edu/Documents/in/Support_vector_machine?f_ri=4198","nofollow":true},{"id":197902,"name":"Mobile Devices","url":"https://www.academia.edu/Documents/in/Mobile_Devices?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_30989165" data-work_id="30989165" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/30989165/Challenges_Facing_the_Use_and_Adoption_of_Mobile_Phone_Money_Services">Challenges Facing the Use and Adoption of Mobile Phone Money Services</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This paper was... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_30989165" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This paper was therefore seeking to explore challenges facing mobile phone money services. Qualitative research technique was used. Further, both primary and secondary data was used. The study was conducted in Homa Bay region in Kenya, using ethnography research design. The study established that mobile phone money use and adoption had numerous challenges that had hindered it. Most affected by the challenges were the mobile phone money users and potential users from the rural poor communities. Some of the challenges included lack of national ID cards by potential users, few mobile phone money agents, inadequate cash and e-floats by the agents, awareness and lack of information on how to access and operate certain features in mobile money platform, as well as language barrier.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/30989165" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8db846cf6f3662f8dda285277627dc02" rel="nofollow" data-download="{"attachment_id":51421295,"asset_id":30989165,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/51421295/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4130177" href="https://co.academia.edu/OdoyoCollins">Odoyo Collins</a><script data-card-contents-for-user="4130177" type="text/json">{"id":4130177,"first_name":"Odoyo","last_name":"Collins","domain_name":"co","page_name":"OdoyoCollins","display_name":"Odoyo Collins","profile_url":"https://co.academia.edu/OdoyoCollins?f_ri=4198","photo":"https://0.academia-photos.com/4130177/1602119/15681395/s65_odoyo.collins.jpg"}</script></span></span></li><li class="js-paper-rank-work_30989165 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="30989165"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 30989165, container: ".js-paper-rank-work_30989165", }); });</script></li><li class="js-percentile-work_30989165 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 30989165; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_30989165"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_30989165 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="30989165"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 30989165; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=30989165]").text(description); $(".js-view-count-work_30989165").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_30989165").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="30989165"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="361853" rel="nofollow" href="https://www.academia.edu/Documents/in/Adoption_on_Mobile_Money_Payment">Adoption on Mobile Money Payment</a><script data-card-contents-for-ri="361853" type="text/json">{"id":361853,"name":"Adoption on Mobile Money Payment","url":"https://www.academia.edu/Documents/in/Adoption_on_Mobile_Money_Payment?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=30989165]'), work: {"id":30989165,"title":"Challenges Facing the Use and Adoption of Mobile Phone Money Services","created_at":"2017-01-18T23:46:02.684-08:00","url":"https://www.academia.edu/30989165/Challenges_Facing_the_Use_and_Adoption_of_Mobile_Phone_Money_Services?f_ri=4198","dom_id":"work_30989165","summary":"The Mobile phone banking idea was initially born out of the intention to reach the unbanked rural poor. However, there still existed mobile phone money service divide, highly skewed against the rural poor population. This paper was therefore seeking to explore challenges facing mobile phone money services. Qualitative research technique was used. Further, both primary and secondary data was used. The study was conducted in Homa Bay region in Kenya, using ethnography research design. The study established that mobile phone money use and adoption had numerous challenges that had hindered it. Most affected by the challenges were the mobile phone money users and potential users from the rural poor communities. Some of the challenges included lack of national ID cards by potential users, few mobile phone money agents, inadequate cash and e-floats by the agents, awareness and lack of information on how to access and operate certain features in mobile money platform, as well as language barrier.","downloadable_attachments":[{"id":51421295,"asset_id":30989165,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4130177,"first_name":"Odoyo","last_name":"Collins","domain_name":"co","page_name":"OdoyoCollins","display_name":"Odoyo Collins","profile_url":"https://co.academia.edu/OdoyoCollins?f_ri=4198","photo":"https://0.academia-photos.com/4130177/1602119/15681395/s65_odoyo.collins.jpg"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":361853,"name":"Adoption on Mobile Money Payment","url":"https://www.academia.edu/Documents/in/Adoption_on_Mobile_Money_Payment?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43132334" data-work_id="43132334" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43132334/Cough_Monitoring_with_Cardiopulmonary_Measurements">Cough Monitoring with Cardiopulmonary Measurements</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">An independent cough checking device is a gadget that permits quantitative cough estimations in the patients. The gadget is being practiced by two objectives: comfort and security. Internet of Things(IoT) which is a network bared on... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43132334" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">An independent cough checking device is a gadget that permits quantitative cough estimations in the patients. The gadget is being practiced by two objectives: comfort and security. Internet of Things(IoT) which is a network bared on physical system in which it can be exhibited in the form of typical embedded system including electronic devices. The assessment of its power and recurrence that furnishes clinical data of patient with chronic ceaseless cough. The recognition calculation pursues a methodology with accounts of cough sounds. The normal recognition rate was 82% at a normal caution pace of occasions when considering the vitality edge to every normal patient. This device utilizes sound chronicles from a smaller than normal receiver to distinguish the cough sound and it utilizes respiratory sensors to detect the in and out progression of respiratory system. Heart sensor is utilized to identify the pulse estimations during the procedure. The impact of nonstop cough might be hurtful to the patient by meddling with breathing, rest, muscle throb, sleep insomnia and fatigue. Over 90% of COPD patients happen in low and center pay nations. By breaking down the signal, we can recognize typical and irresistible cough and fast restorative consideration is given to the individuals experiencing respiratory issue. The outcome recommend that can be applied to the detection of cough sounds and could permit the dismissal of a portion of the inaccurately identified devices. With the help of these sensors the data has been collected and then it is uploaded in the cloud for further analysis.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43132334" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="981ab185b0f7be210a992ea27af05cb6" rel="nofollow" data-download="{"attachment_id":63390736,"asset_id":43132334,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63390736/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6079060" href="https://independent.academia.edu/IJRASETPublication">IJRASET Publication</a><script data-card-contents-for-user="6079060" type="text/json">{"id":6079060,"first_name":"IJRASET","last_name":"Publication","domain_name":"independent","page_name":"IJRASETPublication","display_name":"IJRASET Publication","profile_url":"https://independent.academia.edu/IJRASETPublication?f_ri=4198","photo":"https://0.academia-photos.com/6079060/2549300/33111525/s65_ijraset.publication.jpg"}</script></span></span></li><li class="js-paper-rank-work_43132334 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43132334"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43132334, container: ".js-paper-rank-work_43132334", }); });</script></li><li class="js-percentile-work_43132334 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43132334; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43132334"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43132334 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43132334"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43132334; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43132334]").text(description); $(".js-view-count-work_43132334").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43132334").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43132334"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2749" rel="nofollow" href="https://www.academia.edu/Documents/in/Animal_Behavior">Animal Behavior</a>, <script data-card-contents-for-ri="2749" type="text/json">{"id":2749,"name":"Animal Behavior","url":"https://www.academia.edu/Documents/in/Animal_Behavior?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="15685" rel="nofollow" href="https://www.academia.edu/Documents/in/Water_Pump">Water Pump</a>, <script data-card-contents-for-ri="15685" type="text/json">{"id":15685,"name":"Water Pump","url":"https://www.academia.edu/Documents/in/Water_Pump?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="83037" rel="nofollow" href="https://www.academia.edu/Documents/in/Soil_moisture">Soil moisture</a><script data-card-contents-for-ri="83037" type="text/json">{"id":83037,"name":"Soil moisture","url":"https://www.academia.edu/Documents/in/Soil_moisture?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43132334]'), work: {"id":43132334,"title":"Cough Monitoring with Cardiopulmonary Measurements","created_at":"2020-05-21T21:55:14.105-07:00","url":"https://www.academia.edu/43132334/Cough_Monitoring_with_Cardiopulmonary_Measurements?f_ri=4198","dom_id":"work_43132334","summary":"An independent cough checking device is a gadget that permits quantitative cough estimations in the patients. The gadget is being practiced by two objectives: comfort and security. Internet of Things(IoT) which is a network bared on physical system in which it can be exhibited in the form of typical embedded system including electronic devices. The assessment of its power and recurrence that furnishes clinical data of patient with chronic ceaseless cough. The recognition calculation pursues a methodology with accounts of cough sounds. The normal recognition rate was 82% at a normal caution pace of occasions when considering the vitality edge to every normal patient. This device utilizes sound chronicles from a smaller than normal receiver to distinguish the cough sound and it utilizes respiratory sensors to detect the in and out progression of respiratory system. Heart sensor is utilized to identify the pulse estimations during the procedure. The impact of nonstop cough might be hurtful to the patient by meddling with breathing, rest, muscle throb, sleep insomnia and fatigue. Over 90% of COPD patients happen in low and center pay nations. By breaking down the signal, we can recognize typical and irresistible cough and fast restorative consideration is given to the individuals experiencing respiratory issue. The outcome recommend that can be applied to the detection of cough sounds and could permit the dismissal of a portion of the inaccurately identified devices. With the help of these sensors the data has been collected and then it is uploaded in the cloud for further analysis.","downloadable_attachments":[{"id":63390736,"asset_id":43132334,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6079060,"first_name":"IJRASET","last_name":"Publication","domain_name":"independent","page_name":"IJRASETPublication","display_name":"IJRASET Publication","profile_url":"https://independent.academia.edu/IJRASETPublication?f_ri=4198","photo":"https://0.academia-photos.com/6079060/2549300/33111525/s65_ijraset.publication.jpg"}],"research_interests":[{"id":2749,"name":"Animal Behavior","url":"https://www.academia.edu/Documents/in/Animal_Behavior?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":15685,"name":"Water Pump","url":"https://www.academia.edu/Documents/in/Water_Pump?f_ri=4198","nofollow":true},{"id":83037,"name":"Soil moisture","url":"https://www.academia.edu/Documents/in/Soil_moisture?f_ri=4198","nofollow":true},{"id":194912,"name":"Camera","url":"https://www.academia.edu/Documents/in/Camera?f_ri=4198"},{"id":282323,"name":"Human Detection","url":"https://www.academia.edu/Documents/in/Human_Detection?f_ri=4198"},{"id":563750,"name":"Raspberry Pi","url":"https://www.academia.edu/Documents/in/Raspberry_Pi?f_ri=4198"},{"id":964072,"name":"Video Screen Capture","url":"https://www.academia.edu/Documents/in/Video_Screen_Capture?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19973093" data-work_id="19973093" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19973093/An_Implementation_of_Android_based_Steganography_Application">An Implementation of Android-based Steganography Application</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Abstract — The rapid development of smart phone technology has led to cheapening of the phone equipped with many advanced features such as sensors. One of the most widely used sensor in the phone is its camera. Although the photographs... