CINXE.COM

Search results for: mobile devices

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: mobile devices</title> <meta name="description" content="Search results for: mobile devices"> <meta name="keywords" content="mobile devices"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="mobile devices" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="mobile devices"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3795</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: mobile devices</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3795</span> Exploring the Factors Affecting the Dependability of Mobile Devices in the Current World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mayowa%20A.%20Sofowora">Mayowa A. Sofowora</a>, <a href="https://publications.waset.org/abstracts/search?q=Seraphim%20D.%20Eyono%20Obono"> Seraphim D. Eyono Obono</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent times the level of advancement in electronics and manufacturing technologies for portable electronic devices, especially for mobile devices such as cell phones, smartphones, personal digital assistants and tablet computers is unprecedented. Mobile devices have become indispensable to individuals, and businesses all over the world. The high level of manufacturing and production of mobile devices has led to the rapid release of newer and sleeker models with new features and capabilities. However, these newer models therefore render older models obsolete, and this pushes people to frequently replace their devices. The drawback of such frequent replacements is that a large number of devices are disposed and they end up as e-waste. The fact that e-waste constitutes a major hazard to human health and to the environment is the motivation behind this study whose aim is to develop a model of possible factors that affects the dependability of mobile devices which in turn leads to the obsolescence of these devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dependability" title="dependability">dependability</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a>, <a href="https://publications.waset.org/abstracts/search?q=obsolescence" title=" obsolescence"> obsolescence</a>, <a href="https://publications.waset.org/abstracts/search?q=e-waste" title=" e-waste"> e-waste</a> </p> <a href="https://publications.waset.org/abstracts/36744/exploring-the-factors-affecting-the-dependability-of-mobile-devices-in-the-current-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3794</span> Examining How Youth Use Mobile Devices for Health Information: Preliminary Findings of a Survey Study with High School Students in Croatia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sung%20Un%20Kim">Sung Un Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivana%20Martinovi%C4%87"> Ivana Martinović</a>, <a href="https://publications.waset.org/abstracts/search?q=Snje%C5%BEana%20Stanarevi%C4%87%20Katavi%C4%87"> Snježana Stanarević Katavić</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As more and more youth use mobile devices, such as tablets and smartphones, for information seeking in their everyday lives, the purpose of this study is to understand the behaviors of youth seeking health information on mobile devices. The specific objective of this study is to examine 1) for what health issues youth use mobile devices, 2) for what reasons youth use mobile devices to obtain health information, 3) in what ways youth use mobile devices for health information, and 4) the features of health applications that youth find useful. The researchers devised a questionnaire for this study. Four hundred eight students from two high schools, located in Osijek, Croatia, participated by answering the questionnaire (281 girls and 127 boys). The collected data were analyzed using descriptive statistics and content analysis. The results show that among all participants, about 85 percent (n = 344) reported having used mobile devices for health information. The most frequent health topic for which they had been using mobile devices is physical activity (n = 273), followed by eating issues and nutrition (n = 224), mental health (n = 160), sexual health (n = 157), alcohol, drugs, and tobacco (n = 125), safety (n = 96) and particular diseases (n = 62). They use mobile devices to obtain health information due to the ease of use (n = 342), the ease of sharing health information (n = 281), portability (n = 215), timeliness (n = 162), and the ease of tracking/recording/monitoring health status (n = 147). Of those who have used mobile devices for health information, three-quarters (n = 261) use mobile devices to search health information, while 32.8% (n =113) use applications and 31.7% (n =109) browse information. Those who have used applications for health information (n = 113) consider the alert feature (n=107) as the most useful, followed by the tracking/recording/monitoring feature (n =92), the customized information feature (n = 86), the video feature (n = 58), and the sharing feature (n =39). It is notable that although health applications have been actively developed and studied, a majority of the participants search for or browse information on mobile devices, instead of using applications. The researchers will discuss reasons that some of them did not use mobile devices to obtain health information, students’ concerns about using health applications, and features that they wish to have in health applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Croatia" title="Croatia">Croatia</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information" title=" health information"> health information</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20seeking%20behaviors" title=" information seeking behaviors"> information seeking behaviors</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a>, <a href="https://publications.waset.org/abstracts/search?q=youth" title=" youth"> youth</a> </p> <a href="https://publications.waset.org/abstracts/64244/examining-how-youth-use-mobile-devices-for-health-information-preliminary-findings-of-a-survey-study-with-high-school-students-in-croatia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64244.