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19973093" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Abstract — The rapid development of smart phone technology has led to cheapening of the phone equipped with many advanced features such as sensors. One of the most widely used sensor in the phone is its camera. Although the photographs captured by camera can be shared via many ways, one of the most commonly used sharing methods is Multimedia Message Service (MMS) which allows transmission of files such as photographs, audio and video. A major disadvantage of MMS is that it does not provide sufficient safety mechanism and because of this, the data of the people who wants to hide confidential information from state-controlled systems can be easily monitored. In this study, unlike cryptography-based, a steganography-based mobile application that can embed the confidential information into an image, send it to receiver, and extract the confidential information from the image in the receiver side is developed. Besides, the performance data such as the embedding and extraction time of confidential information and experimental results of application are given.<br /><br />Keywords— Multimedia Message Service, MMS, Steganography, Smart Phone.<br /><br /><a href="https://sites.google.com/site/ijcsis/" rel="nofollow">https://sites.google.com/site/ijcsis/</a></div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19973093" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3e2e328156e18909bf1413d010b58e52" rel="nofollow" data-download="{"attachment_id":40939590,"asset_id":19973093,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40939590/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2328357" href="https://independent.academia.edu/JournalofComputerScienceIJCSIS">Journal of Computer Science IJCSIS</a><script data-card-contents-for-user="2328357" type="text/json">{"id":2328357,"first_name":"Journal of Computer Science","last_name":"IJCSIS","domain_name":"independent","page_name":"JournalofComputerScienceIJCSIS","display_name":"Journal of Computer Science IJCSIS","profile_url":"https://independent.academia.edu/JournalofComputerScienceIJCSIS?f_ri=4198","photo":"https://0.academia-photos.com/2328357/8085511/9052483/s65_journal_of_computer_science.ijcsis.jpg"}</script></span></span></li><li class="js-paper-rank-work_19973093 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19973093"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19973093, container: ".js-paper-rank-work_19973093", }); });</script></li><li class="js-percentile-work_19973093 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19973093; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19973093"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19973093 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19973093"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19973093; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19973093]").text(description); $(".js-view-count-work_19973093").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19973093").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19973093"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">17</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="422" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>, <script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="449" rel="nofollow" href="https://www.academia.edu/Documents/in/Software_Engineering">Software Engineering</a>, <script data-card-contents-for-ri="449" type="text/json">{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="472" rel="nofollow" href="https://www.academia.edu/Documents/in/Human_Computer_Interaction">Human Computer Interaction</a><script data-card-contents-for-ri="472" type="text/json">{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19973093]'), work: {"id":19973093,"title":"An Implementation of Android-based Steganography Application","created_at":"2016-01-02T21:55:40.187-08:00","url":"https://www.academia.edu/19973093/An_Implementation_of_Android_based_Steganography_Application?f_ri=4198","dom_id":"work_19973093","summary":"Abstract — The rapid development of smart phone technology has led to cheapening of the phone equipped with many advanced features such as sensors. One of the most widely used sensor in the phone is its camera. Although the photographs captured by camera can be shared via many ways, one of the most commonly used sharing methods is Multimedia Message Service (MMS) which allows transmission of files such as photographs, audio and video. A major disadvantage of MMS is that it does not provide sufficient safety mechanism and because of this, the data of the people who wants to hide confidential information from state-controlled systems can be easily monitored. In this study, unlike cryptography-based, a steganography-based mobile application that can embed the confidential information into an image, send it to receiver, and extract the confidential information from the image in the receiver side is developed. Besides, the performance data such as the embedding and extraction time of confidential information and experimental results of application are given.\n\nKeywords— Multimedia Message Service, MMS, Steganography, Smart Phone.\n\nhttps://sites.google.com/site/ijcsis/","downloadable_attachments":[{"id":40939590,"asset_id":19973093,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2328357,"first_name":"Journal of Computer Science","last_name":"IJCSIS","domain_name":"independent","page_name":"JournalofComputerScienceIJCSIS","display_name":"Journal of Computer Science IJCSIS","profile_url":"https://independent.academia.edu/JournalofComputerScienceIJCSIS?f_ri=4198","photo":"https://0.academia-photos.com/2328357/8085511/9052483/s65_journal_of_computer_science.ijcsis.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=4198","nofollow":true},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=4198","nofollow":true},{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering?f_ri=4198","nofollow":true},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=4198","nofollow":true},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198"},{"id":1185,"name":"Image Processing","url":"https://www.academia.edu/Documents/in/Image_Processing?f_ri=4198"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=4198"},{"id":3419,"name":"Multimedia","url":"https://www.academia.edu/Documents/in/Multimedia?f_ri=4198"},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=4198"},{"id":8129,"name":"Software Development","url":"https://www.academia.edu/Documents/in/Software_Development?f_ri=4198"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=4198"},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198"},{"id":32055,"name":"Steganography","url":"https://www.academia.edu/Documents/in/Steganography?f_ri=4198"},{"id":35938,"name":"Digital Image Processing","url":"https://www.academia.edu/Documents/in/Digital_Image_Processing?f_ri=4198"},{"id":73043,"name":"Image Processing and steganography","url":"https://www.academia.edu/Documents/in/Image_Processing_and_steganography?f_ri=4198"},{"id":418691,"name":"Multimedia Computing","url":"https://www.academia.edu/Documents/in/Multimedia_Computing?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_70863510" data-work_id="70863510" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/70863510/Machine_learning_for_email_spam_filtering_review_approaches_and_open_research_problems">Machine learning for email spam filtering: review, approaches and open research problems</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning methods of recent are being used to successfully detect and filter... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_70863510" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning methods of recent are being used to successfully detect and filter spam emails. We present a systematic review of some of the popular machine learning based email spam filtering approaches. Our review covers survey of the important concepts, attempts, efficiency, and the research trend in spam filtering. The preliminary discussion in the study background examines the applications of machine learning techniques to the email spam filtering process of the leading internet service providers (ISPs) like Gmail, Yahoo and Outlook emails spam filters. Discussion on general email spam filtering process, and the various efforts by different researchers in combating spam through the use machine learning techniques was done. Our review compares the strengths and drawbacks of existing machine learning approaches and the open res...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/70863510" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d4698a394dd1d88bbcc8fcae88d7f017" rel="nofollow" data-download="{"attachment_id":80433666,"asset_id":70863510,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/80433666/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="46042792" rel="nofollow" href="https://independent.academia.edu/AdebayoAdetunmbi">Adebayo Adetunmbi</a><script data-card-contents-for-user="46042792" type="text/json">{"id":46042792,"first_name":"Adebayo","last_name":"Adetunmbi","domain_name":"independent","page_name":"AdebayoAdetunmbi","display_name":"Adebayo Adetunmbi","profile_url":"https://independent.academia.edu/AdebayoAdetunmbi?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_70863510 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="70863510"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 70863510, container: ".js-paper-rank-work_70863510", }); });</script></li><li class="js-percentile-work_70863510 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 70863510; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_70863510"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_70863510 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="70863510"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 70863510; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=70863510]").text(description); $(".js-view-count-work_70863510").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_70863510").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="70863510"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2008" rel="nofollow" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>, <script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2009" rel="nofollow" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a>, <script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="26825" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Computing">Mobile Computing</a><script data-card-contents-for-ri="26825" type="text/json">{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=70863510]'), work: {"id":70863510,"title":"Machine learning for email spam filtering: review, approaches and open research problems","created_at":"2022-02-07T09:31:59.015-08:00","url":"https://www.academia.edu/70863510/Machine_learning_for_email_spam_filtering_review_approaches_and_open_research_problems?f_ri=4198","dom_id":"work_70863510","summary":"The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning methods of recent are being used to successfully detect and filter spam emails. We present a systematic review of some of the popular machine learning based email spam filtering approaches. Our review covers survey of the important concepts, attempts, efficiency, and the research trend in spam filtering. The preliminary discussion in the study background examines the applications of machine learning techniques to the email spam filtering process of the leading internet service providers (ISPs) like Gmail, Yahoo and Outlook emails spam filters. Discussion on general email spam filtering process, and the various efforts by different researchers in combating spam through the use machine learning techniques was done. Our review compares the strengths and drawbacks of existing machine learning approaches and the open res...","downloadable_attachments":[{"id":80433666,"asset_id":70863510,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":46042792,"first_name":"Adebayo","last_name":"Adetunmbi","domain_name":"independent","page_name":"AdebayoAdetunmbi","display_name":"Adebayo Adetunmbi","profile_url":"https://independent.academia.edu/AdebayoAdetunmbi?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=4198","nofollow":true},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198","nofollow":true},{"id":170876,"name":"Spam Filtering","url":"https://www.academia.edu/Documents/in/Spam_Filtering?f_ri=4198"},{"id":883005,"name":"Researching Mobile SMS anti spamming system","url":"https://www.academia.edu/Documents/in/Researching_Mobile_SMS_anti_spamming_system?f_ri=4198"},{"id":1323830,"name":"Email Spam Filter","url":"https://www.academia.edu/Documents/in/Email_Spam_Filter?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_79955450" data-work_id="79955450" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/79955450/Statistical_Insights_and_Fraud_Techniques_for_Telecommunications_Sector_in_Egypt">Statistical Insights and Fraud Techniques for Telecommunications Sector in Egypt</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">National Telecommunications Regulatory Authority (NTRA) has investigated the telecommunication performance in the service providers in Egypt between the periods of February 2018 till February 2019. Fraud is a multi-billions pounds&#39;... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_79955450" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">National Telecommunications Regulatory Authority (NTRA) has investigated the telecommunication performance in the service providers in Egypt between the periods of February 2018 till February 2019. Fraud is a multi-billions pounds&#39; problem around the world. The problem is the huge financial loss of revenue that can affect the trustworthiness and performance of the telecommunication corporate. Egypt is one of the developing countries that are witnessing a rapid-growth development in its telecommunications infrastructure. As a result of the increment rate of corporate and internet users, fraudsters are exploiting the vulnerabilities to gain illegal revenue through the subscribers. The telecommunications sector in Egypt has suffered in the last two decades from different types of telecom fraud cases which have damaged the financial sector in both telecommunication side and governmental side. In this paper, we present: a) Statistical insights on users, mobile operators and Internet companies for the telecommunications sector in Egypt in 2018/2019. b) An illustration for the common fraudulent methodologies that are used against both users and telecom operators in Egypt. c) A discussion on the consequences of fraud cases with a suggested framework as a proactive methodology to prevent the escalated threat of telecom fraud.