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">402</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3793</span> Toward a Re-Definition of Mobile Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirna%20Diab">Mirna Diab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile learning, or M-learning, drives the development of new teaching, learning, and assessment strategies in schools and colleges. With initiatives across states, districts, and institutions, the United States leads mobile learning, significantly impacting education. Since 2010, over 2,3 million American pupils have received their education via mobile devices, demonstrating its rapid expansion. Nonetheless, mobile learning lacks a consistent and explicit definition that helps educators, students, and stakeholders grasp its essence and implement it effectively. This article addresses the need for a revised definition by introducing readers to various mobile learning concepts and understandings. It seeks to raise awareness, clarify, and encourage making well-informed decisions regarding its incorporation as a potent learning tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20pedagogy" title=" mobile pedagogy"> mobile pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technological%20devices" title=" mobile technological devices"> mobile technological devices</a>, <a href="https://publications.waset.org/abstracts/search?q=learner%20mobility" title=" learner mobility"> learner mobility</a> </p> <a href="https://publications.waset.org/abstracts/169586/toward-a-re-definition-of-mobile-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3792</span> Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Fezan%20Afzal">Muhammad Fezan Afzal</a>, <a href="https://publications.waset.org/abstracts/search?q=Imran%20Khan"> Imran Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Salma%20Imtiaz"> Salma Imtiaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fingerprint" title="fingerprint">fingerprint</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint%20authentication" title=" fingerprint authentication"> fingerprint authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20verification" title=" mobile verification"> mobile verification</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20biometric%20verification" title=" mobile biometric verification"> mobile biometric verification</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20fingerprint%20sensor" title=" mobile fingerprint sensor"> mobile fingerprint sensor</a> </p> <a href="https://publications.waset.org/abstracts/171752/biometric-identification-with-latitude-and-longitude-fingerprint-verification-for-attendance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171752.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3791</span> New Possibilities for Testing UX and UI Design on Mobile Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jakub%20Ber%C4%8D%C3%ADk">Jakub Berčík</a>, <a href="https://publications.waset.org/abstracts/search?q=Anna%20Mravcov%C3%A1"> Anna Mravcová</a>, <a href="https://publications.waset.org/abstracts/search?q=Jana%20G%C3%A1lov%C3%A1"> Jana Gálová</a>, <a href="https://publications.waset.org/abstracts/search?q=Katar%C3%ADna%20Neom%C3%A1niov%C3%A1"> Katarína Neomániová</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In an era when everything is increasingly digital, consumers are always looking for new options in solutions to their everyday needs. In this context, mobile apps are developing at an exponential pace. One of the fastest growing segments of mobile technologies is, obviously, e-commerce. It can be predicted that mobile commerce will record nearly three times the global growth of e-commerce across all platforms, which indicates its importance in the given segment. The current coronavirus pandemic is also changing many of the existing paradigms both socially, economically, and technologically, which has a major impact on changing consumer behaviour and the emphasis on simplification and clarity of mobile solutions. This is the area that user experience (UX) and user interface (UI) designers deal with. Their task is to design a sufficiently attractive and interesting solution that will be available on all mobile devices and at the same time will be easy enough for the customer/visitor to get to the destination or to get the necessary information in a few clicks. The basis for changes in UX design can now be obtained not only through online analytical tools but also through neuromarketing, especially in the case of mobile devices. The paper highlights new possibilities for testing UX design applications on mobile devices using a special platform that combines a stationary eye camera (eye tracking) and facial analysis (facial coding). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotions" title="emotions">emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20design" title=" mobile design"> mobile design</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20experience" title=" user experience"> user experience</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20attention" title=" visual attention"> visual attention</a> </p> <a href="https://publications.waset.org/abstracts/144168/new-possibilities-for-testing-ux-and-ui-design-on-mobile-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144168.