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/79955450" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6be39fb31f491feae3d765d3f08524a5" rel="nofollow" data-download="{"attachment_id":86500995,"asset_id":79955450,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/86500995/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="205477644" href="https://independent.academia.edu/AhmedAMawgoud">Ahmed A. Mawgoud</a><script data-card-contents-for-user="205477644" type="text/json">{"id":205477644,"first_name":"Ahmed A.","last_name":"Mawgoud","domain_name":"independent","page_name":"AhmedAMawgoud","display_name":"Ahmed A. Mawgoud","profile_url":"https://independent.academia.edu/AhmedAMawgoud?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_79955450 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="79955450"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 79955450, container: ".js-paper-rank-work_79955450", }); });</script></li><li class="js-percentile-work_79955450 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 79955450; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_79955450"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_79955450 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="79955450"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 79955450; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=79955450]").text(description); $(".js-view-count-work_79955450").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_79955450").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="79955450"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="26" rel="nofollow" href="https://www.academia.edu/Documents/in/Business">Business</a>, <script data-card-contents-for-ri="26" type="text/json">{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3974" rel="nofollow" href="https://www.academia.edu/Documents/in/Telecommunications">Telecommunications</a>, <script data-card-contents-for-ri="3974" type="text/json">{"id":3974,"name":"Telecommunications","url":"https://www.academia.edu/Documents/in/Telecommunications?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="12537" rel="nofollow" href="https://www.academia.edu/Documents/in/Egypt">Egypt</a><script data-card-contents-for-ri="12537" type="text/json">{"id":12537,"name":"Egypt","url":"https://www.academia.edu/Documents/in/Egypt?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=79955450]'), work: {"id":79955450,"title":"Statistical Insights and Fraud Techniques for Telecommunications Sector in Egypt","created_at":"2022-05-26T02:51:23.475-07:00","url":"https://www.academia.edu/79955450/Statistical_Insights_and_Fraud_Techniques_for_Telecommunications_Sector_in_Egypt?f_ri=4198","dom_id":"work_79955450","summary":"National Telecommunications Regulatory Authority (NTRA) has investigated the telecommunication performance in the service providers in Egypt between the periods of February 2018 till February 2019. Fraud is a multi-billions pounds\u0026#39; problem around the world. The problem is the huge financial loss of revenue that can affect the trustworthiness and performance of the telecommunication corporate. Egypt is one of the developing countries that are witnessing a rapid-growth development in its telecommunications infrastructure. As a result of the increment rate of corporate and internet users, fraudsters are exploiting the vulnerabilities to gain illegal revenue through the subscribers. The telecommunications sector in Egypt has suffered in the last two decades from different types of telecom fraud cases which have damaged the financial sector in both telecommunication side and governmental side. In this paper, we present: a) Statistical insights on users, mobile operators and Internet companies for the telecommunications sector in Egypt in 2018/2019. b) An illustration for the common fraudulent methodologies that are used against both users and telecom operators in Egypt. c) A discussion on the consequences of fraud cases with a suggested framework as a proactive methodology to prevent the escalated threat of telecom fraud.","downloadable_attachments":[{"id":86500995,"asset_id":79955450,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":205477644,"first_name":"Ahmed A.","last_name":"Mawgoud","domain_name":"independent","page_name":"AhmedAMawgoud","display_name":"Ahmed A. Mawgoud","profile_url":"https://independent.academia.edu/AhmedAMawgoud?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business?f_ri=4198","nofollow":true},{"id":3974,"name":"Telecommunications","url":"https://www.academia.edu/Documents/in/Telecommunications?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":12537,"name":"Egypt","url":"https://www.academia.edu/Documents/in/Egypt?f_ri=4198","nofollow":true},{"id":111368,"name":"Fraud","url":"https://www.academia.edu/Documents/in/Fraud?f_ri=4198"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE?f_ri=4198"},{"id":183960,"name":"Fraud Detection","url":"https://www.academia.edu/Documents/in/Fraud_Detection?f_ri=4198"},{"id":302688,"name":"Operator","url":"https://www.academia.edu/Documents/in/Operator?f_ri=4198"},{"id":689716,"name":"ITU","url":"https://www.academia.edu/Documents/in/ITU?f_ri=4198"},{"id":1789358,"name":"Fraud prevention","url":"https://www.academia.edu/Documents/in/Fraud_prevention?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_73910899" data-work_id="73910899" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/73910899/Smartphone_Apps_in_Education_Students_Create_Videos_to_Teach_Smartphone_Use_as_Tool_for_Learning">Smartphone Apps in Education: Students Create Videos to Teach Smartphone Use as Tool for Learning</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Smartphones are regular classroom accessories. Educators should work with children to understand the capacity of smartphones for learning and civic engagement, rather than being a classroom distraction. This research supports a... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_73910899" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Smartphones are regular classroom accessories. Educators should work with children to understand the capacity of smartphones for learning and civic engagement, rather than being a classroom distraction. This research supports a collaborative project the authors engaged in with students in two states to discover what the perception of smartphone use was by students and teachers. One element of this project included students producing YouTube style tutorials on the educational use of mobile apps. The authors explored smartphone use in the classroom. Student created products correlated to technology trends in K-12 education and their relationship with state by state demographic data.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/73910899" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8b35820ca07c444c69e1055a597b75f2" rel="nofollow" data-download="{"attachment_id":82254756,"asset_id":73910899,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82254756/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="17817339" href="https://uri.academia.edu/KaraClayton">Kara Clayton</a><script data-card-contents-for-user="17817339" type="text/json">{"id":17817339,"first_name":"Kara","last_name":"Clayton","domain_name":"uri","page_name":"KaraClayton","display_name":"Kara Clayton","profile_url":"https://uri.academia.edu/KaraClayton?f_ri=4198","photo":"https://0.academia-photos.com/17817339/10906532/20403249/s65_kara.clayton.jpg"}</script></span></span></li><li class="js-paper-rank-work_73910899 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="73910899"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 73910899, container: ".js-paper-rank-work_73910899", }); });</script></li><li class="js-percentile-work_73910899 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 73910899; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_73910899"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_73910899 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="73910899"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 73910899; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=73910899]").text(description); $(".js-view-count-work_73910899").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_73910899").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="73910899"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="221" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>, <script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="928" rel="nofollow" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a>, <script data-card-contents-for-ri="928" type="text/json">{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1003" rel="nofollow" href="https://www.academia.edu/Documents/in/Educational_Technology">Educational Technology</a>, <script data-card-contents-for-ri="1003" type="text/json">{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2246" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Literacy">Digital Literacy</a><script data-card-contents-for-ri="2246" type="text/json">{"id":2246,"name":"Digital Literacy","url":"https://www.academia.edu/Documents/in/Digital_Literacy?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=73910899]'), work: {"id":73910899,"title":"Smartphone Apps in Education: Students Create Videos to Teach Smartphone Use as Tool for Learning","created_at":"2022-03-16T15:53:28.357-07:00","url":"https://www.academia.edu/73910899/Smartphone_Apps_in_Education_Students_Create_Videos_to_Teach_Smartphone_Use_as_Tool_for_Learning?f_ri=4198","dom_id":"work_73910899","summary":"Smartphones are regular classroom accessories. Educators should work with children to understand the capacity of smartphones for learning and civic engagement, rather than being a classroom distraction. This research supports a collaborative project the authors engaged in with students in two states to discover what the perception of smartphone use was by students and teachers. One element of this project included students producing YouTube style tutorials on the educational use of mobile apps. The authors explored smartphone use in the classroom. Student created products correlated to technology trends in K-12 education and their relationship with state by state demographic data.","downloadable_attachments":[{"id":82254756,"asset_id":73910899,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":17817339,"first_name":"Kara","last_name":"Clayton","domain_name":"uri","page_name":"KaraClayton","display_name":"Kara Clayton","profile_url":"https://uri.academia.edu/KaraClayton?f_ri=4198","photo":"https://0.academia-photos.com/17817339/10906532/20403249/s65_kara.clayton.jpg"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=4198","nofollow":true},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=4198","nofollow":true},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=4198","nofollow":true},{"id":2246,"name":"Digital Literacy","url":"https://www.academia.edu/Documents/in/Digital_Literacy?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":8280,"name":"Media Literacy","url":"https://www.academia.edu/Documents/in/Media_Literacy?f_ri=4198"},{"id":15735,"name":"Media Literacy Education","url":"https://www.academia.edu/Documents/in/Media_Literacy_Education?f_ri=4198"},{"id":71409,"name":"Video Production","url":"https://www.academia.edu/Documents/in/Video_Production?f_ri=4198"},{"id":828832,"name":"Curriculum and Educational Technology","url":"https://www.academia.edu/Documents/in/Curriculum_and_Educational_Technology?f_ri=4198"},{"id":980572,"name":"Higher Secondary School Students","url":"https://www.academia.edu/Documents/in/Higher_Secondary_School_Students?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_73844198" data-work_id="73844198" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/73844198/USE_OF_INFORMATICS_IN_THE_TREATMENT_OF_ASTHMA">USE OF INFORMATICS IN THE TREATMENT OF ASTHMA</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Asthma is a critical disease that causes airway inflammation and recurrent episodes and has caused many patients to require high doses of inhaled corticosteroids. Informatics is helping patients and physicians to monitor the use of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_73844198" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Asthma is a critical disease that causes airway inflammation and recurrent episodes and has caused many patients to require high doses of inhaled corticosteroids. Informatics is helping patients and physicians to monitor the use of medications and also protect against misuse and insistent exacerbations. Informatics has also been used in discovering reactions to certain medications which help to improve asthmatic treatment prescriptions.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/73844198" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b33f3c4b8922fb127796716b466a7dd0" rel="nofollow" data-download="{"attachment_id":82210873,"asset_id":73844198,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/82210873/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3428325" href="https://ui-edu-ng.academia.edu/VictorEshameh">Victor Eshameh (MIRM)</a><script data-card-contents-for-user="3428325" type="text/json">{"id":3428325,"first_name":"Victor","last_name":"Eshameh (MIRM)","domain_name":"ui-edu-ng","page_name":"VictorEshameh","display_name":"Victor Eshameh (MIRM)","profile_url":"https://ui-edu-ng.academia.edu/VictorEshameh?f_ri=4198","photo":"https://0.academia-photos.com/3428325/1165920/41549046/s65_victor.eshameh.jpg"}</script></span></span></li><li class="js-paper-rank-work_73844198 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="73844198"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 73844198, container: ".js-paper-rank-work_73844198", }); });</script></li><li class="js-percentile-work_73844198 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 73844198; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_73844198"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_73844198 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="73844198"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 73844198; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=73844198]").text(description); $(".js-view-count-work_73844198").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_73844198").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="73844198"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="459" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Science">Information Science</a>, <script data-card-contents-for-ri="459" type="text/json">{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="586" rel="nofollow" href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a>, <script data-card-contents-for-ri="586" type="text/json">{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="923" rel="nofollow" href="https://www.academia.edu/Documents/in/Technology">Technology</a><script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=73844198]'), work: {"id":73844198,"title":"USE OF INFORMATICS IN THE TREATMENT OF ASTHMA","created_at":"2022-03-15T14:42:11.682-07:00","url":"https://www.academia.edu/73844198/USE_OF_INFORMATICS_IN_THE_TREATMENT_OF_ASTHMA?f_ri=4198","dom_id":"work_73844198","summary":"Asthma is a critical disease that causes airway inflammation and recurrent episodes and has caused many patients to require high doses of inhaled corticosteroids. Informatics is helping patients and physicians to monitor the use of medications and also protect against misuse and insistent exacerbations. Informatics has also been used in discovering reactions to certain medications which help to improve asthmatic treatment prescriptions. ","downloadable_attachments":[{"id":82210873,"asset_id":73844198,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3428325,"first_name":"Victor","last_name":"Eshameh (MIRM)","domain_name":"ui-edu-ng","page_name":"VictorEshameh","display_name":"Victor Eshameh (MIRM)","profile_url":"https://ui-edu-ng.academia.edu/VictorEshameh?f_ri=4198","photo":"https://0.academia-photos.com/3428325/1165920/41549046/s65_victor.eshameh.jpg"}],"research_interests":[{"id":459,"name":"Information Science","url":"https://www.academia.edu/Documents/in/Information_Science?f_ri=4198","nofollow":true},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=4198","nofollow":true},{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=4198","nofollow":true},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=4198","nofollow":true},{"id":1210,"name":"Informatics","url":"https://www.academia.edu/Documents/in/Informatics?f_ri=4198"},{"id":3286,"name":"Patient Safety","url":"https://www.academia.edu/Documents/in/Patient_Safety?f_ri=4198"},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":7055,"name":"Technology Management","url":"https://www.academia.edu/Documents/in/Technology_Management?f_ri=4198"},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=4198"},{"id":9968,"name":"Asthma","url":"https://www.academia.edu/Documents/in/Asthma?f_ri=4198"},{"id":11584,"name":"ICT for Development","url":"https://www.academia.edu/Documents/in/ICT_for_Development?f_ri=4198"},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health?f_ri=4198"},{"id":27885,"name":"ICT innovation","url":"https://www.academia.edu/Documents/in/ICT_innovation?f_ri=4198"},{"id":29393,"name":"Healthcare","url":"https://www.academia.edu/Documents/in/Healthcare?f_ri=4198"},{"id":522782,"name":"Information Technology and System Integration","url":"https://www.academia.edu/Documents/in/Information_Technology_and_System_Integration?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_72184439" data-work_id="72184439" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/72184439/Review_Domo_Buffer_Peredam_Guncangan_Mobil_by_Dokter_Mobil">Review: Domo Buffer Peredam Guncangan Mobil by Dokter Mobil</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Domo Buffer merupakan produk dari dokter mobil yang berfungi untuk shockbreaker mobil supaya gerakannya menjadi lebih stabil dan mobil tidak limbung dan bunyi gluduk-gluduk lagi</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/72184439" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="70e7cb2164c1af92c1c46d66141d1ab1" rel="nofollow" data-download="{"attachment_id":81214363,"asset_id":72184439,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/81214363/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="125351763" href="https://ui.academia.edu/AdiLesmana">Adi Lesmana</a><script data-card-contents-for-user="125351763" type="text/json">{"id":125351763,"first_name":"Adi","last_name":"Lesmana","domain_name":"ui","page_name":"AdiLesmana","display_name":"Adi Lesmana","profile_url":"https://ui.academia.edu/AdiLesmana?f_ri=4198","photo":"https://0.academia-photos.com/125351763/31831728/29044818/s65_adi.lesmana.jpg"}</script></span></span></li><li class="js-paper-rank-work_72184439 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="72184439"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 72184439, container: ".js-paper-rank-work_72184439", }); });</script></li><li class="js-percentile-work_72184439 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 72184439; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_72184439"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_72184439 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="72184439"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 72184439; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=72184439]").text(description); $(".js-view-count-work_72184439").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_72184439").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="72184439"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=72184439]'), work: {"id":72184439,"title":"Review: Domo Buffer Peredam Guncangan Mobil by Dokter Mobil","created_at":"2022-02-21T23:55:33.900-08:00","url":"https://www.academia.edu/72184439/Review_Domo_Buffer_Peredam_Guncangan_Mobil_by_Dokter_Mobil?f_ri=4198","dom_id":"work_72184439","summary":"Domo Buffer merupakan produk dari dokter mobil yang berfungi untuk shockbreaker mobil supaya gerakannya menjadi lebih stabil dan mobil tidak limbung dan bunyi gluduk-gluduk lagi","downloadable_attachments":[{"id":81214363,"asset_id":72184439,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":125351763,"first_name":"Adi","last_name":"Lesmana","domain_name":"ui","page_name":"AdiLesmana","display_name":"Adi Lesmana","profile_url":"https://ui.academia.edu/AdiLesmana?f_ri=4198","photo":"https://0.academia-photos.com/125351763/31831728/29044818/s65_adi.lesmana.jpg"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_57308852" data-work_id="57308852" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/57308852/Ecological_momentary_assessment_for_chronic_pain_in_fibromyalgia_using_a_smartphone_A_randomized_crossover_study">Ecological momentary assessment for chronic pain in fibromyalgia using a smartphone: A randomized crossover study</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">and by Generalitat Valenciana, Redes de Excelencia ISIC (ISIC/2012/012). Conflicts of interest None declared 'What's already known about this topic?' The use of Ecological Momentary Assessment (EMA) and Real time Data Capture (RTDC) in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_57308852" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">and by Generalitat Valenciana, Redes de Excelencia ISIC (ISIC/2012/012). Conflicts of interest None declared 'What's already known about this topic?' The use of Ecological Momentary Assessment (EMA) and Real time Data Capture (RTDC) in the field of chronic pain is a very useful tool for clinicians and researchers because it makes possible to gather more accurate and complete ratings of relevant variables. What does this study add? The findings of this study contribute with data supporting the use of smartphones for RTDC in a sample of fibromyalgia patients with an important proportion of participants with low educational levels and low familiarity with technology</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/57308852" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="aa1b6f9372436eb153e0c580e852186e" rel="nofollow" data-download="{"attachment_id":72272442,"asset_id":57308852,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/72272442/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36906344" href="https://independent.academia.edu/AGarciapalacios">A. Garcia-palacios</a><script data-card-contents-for-user="36906344" type="text/json">{"id":36906344,"first_name":"A.","last_name":"Garcia-palacios","domain_name":"independent","page_name":"AGarciapalacios","display_name":"A. Garcia-palacios","profile_url":"https://independent.academia.edu/AGarciapalacios?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_57308852 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="57308852"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 57308852, container: ".js-paper-rank-work_57308852", }); });</script></li><li class="js-percentile-work_57308852 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 57308852; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_57308852"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_57308852 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="57308852"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 57308852; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=57308852]").text(description); $(".js-view-count-work_57308852").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_57308852").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="57308852"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1750" rel="nofollow" href="https://www.academia.edu/Documents/in/Assessment">Assessment</a>, <script data-card-contents-for-ri="1750" type="text/json">{"id":1750,"name":"Assessment","url":"https://www.academia.edu/Documents/in/Assessment?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4479" rel="nofollow" href="https://www.academia.edu/Documents/in/Chronic_Pain">Chronic Pain</a>, <script data-card-contents-for-ri="4479" type="text/json">{"id":4479,"name":"Chronic Pain","url":"https://www.academia.edu/Documents/in/Chronic_Pain?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="8202" rel="nofollow" href="https://www.academia.edu/Documents/in/Cell_Phones">Cell Phones</a><script data-card-contents-for-ri="8202" type="text/json">{"id":8202,"name":"Cell Phones","url":"https://www.academia.edu/Documents/in/Cell_Phones?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=57308852]'), work: {"id":57308852,"title":"Ecological momentary assessment for chronic pain in fibromyalgia using a smartphone: A randomized crossover study","created_at":"2021-10-12T01:25:12.389-07:00","url":"https://www.academia.edu/57308852/Ecological_momentary_assessment_for_chronic_pain_in_fibromyalgia_using_a_smartphone_A_randomized_crossover_study?f_ri=4198","dom_id":"work_57308852","summary":"and by Generalitat Valenciana, Redes de Excelencia ISIC (ISIC/2012/012). Conflicts of interest None declared 'What's already known about this topic?' The use of Ecological Momentary Assessment (EMA) and Real time Data Capture (RTDC) in the field of chronic pain is a very useful tool for clinicians and researchers because it makes possible to gather more accurate and complete ratings of relevant variables. What does this study add? The findings of this study contribute with data supporting the use of smartphones for RTDC in a sample of fibromyalgia patients with an important proportion of participants with low educational levels and low familiarity with technology","downloadable_attachments":[{"id":72272442,"asset_id":57308852,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36906344,"first_name":"A.","last_name":"Garcia-palacios","domain_name":"independent","page_name":"AGarciapalacios","display_name":"A. Garcia-palacios","profile_url":"https://independent.academia.edu/AGarciapalacios?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1750,"name":"Assessment","url":"https://www.academia.edu/Documents/in/Assessment?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4479,"name":"Chronic Pain","url":"https://www.academia.edu/Documents/in/Chronic_Pain?f_ri=4198","nofollow":true},{"id":8202,"name":"Cell Phones","url":"https://www.academia.edu/Documents/in/Cell_Phones?f_ri=4198","nofollow":true},{"id":10729,"name":"Environmental Impact Assessment","url":"https://www.academia.edu/Documents/in/Environmental_Impact_Assessment?f_ri=4198"},{"id":88061,"name":"Fibromyalgia","url":"https://www.academia.edu/Documents/in/Fibromyalgia?f_ri=4198"},{"id":97269,"name":"Chronic Disease","url":"https://www.academia.edu/Documents/in/Chronic_Disease?f_ri=4198"},{"id":123871,"name":"Ecological momentary assessment","url":"https://www.academia.edu/Documents/in/Ecological_momentary_assessment?f_ri=4198"},{"id":244814,"name":"Clinical Sciences","url":"https://www.academia.edu/Documents/in/Clinical_Sciences?f_ri=4198"},{"id":250725,"name":"Evaluación Psicológica","url":"https://www.academia.edu/Documents/in/Evaluaci%C3%B3n_Psicol%C3%B3gica?f_ri=4198"},{"id":289271,"name":"Aged","url":"https://www.academia.edu/Documents/in/Aged?f_ri=4198"},{"id":581539,"name":"Ambulatory BP monitoring","url":"https://www.academia.edu/Documents/in/Ambulatory_BP_monitoring?f_ri=4198"},{"id":592438,"name":"Dolor Crónico","url":"https://www.academia.edu/Documents/in/Dolor_Cronico?f_ri=4198"},{"id":874382,"name":"Medical Records","url":"https://www.academia.edu/Documents/in/Medical_Records?f_ri=4198"},{"id":1239755,"name":"Neurosciences","url":"https://www.academia.edu/Documents/in/Neurosciences?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_53148009" data-work_id="53148009" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/53148009/Realising_Context_Sensitive_Mobile_Messaging">Realising Context-Sensitive Mobile Messaging</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/53148009" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0afc2843bc777d54b079cb9ec7c6381f" rel="nofollow" data-download="{"attachment_id":70071531,"asset_id":53148009,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/70071531/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="66431517" rel="nofollow" href="https://dcu.academia.edu/GarethJones">Gareth Jones</a><script data-card-contents-for-user="66431517" type="text/json">{"id":66431517,"first_name":"Gareth","last_name":"Jones","domain_name":"dcu","page_name":"GarethJones","display_name":"Gareth Jones","profile_url":"https://dcu.academia.edu/GarethJones?