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3790</span> Sharing Experience in Authentic Learning for Mobile Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kai%20Qian">Kai Qian</a>, <a href="https://publications.waset.org/abstracts/search?q=Lixin%20Tao"> Lixin Tao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title="mobile computing">mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Android" title=" Android"> Android</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=labware" title=" labware"> labware</a> </p> <a href="https://publications.waset.org/abstracts/7212/sharing-experience-in-authentic-learning-for-mobile-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3789</span> Usage and Benefits of Handheld Devices as Educational Tools in Higher Institutions of Learning in Lagos State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abiola%20A.%20Sokoya">Abiola A. Sokoya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Handheld devices are now in use as educational tools for learning in most of the higher institutions, because of the features and functions which can be used in an academic environment. This study examined the usage and the benefits of handheld devices as learning tools. A structured questionnaire was used to collect data, while the data collected was analyzed using simple percentage. It was, however, observed that handheld devices offer numerous functions and application for learning, which could improve academic performance of students. Students are now highly interested in using handheld devices for mobile learning apart from making and receiving calls. The researchers recommended that seminars be organized for students on functions of some common handheld devices that can aid learning for academic purposes. It is also recommended that management of each higher institution should make appropriate policies in-line with the usage of handheld technologies to enhance mobile learning. Government should ensure that appropriate policies and regulations are put in place for the importation of high quality handheld devices into the country, Nigeria being a market place for the technologies. By this, using handheld devices for mobile learning will be enhanced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=handheld%20devices" title="handheld devices">handheld devices</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20tools" title=" educational tools"> educational tools</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20e-%20learning" title=" mobile e- learning"> mobile e- learning</a>, <a href="https://publications.waset.org/abstracts/search?q=usage" title=" usage"> usage</a>, <a href="https://publications.waset.org/abstracts/search?q=benefits" title=" benefits"> benefits</a> </p> <a href="https://publications.waset.org/abstracts/46664/usage-and-benefits-of-handheld-devices-as-educational-tools-in-higher-institutions-of-learning-in-lagos-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46664.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">228</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3788</span> Secure Mobile E-Business Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hala%20A.%20Alrumaih">Hala A. Alrumaih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-business" title="e-business">e-business</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20mitigations" title=" risk mitigations"> risk mitigations</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20assurance" title=" security assurance"> security assurance</a> </p> <a href="https://publications.waset.org/abstracts/16632/secure-mobile-e-business-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16632.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">295</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3787</span> Cryptocurrency-Based Mobile Payments with Near-Field Communication-Enabled Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marko%20Niinimaki">Marko Niinimaki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cryptocurrencies are getting increasingly popular, but very few of them can be conveniently used in daily mobile phone purchases. To solve this problem, we demonstrate how to build a functional prototype of a mobile cryptocurrency-based e-commerce application the communicates with Near-Field Communication (NFC) tags. Using the system, users are able to purchase physical items with an NFC tag that contains an e-commerce URL. The payment is done simply by touching the tag with a mobile device and accepting the payment. Our method is constructive: we describe the design and technologies used in the implementation and evaluate the security and performance of the solution. Our main finding is that the analysis and measurements show that our solution is feasible for e-commerce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/96702/cryptocurrency-based-mobile-payments-with-near-field-communication-enabled-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96702.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3786</span> Mobile Application Testing Matrix and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bakhtiar%20Amen">Bakhtiar Amen</a>, <a href="https://publications.waset.org/abstracts/search?q=Sardasht%20Mahmood"> Sardasht Mahmood</a>, <a href="https://publications.waset.org/abstracts/search?q=Joan%20Lu"> Joan Lu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The adoption of smartphones and the usages of mobile applications are increasing rapidly. Consequently, within limited time-range, mobile Internet usages have managed to take over the desktop usages particularly since the first smartphone-touched application released by iPhone in 2007. This paper is proposed to provide solution and answer the most demandable questions related to mobile application automated and manual testing limitations. Moreover, Mobile application testing requires agility and physically testing. Agile testing is to detect bugs through automated tools, whereas the compatibility testing is more to ensure that the apps operates on mobile OS (Operation Systems) as well as on the different real devices. Moreover, we have managed to answer automated or manual questions through two mobile application case studies MES (Mobile Exam System) and MLM (Mobile Lab Mate) by creating test scripts for both case studies and our experiment results have been discussed and evaluated on whether to adopt test on real devices or on emulators? In addition to this, we have introduced new mobile application testing matrix for the testers and some enterprises to obtain knowledge from. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20app%20testing" title="mobile app testing">mobile app testing</a>, <a href="https://publications.waset.org/abstracts/search?q=testing%20matrix" title=" testing matrix"> testing matrix</a>, <a href="https://publications.waset.org/abstracts/search?q=automated" title=" automated"> automated</a>, <a href="https://publications.waset.org/abstracts/search?q=manual%20testing" title=" manual testing "> manual testing </a> </p> <a href="https://publications.waset.org/abstracts/23955/mobile-application-testing-matrix-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">478</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3785</span> Malware Detection in Mobile Devices by Analyzing Sequences of System Calls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jorge%20Maestre%20Vidal">Jorge Maestre Vidal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Lucila%20Sandoval%20Orozco"> Ana Lucila Sandoval Orozco</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Javier%20Garc%C3%ADa%20Villalba"> Luis Javier García Villalba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=android" title="android">android</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20systems" title=" intrusion detection systems"> intrusion detection systems</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/70344/malware-detection-in-mobile-devices-by-analyzing-sequences-of-system-calls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70344.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3784</span> Research and Development of Methodology, Tools, Techniques and Methods to Analyze and Design Interface, Media, Pedagogy for Educational Topics to be Delivered via Mobile Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shimaa%20Nagro">Shimaa Nagro</a>, <a href="https://publications.waset.org/abstracts/search?q=Russell%20Campion"> Russell Campion</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices are becoming ever more widely available, with growing functionality, and they are increasingly used as enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material's user interfaces for mobile devices is beset by many unresolved research problems such as those arising from constraints associated with mobile devices or from issues linked to effective learning. The proposed research aims to produce: (i) a method framework for the design and evaluation of educational material’s interfaces to be delivered on mobile devices, in multimedia form based on Human Computer Interaction strategies; and (ii) a software tool implemented as a fast-track alternative to use the method framework in full. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the method framework. The method framework is a framework to enable an educational designer to effectively and efficiently create educational multimedia interfaces to be used on mobile devices by following a particular methodology that contains practical and usable tools and techniques. It is a method framework that accepts any educational material in its final lesson plan and deals with this plan as a static element, it will not suggest any changes in any information given in the lesson plan but it will help the instructor to design his final lesson plan in a multimedia format to be presented in mobile devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=M-Learn" title=" M-Learn"> M-Learn</a>, <a href="https://publications.waset.org/abstracts/search?q=HCI" title=" HCI"> HCI</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20multimedia" title=" educational multimedia"> educational multimedia</a>, <a href="https://publications.waset.org/abstracts/search?q=interface%20design" title=" interface design"> interface design</a> </p> <a href="https://publications.waset.org/abstracts/29145/research-and-development-of-methodology-tools-techniques-and-methods-to-analyze-and-design-interface-media-pedagogy-for-educational-topics-to-be-delivered-via-mobile-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29145.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3783</span> Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rajeev%20Kumar%20Bedi">Rajeev Kumar Bedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaswinder%20Singh"> Jaswinder Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunil%20Kumar%20Gupta"> Sunil Kumar Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud storage is a model of online data storage where data is stored in virtualized pool of servers hosted by third parties (CSPs) and located in different geographical locations. Cloud storage revolutionized the way how users access their data online anywhere, anytime and using any device as a tablet, mobile, laptop, etc. A lot of issues as vendor lock-in, frequent service outage, data loss and performance related issues exist in single cloud storage systems. So to evade these issues, the concept of multi cloud storage introduced. There are a lot of multi cloud storage systems exists in the market for mobile devices. In this article, we are providing comparison of four multi cloud storage systems for mobile