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_53148009 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="53148009"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 53148009, container: ".js-paper-rank-work_53148009", }); });</script></li><li class="js-percentile-work_53148009 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 53148009; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_53148009"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_53148009 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="53148009"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 53148009; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=53148009]").text(description); $(".js-view-count-work_53148009").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_53148009").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="53148009"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="21395" rel="nofollow" href="https://www.academia.edu/Documents/in/Telecommunication">Telecommunication</a>, <script data-card-contents-for-ri="21395" type="text/json">{"id":21395,"name":"Telecommunication","url":"https://www.academia.edu/Documents/in/Telecommunication?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="74026" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_technologies">Mobile technologies</a>, <script data-card-contents-for-ri="74026" type="text/json">{"id":74026,"name":"Mobile technologies","url":"https://www.academia.edu/Documents/in/Mobile_technologies?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="100231" rel="nofollow" href="https://www.academia.edu/Documents/in/Text_Messaging">Text Messaging</a><script data-card-contents-for-ri="100231" type="text/json">{"id":100231,"name":"Text Messaging","url":"https://www.academia.edu/Documents/in/Text_Messaging?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=53148009]'), work: {"id":53148009,"title":"Realising Context-Sensitive Mobile Messaging","created_at":"2021-09-21T11:02:09.686-07:00","url":"https://www.academia.edu/53148009/Realising_Context_Sensitive_Mobile_Messaging?f_ri=4198","dom_id":"work_53148009","summary":null,"downloadable_attachments":[{"id":70071531,"asset_id":53148009,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":66431517,"first_name":"Gareth","last_name":"Jones","domain_name":"dcu","page_name":"GarethJones","display_name":"Gareth Jones","profile_url":"https://dcu.academia.edu/GarethJones?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":21395,"name":"Telecommunication","url":"https://www.academia.edu/Documents/in/Telecommunication?f_ri=4198","nofollow":true},{"id":74026,"name":"Mobile technologies","url":"https://www.academia.edu/Documents/in/Mobile_technologies?f_ri=4198","nofollow":true},{"id":100231,"name":"Text Messaging","url":"https://www.academia.edu/Documents/in/Text_Messaging?f_ri=4198","nofollow":true},{"id":145671,"name":"Mobile Web","url":"https://www.academia.edu/Documents/in/Mobile_Web?f_ri=4198"},{"id":277283,"name":"Data transfer","url":"https://www.academia.edu/Documents/in/Data_transfer?f_ri=4198"},{"id":538108,"name":"Context Aware","url":"https://www.academia.edu/Documents/in/Context_Aware?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_53132949" data-work_id="53132949" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/53132949/Analysis_of_Learning_Outcomes_from_Mobile_Mathematics_Applications">Analysis of Learning Outcomes from Mobile Mathematics Applications</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The development, usage, and investigation of educational math applications for mobile devices have increased in recent years. This manuscript analyzes the current state of educational mathematics applications for K-12, higher learning,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_53132949" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The development, usage, and investigation of educational math applications for mobile devices have increased in recent years. This manuscript analyzes the current state of educational mathematics applications for K-12, higher learning, and professional needs. Specifically, we will highlight the current limitations, and provide a taxonomy of the features found in the most effective apps. Also, we specify the major components and considerations concerning math applications. Several methods of implementation are discussed within indicated learning contexts. Alignment with solid educational theory promotes the effectiveness of the apps, which has been replicated in multiple research studies. Finally, we provide an overview of the types of math apps and how to select one that fits a specific instructional need.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/53132949" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="876ef8fc854455a9435d2d9821e4b82e" rel="nofollow" data-download="{"attachment_id":70063407,"asset_id":53132949,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/70063407/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="65491871" href="https://independent.academia.edu/GaryBitter">Gary Bitter</a><script data-card-contents-for-user="65491871" type="text/json">{"id":65491871,"first_name":"Gary","last_name":"Bitter","domain_name":"independent","page_name":"GaryBitter","display_name":"Gary Bitter","profile_url":"https://independent.academia.edu/GaryBitter?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_53132949 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="53132949"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 53132949, container: ".js-paper-rank-work_53132949", }); });</script></li><li class="js-percentile-work_53132949 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 53132949; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_53132949"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_53132949 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="53132949"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 53132949; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=53132949]").text(description); $(".js-view-count-work_53132949").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_53132949").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="53132949"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="65030" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_apps">Mobile apps</a><script data-card-contents-for-ri="65030" type="text/json">{"id":65030,"name":"Mobile apps","url":"https://www.academia.edu/Documents/in/Mobile_apps?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=53132949]'), work: {"id":53132949,"title":"Analysis of Learning Outcomes from Mobile Mathematics Applications","created_at":"2021-09-21T08:29:00.533-07:00","url":"https://www.academia.edu/53132949/Analysis_of_Learning_Outcomes_from_Mobile_Mathematics_Applications?f_ri=4198","dom_id":"work_53132949","summary":"The development, usage, and investigation of educational math applications for mobile devices have increased in recent years. This manuscript analyzes the current state of educational mathematics applications for K-12, higher learning, and professional needs. Specifically, we will highlight the current limitations, and provide a taxonomy of the features found in the most effective apps. Also, we specify the major components and considerations concerning math applications. Several methods of implementation are discussed within indicated learning contexts. Alignment with solid educational theory promotes the effectiveness of the apps, which has been replicated in multiple research studies. Finally, we provide an overview of the types of math apps and how to select one that fits a specific instructional need.","downloadable_attachments":[{"id":70063407,"asset_id":53132949,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":65491871,"first_name":"Gary","last_name":"Bitter","domain_name":"independent","page_name":"GaryBitter","display_name":"Gary Bitter","profile_url":"https://independent.academia.edu/GaryBitter?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":65030,"name":"Mobile apps","url":"https://www.academia.edu/Documents/in/Mobile_apps?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43275111" data-work_id="43275111" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43275111/A_R_evolu%C3%A7%C3%A3o_das_Redes_sem_Fio">A (R)evolução das Redes sem Fio</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">A evolução e implícita revolução causada pela utilização das redes sem fio é discutida através de uma apresentação de suas tecnologias mais relevantes e seus domínios de aplicação atuais e futuros.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43275111" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="202c9056bb42aed51046d15f0c16e15f" rel="nofollow" data-download="{"attachment_id":63549259,"asset_id":43275111,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63549259/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="712118" href="https://unifacs.academia.edu/JobertoMartins">Joberto S B Martins</a><script data-card-contents-for-user="712118" type="text/json">{"id":712118,"first_name":"Joberto","last_name":"Martins","domain_name":"unifacs","page_name":"JobertoMartins","display_name":"Joberto S B Martins","profile_url":"https://unifacs.academia.edu/JobertoMartins?f_ri=4198","photo":"https://0.academia-photos.com/712118/241406/3938165/s65_joberto.martins.jpg"}</script></span></span></li><li class="js-paper-rank-work_43275111 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43275111"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43275111, container: ".js-paper-rank-work_43275111", }); });</script></li><li class="js-percentile-work_43275111 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43275111; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43275111"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43275111 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43275111"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43275111; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43275111]").text(description); $(".js-view-count-work_43275111").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43275111").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43275111"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2345" rel="nofollow" href="https://www.academia.edu/Documents/in/Wireless_Communications">Wireless Communications</a>, <script data-card-contents-for-ri="2345" type="text/json">{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4252" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Networks">Computer Networks</a>, <script data-card-contents-for-ri="4252" type="text/json">{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="9136" rel="nofollow" href="https://www.academia.edu/Documents/in/Wireless_Sensor_Networks">Wireless Sensor Networks</a><script data-card-contents-for-ri="9136" type="text/json">{"id":9136,"name":"Wireless Sensor Networks","url":"https://www.academia.edu/Documents/in/Wireless_Sensor_Networks?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43275111]'), work: {"id":43275111,"title":"A (R)evolução das Redes sem Fio","created_at":"2020-06-06T15:49:11.939-07:00","url":"https://www.academia.edu/43275111/A_R_evolu%C3%A7%C3%A3o_das_Redes_sem_Fio?f_ri=4198","dom_id":"work_43275111","summary":"A evolução e implícita revolução causada pela utilização das redes sem fio é discutida através de uma apresentação de suas tecnologias mais relevantes e seus domínios de aplicação atuais e futuros.","downloadable_attachments":[{"id":63549259,"asset_id":43275111,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":712118,"first_name":"Joberto","last_name":"Martins","domain_name":"unifacs","page_name":"JobertoMartins","display_name":"Joberto S B Martins","profile_url":"https://unifacs.academia.edu/JobertoMartins?f_ri=4198","photo":"https://0.academia-photos.com/712118/241406/3938165/s65_joberto.martins.jpg"}],"research_interests":[{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=4198","nofollow":true},{"id":9136,"name":"Wireless Sensor Networks","url":"https://www.academia.edu/Documents/in/Wireless_Sensor_Networks?f_ri=4198","nofollow":true},{"id":11841,"name":"Mobile and Telecommunicaions","url":"https://www.academia.edu/Documents/in/Mobile_and_Telecommunicaions?f_ri=4198"},{"id":18390,"name":"Mobile Phones","url":"https://www.academia.edu/Documents/in/Mobile_Phones?f_ri=4198"},{"id":18391,"name":"Mobile Communication","url":"https://www.academia.edu/Documents/in/Mobile_Communication?f_ri=4198"},{"id":22992,"name":"Wireless networks","url":"https://www.academia.edu/Documents/in/Wireless_networks?f_ri=4198"},{"id":23284,"name":"Wireless Networks (Computer Science)","url":"https://www.academia.edu/Documents/in/Wireless_Networks_Computer_Science_?f_ri=4198"},{"id":24038,"name":"Networking","url":"https://www.academia.edu/Documents/in/Networking?f_ri=4198"},{"id":26825,"name":"Mobile Computing","url":"https://www.academia.edu/Documents/in/Mobile_Computing?f_ri=4198"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=4198"},{"id":63224,"name":"Mobile Communications","url":"https://www.academia.edu/Documents/in/Mobile_Communications?f_ri=4198"},{"id":94471,"name":"Wireless Communications and Networking","url":"https://www.academia.edu/Documents/in/Wireless_Communications_and_Networking?f_ri=4198"},{"id":97182,"name":"Wireless Computing","url":"https://www.academia.edu/Documents/in/Wireless_Computing?f_ri=4198"},{"id":1232975,"name":"Wireless Communication","url":"https://www.academia.edu/Documents/in/Wireless_Communication-1?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42879236" data-work_id="42879236" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42879236/Virtual_presence_and_physical_beings_From_telegraph_to_telecast">Virtual presence and physical beings: From telegraph to telecast</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Written whilst a Research Fellow at ResCen, Centre for Creation Processes in the Performing Arts, Middlesex University, London, Autumn 2000 This paper was written 10 years into my work on virtual presence, just after directing 2... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_42879236" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Written whilst a Research Fellow at ResCen, Centre for Creation Processes in the Performing Arts, Middlesex University, London, Autumn 2000 <br /> <br />This paper was written 10 years into my work on virtual presence, just after directing 2 workshops focusing on the performative use of telematics (CellBytes00 at Arizona State University and Corpos Online at Lugar Commun in Portugal). The following paragraph sets the context of the debate. Ghislaine Boddington April 2020 <br /> <br />What is live? What is natural? What does it mean to be embodied? How many identities can one have? What is the essence of presence? This was a period of investigation for the performing arts, which have traditions deeply integrated with live presence through their special performer-to-spectator connection. My work as a director of performing arts has immersed me to work in to the dramaturgies and process design of virtual physical events. <br /> <br />Across the last thity years I have engaged with telepresence - led live event processes and have worked with many combinations of body technologies. I have been experimenting in the interface demands of the digitalised body alongside the live physical body. <br /> <br />This has for me brought up many questions which are highly topical in sectors well beyond the arts, as is in proof today with the COVID-19 extraordinary situation of lockdown, meaning advanced use of telepresence through video conferencing in all sectors globally. I detail some of this early work in the following text (written in 2000) and contextualise these explorations within the wider socio-cultural engagement with telephonics. This text explores some of the reasons why there is a need for far more in depth research and development of the concepts of presence (and therefore identity) that will exist in the future. <br /> <br />Please do look at further writings on ongoing work post 2000 by Ghislaine Boddington</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42879236" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1377c13de816adc27da7b7a8241799bc" rel="nofollow" data-download="{"attachment_id":63121598,"asset_id":42879236,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63121598/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13329083" href="https://gre.academia.edu/GhislaineBoddington">Ghislaine Boddington</a><script data-card-contents-for-user="13329083" type="text/json">{"id":13329083,"first_name":"Ghislaine","last_name":"Boddington","domain_name":"gre","page_name":"GhislaineBoddington","display_name":"Ghislaine Boddington","profile_url":"https://gre.academia.edu/GhislaineBoddington?f_ri=4198","photo":"https://0.academia-photos.com/13329083/3738075/34593657/s65_ghislaine.boddington.jpg"}</script></span></span></li><li class="js-paper-rank-work_42879236 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42879236"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42879236, container: ".js-paper-rank-work_42879236", }); });</script></li><li class="js-percentile-work_42879236 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42879236; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42879236"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42879236 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42879236"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42879236; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42879236]").text(description); $(".js-view-count-work_42879236").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42879236").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42879236"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">19</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="933" rel="nofollow" href="https://www.academia.edu/Documents/in/New_Media">New Media</a>, <script data-card-contents-for-ri="933" type="text/json">{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="945" rel="nofollow" href="https://www.academia.edu/Documents/in/Performing_Arts">Performing Arts</a>, <script data-card-contents-for-ri="945" type="text/json">{"id":945,"name":"Performing Arts","url":"https://www.academia.edu/Documents/in/Performing_Arts?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1197" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Humanities">Digital Humanities</a>, <script data-card-contents-for-ri="1197" type="text/json">{"id":1197,"name":"Digital Humanities","url":"https://www.academia.edu/Documents/in/Digital_Humanities?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2869" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a><script data-card-contents-for-ri="2869" type="text/json">{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42879236]'), work: {"id":42879236,"title":"Virtual presence and physical beings: From telegraph to telecast","created_at":"2020-04-28T07:30:15.964-07:00","url":"https://www.academia.edu/42879236/Virtual_presence_and_physical_beings_From_telegraph_to_telecast?f_ri=4198","dom_id":"work_42879236","summary":"Written whilst a Research Fellow at ResCen, Centre for Creation Processes in the Performing Arts, Middlesex University, London, Autumn 2000\r\n\r\nThis paper was written 10 years into my work on virtual presence, just after directing 2 workshops focusing on the performative use of telematics (CellBytes00 at Arizona State University and Corpos Online at Lugar Commun in Portugal). The following paragraph sets the context of the debate. Ghislaine Boddington April 2020\r\n\r\nWhat is live? What is natural? What does it mean to be embodied? How many identities can one have? What is the essence of presence? This was a period of investigation for the performing arts, which have traditions deeply integrated with live presence through their special performer-to-spectator connection. My work as a director of performing arts has immersed me to work in to the dramaturgies and process design of virtual physical events. \r\n\r\nAcross the last thity years I have engaged with telepresence - led live event processes and have worked with many combinations of body technologies. I have been experimenting in the interface demands of the digitalised body alongside the live physical body. \r\n\r\nThis has for me brought up many questions which are highly topical in sectors well beyond the arts, as is in proof today with the COVID-19 extraordinary situation of lockdown, meaning advanced use of telepresence through video conferencing in all sectors globally. I detail some of this early work in the following text (written in 2000) and contextualise these explorations within the wider socio-cultural engagement with telephonics. This text explores some of the reasons why there is a need for far more in depth research and development of the concepts of presence (and therefore identity) that will exist in the future. \r\n\r\nPlease do look at further writings on ongoing work post 2000 by Ghislaine Boddington","downloadable_attachments":[{"id":63121598,"asset_id":42879236,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13329083,"first_name":"Ghislaine","last_name":"Boddington","domain_name":"gre","page_name":"GhislaineBoddington","display_name":"Ghislaine Boddington","profile_url":"https://gre.academia.edu/GhislaineBoddington?f_ri=4198","photo":"https://0.academia-photos.com/13329083/3738075/34593657/s65_ghislaine.boddington.jpg"}],"research_interests":[{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=4198","nofollow":true},{"id":945,"name":"Performing Arts","url":"https://www.academia.edu/Documents/in/Performing_Arts?f_ri=4198","nofollow":true},{"id":1197,"name":"Digital Humanities","url":"https://www.academia.edu/Documents/in/Digital_Humanities?f_ri=4198","nofollow":true},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198"},{"id":8673,"name":"Digital Media \u0026 Learning","url":"https://www.academia.edu/Documents/in/Digital_Media_and_Learning?f_ri=4198"},{"id":10048,"name":"Future Media","url":"https://www.academia.edu/Documents/in/Future_Media?f_ri=4198"},{"id":12693,"name":"Body Image","url":"https://www.academia.edu/Documents/in/Body_Image?f_ri=4198"},{"id":16972,"name":"Telepresence","url":"https://www.academia.edu/Documents/in/Telepresence?f_ri=4198"},{"id":21603,"name":"New media art (Telepresence)","url":"https://www.academia.edu/Documents/in/New_media_art_Telepresence_?f_ri=4198"},{"id":21842,"name":"Virtual Worlds","url":"https://www.academia.edu/Documents/in/Virtual_Worlds?f_ri=4198"},{"id":29167,"name":"Dance","url":"https://www.academia.edu/Documents/in/Dance?f_ri=4198"},{"id":29962,"name":"Body Art","url":"https://www.academia.edu/Documents/in/Body_Art?f_ri=4198"},{"id":36193,"name":"Body and Technology","url":"https://www.academia.edu/Documents/in/Body_and_Technology?f_ri=4198"},{"id":40461,"name":"Online Identity and Presence","url":"https://www.academia.edu/Documents/in/Online_Identity_and_Presence?f_ri=4198"},{"id":226366,"name":"Connectivity","url":"https://www.academia.edu/Documents/in/Connectivity?f_ri=4198"},{"id":712017,"name":"Virtual touch","url":"https://www.academia.edu/Documents/in/Virtual_touch?f_ri=4198"},{"id":1034059,"name":"Virtual Reality (Presence)","url":"https://www.academia.edu/Documents/in/Virtual_Reality_Presence_?f_ri=4198"},{"id":3661642,"name":"virtual beings","url":"https://www.academia.edu/Documents/in/virtual_beings?f_ri=4198"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38489666 coauthored" data-work_id="38489666" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38489666/Missed_Opportunity_Leveraging_Mobile_Technology_to_Reduce_Racial_Health_Disparities">Missed Opportunity? Leveraging Mobile Technology to Reduce Racial Health Disparities</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Blacks and Latinos are less likely than whites to access health insurance and utilize health care. One way to overcome some of these racial barriers to health equity may be through advances in technology that allow people to access and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38489666" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Blacks and Latinos are less likely than whites to access health insurance and utilize health care. One way to overcome some of these racial barriers to health equity may be through advances in technology that allow people to access and utilize health care in innovative ways. Yet, little research has focused on whether the racial gap that exists for health care utilization also exists for accessing health information online and through mobile technologies. Using data from the Health Information National Trends Survey (HINTS), we examine racial differences in obtaining health information online via mobile devices. We find that blacks and Latinos are more likely to trust online newspapers to get health information than whites. Minorities who have access to a mobile device are more likely to rely on the Internet for health information in a time of strong need. Federally insured individuals who are connected to mobile devices have the highest probability of reliance on the Internet as a go-to source of health information. We conclude by discussing the importance of mobile technologies for health policy, particularly related to developing health literacy, improving health outcomes, and contributing to reducing health disparities by race and health insurance status.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38489666" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="eafed4b2110cf80c381bdc257eb844e3" rel="nofollow" data-download="{"attachment_id":58556640,"asset_id":38489666,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58556640/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2245418" href="https://emory.academia.edu/AbigailSewell">Abigail A Sewell</a><script data-card-contents-for-user="2245418" type="text/json">{"id":2245418,"first_name":"Abigail","last_name":"Sewell","domain_name":"emory","page_name":"AbigailSewell","display_name":"Abigail A Sewell","profile_url":"https://emory.academia.edu/AbigailSewell?f_ri=4198","photo":"https://0.academia-photos.com/2245418/716197/8839974/s65_abigail.sewell.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-38489666">+1</span><div class="hidden js-additional-users-38489666"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/JenniferDRoberts">Jennifer D. Roberts</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-38489666'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-38489666').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_38489666 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38489666"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38489666, container: ".js-paper-rank-work_38489666", }); });</script></li><li class="js-percentile-work_38489666 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38489666; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38489666"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38489666 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38489666"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38489666; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38489666]").text(description); $(".js-view-count-work_38489666").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38489666").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38489666"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4441" rel="nofollow" href="https://www.academia.edu/Documents/in/Health_Care">Health Care</a>, <script data-card-contents-for-ri="4441" type="text/json">{"id":4441,"name":"Health Care","url":"https://www.academia.edu/Documents/in/Health_Care?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="10733" rel="nofollow" href="https://www.academia.edu/Documents/in/Health_Care_and_Social_Service_Access_and_Utilization">Health Care and Social Service Access and Utilization</a>, <script data-card-contents-for-ri="10733" type="text/json">{"id":10733,"name":"Health Care and Social Service Access and Utilization","url":"https://www.academia.edu/Documents/in/Health_Care_and_Social_Service_Access_and_Utilization?