devices Otixo, Unclouded, Cloud Fuze, and Clouds and evaluate their performance on the basis of CPU usage, battery consumption, time consumption and data usage parameters on three mobile phones Nexus 5, Moto G and Nexus 7 tablet and using Wi-Fi network. Finally, open research challenges and future scope are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20storage" title="cloud storage">cloud storage</a>, <a href="https://publications.waset.org/abstracts/search?q=multi%20cloud%20storage" title=" multi cloud storage"> multi cloud storage</a>, <a href="https://publications.waset.org/abstracts/search?q=vendor%20lock-in" title=" vendor lock-in"> vendor lock-in</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a> </p> <a href="https://publications.waset.org/abstracts/68075/multi-cloud-storage-systems-for-resource-constrained-mobile-devices-comparison-and-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68075.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3782</span> Cloud-Based Mobile-to-Mobile Computation Offloading</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebrahim%20Alrashed">Ebrahim Alrashed</a>, <a href="https://publications.waset.org/abstracts/search?q=Yousef%20Rafique"> Yousef Rafique</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computational%20offloading" title="computational offloading">computational offloading</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20conservation" title=" power conservation"> power conservation</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud" title=" cloud"> cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=sandboxing" title=" sandboxing"> sandboxing</a> </p> <a href="https://publications.waset.org/abstracts/33107/cloud-based-mobile-to-mobile-computation-offloading" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33107.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3781</span> Using Mobile Phones for M-Learning in Higher Education: A Comparative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islam%20Elsayed%20Hussein%20Ali">Islam Elsayed Hussein Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Stefan%20M.%20Wagner"> Stefan M. Wagner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Smartphone and tablet computers, as well as other ultra portable devices, have already gained enough critical mass to be considered mainstream devices, being present in the daily lives of millions of higher education students. Many universities throughout the world have already adopted or are planning to adopt mobile technologies in many of their courses as a better way to connect students with the subjects they are studying. These new mobile platforms allow students to access content anywhere/anytime to immerse himself/herself into that content (alone or interacting with teachers or colleagues via web communication forms) and to interact with that content in ways that were not previously possible. This paper plans to provide a thorough overview of the possibilities and consequences of m-learning in higher education environments as a gateway to ubiquitous learning – perhaps the ultimate form of learner engagement, since it allows the student to learn, access and interact with important content in any way or at any time or place he might want so the objective of the study is to examine how the usage of mobile phones for m-learning differs between heavy and light mobile phone users at TU Braunschweig. Heavy mobile phone users are hypothesized to have access to/subscribe to one type of mobile content than light mobile phone users, to have less frequent access to, subscribe to or purchase mobile content within the last year than light mobile phone users, and to pay less money for mobile learning, its content and mobile games than light mobile phone users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=technologies" title=" technologies"> technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=applications" title=" applications"> applications</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a> </p> <a href="https://publications.waset.org/abstracts/36822/using-mobile-phones-for-m-learning-in-higher-education-a-comparative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36822.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3780</span> Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20Parveen%20Begam">H. Parveen Begam</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Maluk%20Mohamed"> M. A. Maluk Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20grid%20computing" title="mobile grid computing">mobile grid computing</a>, <a href="https://publications.waset.org/abstracts/search?q=certificate%20authority%20%28CA%29" title=" certificate authority (CA)"> certificate authority (CA)</a>, <a href="https://publications.waset.org/abstracts/search?q=SSL%2FTLS%20protocol" title=" SSL/TLS protocol"> SSL/TLS protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=secured%20service%20certificates" title=" secured service certificates"> secured service certificates</a> </p> <a href="https://publications.waset.org/abstracts/29817/adaptive-certificate-based-mutual-authentication-protocol-for-mobile-grid-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29817.