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="16288" rel="nofollow" href="https://www.academia.edu/Documents/in/Public_Health">Public Health</a><script data-card-contents-for-ri="16288" type="text/json">{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38489666]'), work: {"id":38489666,"title":"Missed Opportunity? Leveraging Mobile Technology to Reduce Racial Health Disparities","created_at":"2019-03-04T23:38:45.667-08:00","url":"https://www.academia.edu/38489666/Missed_Opportunity_Leveraging_Mobile_Technology_to_Reduce_Racial_Health_Disparities?f_ri=4198","dom_id":"work_38489666","summary":"Blacks and Latinos are less likely than whites to access health insurance and utilize health care. One way to overcome some of these racial barriers to health equity may be through advances in technology that allow people to access and utilize health care in innovative ways. Yet, little research has focused on whether the racial gap that exists for health care utilization also exists for accessing health information online and through mobile technologies. Using data from the Health Information National Trends Survey (HINTS), we examine racial differences in obtaining health information online via mobile devices. We find that blacks and Latinos are more likely to trust online newspapers to get health information than whites. Minorities who have access to a mobile device are more likely to rely on the Internet for health information in a time of strong need. Federally insured individuals who are connected to mobile devices have the highest probability of reliance on the Internet as a go-to source of health information. We conclude by discussing the importance of mobile technologies for health policy, particularly related to developing health literacy, improving health outcomes, and contributing to reducing health disparities by race and health insurance status.","downloadable_attachments":[{"id":58556640,"asset_id":38489666,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2245418,"first_name":"Abigail","last_name":"Sewell","domain_name":"emory","page_name":"AbigailSewell","display_name":"Abigail A Sewell","profile_url":"https://emory.academia.edu/AbigailSewell?f_ri=4198","photo":"https://0.academia-photos.com/2245418/716197/8839974/s65_abigail.sewell.jpg"},{"id":105243879,"first_name":"Jennifer D.","last_name":"Roberts","domain_name":"independent","page_name":"JenniferDRoberts","display_name":"Jennifer D. Roberts","profile_url":"https://independent.academia.edu/JenniferDRoberts?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":4441,"name":"Health Care","url":"https://www.academia.edu/Documents/in/Health_Care?f_ri=4198","nofollow":true},{"id":10733,"name":"Health Care and Social Service Access and Utilization","url":"https://www.academia.edu/Documents/in/Health_Care_and_Social_Service_Access_and_Utilization?f_ri=4198","nofollow":true},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35043439 coauthored" data-work_id="35043439" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35043439/A_system_for_reliable_and_scalable_ground_truth_generation_and_traffic_classification_of_mobile_apps_encrypted_traffic">A system for reliable and scalable ground truth generation and traffic classification of mobile apps encrypted traffic</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35043439" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the kind of traffic that travels over home and enterprise networks and the Internet.<br /><br />TC comes with its own challenges and requirements that are even exacerbated in a mobile-traffic context, such as: (a) the adoption of encrypted protocols (b) a large number of apps to discriminate from, (c) the dynamic nature of network traffic and, more importantly, (d) the lack of a satisfactory flow-level Ground Truth (GT) to train the classification algorithms on, and test and compare them against.<br /><br />For this reason, this work proposes a novel self-supervised TC architecture composed of two main blocks: (i) an automatic GT generation tool and (ii) a Multi-Classifier System (MCS). The first block automatically produces a corpus of traffic traces with flow-level labeling, the label being the package name and version (uniquely identifying the mobile app); this is exploited to rapidly train (or re-train), in a supervised way, the proposed MCS, which is then employed on classification of true (human-generated) mobile traffic.<br /><br />In more detail, in the first block of the proposed system each app package of interest is automatically installed and run on a (physical- or virtual-) device connected to a network where all traffic generated or received by the device can be captured. Then the Graphical User Interface (GUI) of the app is explored, generating events as taps and keystrokes, causing the generation of network traffic. The GUI explorer is based on Android GUI Ripper, a tool implementing both Random and Active Learning techniques. The device is instrumented with a logger that records all network-related system calls originated by the exercised app to properly associate traffic flows with originating process names, thus avoiding mislabeling traffic from other apps or from the operating system. The traffic generated by the device is captured on a host (wireless access point) from which the device can also be controlled (e.g. via USB).<br /><br />The second block is represented by a MCS which intelligently-combines decisions from state-of-the-art (base) classifiers specifically devised for mobile- and encrypted-traffic classification. The MCS is intended to overcome the deficiencies of each single classifier (not improvable over a certain bound, despite efforts in “tuning”) and provide improved performance with respect to any of the base classifiers. The proposed MCS is not restricted to a specific set of classification algorithms and also allows for modularity of classifiers' selection in the pool. Additionally, the MCS can adopt several types of combiners (based on both hard and soft approaches) developed in the literature constituting a wide spectrum of achievable performance, operational complexity, and training set requirements.<br /><br />Preliminary results show that our system is able to: (i) automatically run mobile apps making them generate sufficient traffic to train a MCS; (ii) obtain promising results in terms of classification accuracy of new mobile apps traffic.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35043439" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7f70e4cd3df76aedc352c0f99ee19e31" rel="nofollow" data-download="{"attachment_id":54904250,"asset_id":35043439,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54904250/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="977036" href="https://unina.academia.edu/DomenicoCiuonzo">Domenico Ciuonzo</a><script data-card-contents-for-user="977036" type="text/json">{"id":977036,"first_name":"Domenico","last_name":"Ciuonzo","domain_name":"unina","page_name":"DomenicoCiuonzo","display_name":"Domenico Ciuonzo","profile_url":"https://unina.academia.edu/DomenicoCiuonzo?f_ri=4198","photo":"https://0.academia-photos.com/977036/843333/16238301/s65_domenico.ciuonzo.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-35043439">+1</span><div class="hidden js-additional-users-35043439"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://unina.academia.edu/WalterdeDonato">Walter de Donato</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-35043439'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-35043439').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_35043439 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35043439"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35043439, container: ".js-paper-rank-work_35043439", }); });</script></li><li class="js-percentile-work_35043439 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35043439; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35043439"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35043439 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35043439"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35043439; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35043439]").text(description); $(".js-view-count-work_35043439").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35043439").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35043439"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a>, <script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="195045" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Traffic_Classification">Internet Traffic Classification</a><script data-card-contents-for-ri="195045" type="text/json">{"id":195045,"name":"Internet Traffic Classification","url":"https://www.academia.edu/Documents/in/Internet_Traffic_Classification?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35043439]'), work: {"id":35043439,"title":"A system for reliable and scalable ground truth generation and traffic classification of mobile apps encrypted traffic","created_at":"2017-11-03T07:31:37.062-07:00","url":"https://www.academia.edu/35043439/A_system_for_reliable_and_scalable_ground_truth_generation_and_traffic_classification_of_mobile_apps_encrypted_traffic?f_ri=4198","dom_id":"work_35043439","summary":"The process of associating (labeling) network traffic with specific applications or application types, known as Traffic Classification (TC), is increasingly challenged by the growing usage of smartphones, which is profoundly changing the kind of traffic that travels over home and enterprise networks and the Internet.\n\nTC comes with its own challenges and requirements that are even exacerbated in a mobile-traffic context, such as: (a) the adoption of encrypted protocols (b) a large number of apps to discriminate from, (c) the dynamic nature of network traffic and, more importantly, (d) the lack of a satisfactory flow-level Ground Truth (GT) to train the classification algorithms on, and test and compare them against.\n\nFor this reason, this work proposes a novel self-supervised TC architecture composed of two main blocks: (i) an automatic GT generation tool and (ii) a Multi-Classifier System (MCS). The first block automatically produces a corpus of traffic traces with flow-level labeling, the label being the package name and version (uniquely identifying the mobile app); this is exploited to rapidly train (or re-train), in a supervised way, the proposed MCS, which is then employed on classification of true (human-generated) mobile traffic.\n\nIn more detail, in the first block of the proposed system each app package of interest is automatically installed and run on a (physical- or virtual-) device connected to a network where all traffic generated or received by the device can be captured. Then the Graphical User Interface (GUI) of the app is explored, generating events as taps and keystrokes, causing the generation of network traffic. The GUI explorer is based on Android GUI Ripper, a tool implementing both Random and Active Learning techniques. The device is instrumented with a logger that records all network-related system calls originated by the exercised app to properly associate traffic flows with originating process names, thus avoiding mislabeling traffic from other apps or from the operating system. The traffic generated by the device is captured on a host (wireless access point) from which the device can also be controlled (e.g. via USB).\n\nThe second block is represented by a MCS which intelligently-combines decisions from state-of-the-art (base) classifiers specifically devised for mobile- and encrypted-traffic classification. The MCS is intended to overcome the deficiencies of each single classifier (not improvable over a certain bound, despite efforts in “tuning”) and provide improved performance with respect to any of the base classifiers. The proposed MCS is not restricted to a specific set of classification algorithms and also allows for modularity of classifiers' selection in the pool. Additionally, the MCS can adopt several types of combiners (based on both hard and soft approaches) developed in the literature constituting a wide spectrum of achievable performance, operational complexity, and training set requirements.\n\nPreliminary results show that our system is able to: (i) automatically run mobile apps making them generate sufficient traffic to train a MCS; (ii) obtain promising results in terms of classification accuracy of new mobile apps traffic.","downloadable_attachments":[{"id":54904250,"asset_id":35043439,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":977036,"first_name":"Domenico","last_name":"Ciuonzo","domain_name":"unina","page_name":"DomenicoCiuonzo","display_name":"Domenico Ciuonzo","profile_url":"https://unina.academia.edu/DomenicoCiuonzo?f_ri=4198","photo":"https://0.academia-photos.com/977036/843333/16238301/s65_domenico.ciuonzo.jpg"},{"id":33027483,"first_name":"Walter","last_name":"de Donato","domain_name":"unina","page_name":"WalterdeDonato","display_name":"Walter de Donato","profile_url":"https://unina.academia.edu/WalterdeDonato?f_ri=4198","photo":"https://gravatar.com/avatar/038e049ac435c2dce4049cbc5e66884c?s=65"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true},{"id":195045,"name":"Internet Traffic Classification","url":"https://www.academia.edu/Documents/in/Internet_Traffic_Classification?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19227470" data-work_id="19227470" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19227470/Are_University_Students_Ready_to_Dump_Their_Textbooks">Are University Students Ready to Dump Their Textbooks?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Today's students are accustomed to a world where information is available on-demand, anywhere and anytime. They bring this expectation to their academic world where they want to work cooperatively and flexibly, using the modern... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19227470" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Today's students are accustomed to a world where information is available on-demand, anywhere and anytime. They bring this expectation to their academic world where they want to work cooperatively and flexibly, using the modern information processing tools and access with which they are familiar. New hardware platforms such as e-Readers and tablet computers have made substantial inroads in the consumer market. E-Readers are becoming more prevalent in universitiesreplacing the need for physical textbooks, lecturing notes and other academic documents. Many universities are now running pilot programs, while some are already using e-Readers. Tablet computers, apart from their ability to read, edit or create various types of information documents, also offer additional features such as collaborative and social networking services. This empirical research project investigated student perspectives on the educational use of e-Readers and tablets within the University of Cape Town. A questionnaire was distributed to a significant portion of the student population and stratified according to seniority and faculty. Quantitative data was gathered and analysed on themes ranging from awareness to preferences to facilitating conditions around e-Readers within the academic environment. The students sent a clear signal: that they are keen to embrace these new technologies and the advantages they offer. E-Books can be updated automatically and downloaded to e-Readers instantly from almost anywhere in the world. Students feel they would benefit greatly through the use of e-Readers and many believe they are set to replace books completely. Having access to a portable library of information in their backpacks would benefit both students and the environment. However, there are a number of barriers to the comprehensive introduction of these technologies, including the cost of the devices; cost, rights and file format of e-books; the need for a critical mass of textbooks available in digital format and device characteristics such as battery life, and ubiquitous Wi-Fi access.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19227470" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cb0f5b97a398dcd2c7e92e402fb5b046" rel="nofollow" data-download="{"attachment_id":40502927,"asset_id":19227470,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40502927/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="235701" href="https://uct.academia.edu/JeanPaulVanBelle">Jean-Paul Van Belle</a><script data-card-contents-for-user="235701" type="text/json">{"id":235701,"first_name":"Jean-Paul","last_name":"Van Belle","domain_name":"uct","page_name":"JeanPaulVanBelle","display_name":"Jean-Paul Van Belle","profile_url":"https://uct.academia.edu/JeanPaulVanBelle?f_ri=4198","photo":"https://0.academia-photos.com/235701/2799039/3263971/s65_jean-paul.van_belle.jpg"}</script></span></span></li><li class="js-paper-rank-work_19227470 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19227470"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19227470, container: ".js-paper-rank-work_19227470", }); });</script></li><li class="js-percentile-work_19227470 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19227470; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19227470"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19227470 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19227470"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19227470; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19227470]").text(description); $(".js-view-count-work_19227470").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19227470").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19227470"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2621" rel="nofollow" href="https://www.academia.edu/Documents/in/Higher_Education">Higher Education</a>, <script data-card-contents-for-ri="2621" type="text/json">{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=4198","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19227470]'), work: {"id":19227470,"title":"Are University Students Ready to Dump Their Textbooks?","created_at":"2015-11-30T05:25:33.555-08:00","url":"https://www.academia.edu/19227470/Are_University_Students_Ready_to_Dump_Their_Textbooks?f_ri=4198","dom_id":"work_19227470","summary":"Today's students are accustomed to a world where information is available on-demand, anywhere and anytime. They bring this expectation to their academic world where they want to work cooperatively and flexibly, using the modern information processing tools and access with which they are familiar. New hardware platforms such as e-Readers and tablet computers have made substantial inroads in the consumer market. E-Readers are becoming more prevalent in universitiesreplacing the need for physical textbooks, lecturing notes and other academic documents. Many universities are now running pilot programs, while some are already using e-Readers. Tablet computers, apart from their ability to read, edit or create various types of information documents, also offer additional features such as collaborative and social networking services. This empirical research project investigated student perspectives on the educational use of e-Readers and tablets within the University of Cape Town. A questionnaire was distributed to a significant portion of the student population and stratified according to seniority and faculty. Quantitative data was gathered and analysed on themes ranging from awareness to preferences to facilitating conditions around e-Readers within the academic environment. The students sent a clear signal: that they are keen to embrace these new technologies and the advantages they offer. E-Books can be updated automatically and downloaded to e-Readers instantly from almost anywhere in the world. Students feel they would benefit greatly through the use of e-Readers and many believe they are set to replace books completely. Having access to a portable library of information in their backpacks would benefit both students and the environment. However, there are a number of barriers to the comprehensive introduction of these technologies, including the cost of the devices; cost, rights and file format of e-books; the need for a critical mass of textbooks available in digital format and device characteristics such as battery life, and ubiquitous Wi-Fi access.","downloadable_attachments":[{"id":40502927,"asset_id":19227470,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":235701,"first_name":"Jean-Paul","last_name":"Van Belle","domain_name":"uct","page_name":"JeanPaulVanBelle","display_name":"Jean-Paul Van Belle","profile_url":"https://uct.academia.edu/JeanPaulVanBelle?f_ri=4198","photo":"https://0.academia-photos.com/235701/2799039/3263971/s65_jean-paul.van_belle.jpg"}],"research_interests":[{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=4198","nofollow":true},{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18549366" data-work_id="18549366" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18549366/Implementation_and_Analysis_of_The_Condition_of_Car_Engine_Based_on_Acoustic_Characteistics_Using_Wavelet_Transformation_Method_on_The_Android_Platform">Implementation and Analysis of The Condition of Car Engine Based on Acoustic Characteistics Using Wavelet Transformation Method on The Android Platform</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Suara mesin mobil merupakan salah satu indikator dalam proses pemeriksaan kondisi mobil. Dengan mendengar suara mesin mobil, sering kali para montir dapat mendiagnosa kondisi suatu mobil. Maka dari itu, di jaman yang serba modern ini... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_18549366" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Suara mesin mobil merupakan salah satu indikator dalam proses pemeriksaan kondisi mobil. Dengan mendengar suara mesin mobil, sering kali para montir dapat mendiagnosa kondisi suatu mobil. Maka dari itu, di jaman yang serba modern ini diperlukan suatu pengembangan teknologi agar setiap pengguna kendaraan roda empat ini dapat mengetahui kondisi mobilnya, apakah dalam keadaan sempurna, baik, cukup (layak untuk digunakan), rusak atau bahkan rusak parah. Sehingga dalam tugas akhir ini, dirancang suatu sistem yang dapat mendeteksi kondisi mobil melalui ciri akustiknya yang diimplementasikan pada perangkat berbasis android.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18549366" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e3b81f13473a2e0b0cd5e7134728b87d" rel="nofollow" data-download="{"attachment_id":40123341,"asset_id":18549366,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40123341/download_file?st=MTczOTgwMjU5Nyw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="38585061" href="https://blospsot.academia.edu/VanessaCatalinaFuadi">Vanessa Catalina Fuadi</a><script data-card-contents-for-user="38585061" type="text/json">{"id":38585061,"first_name":"Vanessa","last_name":"Catalina Fuadi","domain_name":"blospsot","page_name":"VanessaCatalinaFuadi","display_name":"Vanessa Catalina Fuadi","profile_url":"https://blospsot.academia.edu/VanessaCatalinaFuadi?f_ri=4198","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_18549366 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18549366"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18549366, container: ".js-paper-rank-work_18549366", }); });</script></li><li class="js-percentile-work_18549366 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18549366; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18549366"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18549366 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18549366"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18549366; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18549366]").text(description); $(".js-view-count-work_18549366").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18549366").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18549366"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="4198" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Technology">Mobile Technology</a><script data-card-contents-for-ri="4198" type="text/json">{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18549366]'), work: {"id":18549366,"title":"Implementation and Analysis of The Condition of Car Engine Based on Acoustic Characteistics Using Wavelet Transformation Method on The Android Platform","created_at":"2015-11-17T19:56:58.814-08:00","url":"https://www.academia.edu/18549366/Implementation_and_Analysis_of_The_Condition_of_Car_Engine_Based_on_Acoustic_Characteistics_Using_Wavelet_Transformation_Method_on_The_Android_Platform?f_ri=4198","dom_id":"work_18549366","summary":"Suara mesin mobil merupakan salah satu indikator dalam proses pemeriksaan kondisi mobil. Dengan mendengar suara mesin mobil, sering kali para montir dapat mendiagnosa kondisi suatu mobil. Maka dari itu, di jaman yang serba modern ini diperlukan suatu pengembangan teknologi agar setiap pengguna kendaraan roda empat ini dapat mengetahui kondisi mobilnya, apakah dalam keadaan sempurna, baik, cukup (layak untuk digunakan), rusak atau bahkan rusak parah. Sehingga dalam tugas akhir ini, dirancang suatu sistem yang dapat mendeteksi kondisi mobil melalui ciri akustiknya yang diimplementasikan pada perangkat berbasis android.","downloadable_attachments":[{"id":40123341,"asset_id":18549366,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":38585061,"first_name":"Vanessa","last_name":"Catalina Fuadi","domain_name":"blospsot","page_name":"VanessaCatalinaFuadi","display_name":"Vanessa Catalina Fuadi","profile_url":"https://blospsot.academia.edu/VanessaCatalinaFuadi?f_ri=4198","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4198,"name":"Mobile Technology","url":"https://www.academia.edu/Documents/in/Mobile_Technology?f_ri=4198","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Mobile_Technology?after=50%2C18549366" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Mobile_Technology?page=last">Last »</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Media">Mobile Media</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2871">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2871">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Learning">Mobile Learning</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1763">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1763">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="9246">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="9246">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Communication">Mobile Communication</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="18391">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="18391">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2869">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2869">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/New_Media">New Media</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="933">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="933">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Mobile_Computing">Mobile Computing</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="26825">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="26825">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Technology">Technology</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="923">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="923">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Web_2.0">Web 2.0</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="984">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="984">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="491">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="491">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Mobile_Technology" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; } .sign-in-with-apple-button > div { margin: 0 auto; / This centers the Apple-rendered button horizontally }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "8f661b6f40d4411e7809a7f901ca2bc827d7ea2cc345724b8a1f325c70d07eea", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="r1XOoz45xCUuNu4ubOTH8hZnjVH3BLraiicJNcjsDZaTQbu68Vo5-Epw792-0OVnotjS0ezyZECgYLOrl4jGcg" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Mobile_Technology" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="xStqqxVesLloYZfw_7PTPeu0iomlsdRiDWVgXMl8zrf5Px-y2j1NZAwnlgMth_GoXwvVCb5HCvgnItrClhgFUw" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/hc/en-us"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>