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3779</span> The Effect of Mobile Technology Use in Education: A Meta-Analysis Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C5%9Eirin%20K%C3%BC%C3%A7%C3%BCk">Şirin Küçük</a>, <a href="https://publications.waset.org/abstracts/search?q=Ay%C5%9Fe%20K%C3%B6k"> Ayşe Kök</a>, <a href="https://publications.waset.org/abstracts/search?q=%C4%B0smail%20%C5%9Eahin"> İsmail Şahin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile devices are very popular and useful tools for assisting people in daily life. With the advancement of mobile technologies, the issue of mobile learning has been widely investigated in education. Many researches consider that it is important to integrate pedagogical and technical strengths of mobile technology into learning environments. For this reason, the purpose of this research is to examine the effect of mobile technology use in education with meta-analysis method. Meta-analysis is a statistical technique which combines the findings of independent studies in a specific subject. In this respect, the articles will be examined by searching the databases for researches which are conducted between 2005 and 2014. It is expected that the results of this research will contribute to future research related to mobile technology use in education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title="mobile learning">mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=meta-analysis" title=" meta-analysis"> meta-analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technology" title=" mobile technology"> mobile technology</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a> </p> <a href="https://publications.waset.org/abstracts/20062/the-effect-of-mobile-technology-use-in-education-a-meta-analysis-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20062.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">720</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3778</span> Challenges in Multi-Cloud Storage Systems for Mobile Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rajeev%20Kumar%20Bedi">Rajeev Kumar Bedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaswinder%20Singh"> Jaswinder Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunil%20Kumar%20Gupta"> Sunil Kumar Gupta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20storage" title="cloud storage">cloud storage</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title=" data privacy"> data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=multi%20cloud%20storage" title=" multi cloud storage"> multi cloud storage</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/68072/challenges-in-multi-cloud-storage-systems-for-mobile-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68072.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">699</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3777</span> Students’ Perceptions of Mobile Learning: Case Study of Kuwait</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rana%20AlHajri">Rana AlHajri</a>, <a href="https://publications.waset.org/abstracts/search?q=Salah%20Al-Sharhan"> Salah Al-Sharhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Al-Hunaiyyan"> Ahmed Al-Hunaiyyan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile learning is a new learning landscape that offers opportunity for collaborative, personal, informal, and students&rsquo; centered learning environment. In implementing any learning system such as a mobile learning environment, learners&rsquo; expectations should be taken into consideration. However, there is a lack of studies on this aspect, particularly in the context of Kuwait higher education (HE) institutions. This study focused on how students perceive the use of mobile devices in learning. Although m-learning is considered as an effective educational tool in developed countries, it is not yet fully utilized in Kuwait. The study reports on the results of a survey conducted on 623 HE students in Kuwait to a better understand students&#39; perceptions and opinions about the effectiveness of using mobile learning systems. An analysis of quantitative survey data is presented. The findings indicated that Kuwait HE students are very familiar with mobile devices and its applications. The results also reveal that students have positive perceptions of m-learning, and believe that video-based social media applications enhance the teaching and learning process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title="higher education">higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=students%E2%80%99%20perceptions" title=" students’ perceptions"> students’ perceptions</a> </p> <a href="https://publications.waset.org/abstracts/63997/students-perceptions-of-mobile-learning-case-study-of-kuwait" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63997.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">369</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3776</span> Exploring the Use of Mobile Technologies in Schools in Oman; Opportunities and Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muna%20Al-Siyabi">Muna Al-Siyabi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When students bring mobile devices into the classrooms, they are frequently viewed as distractions from their daily educational practices rather than developing the twenty-first century skills. Such skills may involve sorting and extracting information, solving problems and evaluating results. Mobile devices, such as smartphones and tablets, have great potential for learning. Currently, schools and universities are embracing these devices with the aim of enhancing education. In Oman, mobile technologies have been introduced in the last ten years in two private schools to keep pace with the technological advancement. The researcher set out to examine the benefits and challenges of employing mobile learning in these two schools with the aim to inform the implementation of mobile technologies in more schools in Oman. The total of 16 teachers and 237 students responded to questionnaires, and 7 teachers and three student focus groups (of 13 students) were involved in interviews to explore how mobile technologies are used in these two schools. The questionnaires indicated that 87.5% of the sample teachers considered mobile learning helpful for learning and teaching. The teachers believed that mobile learning could promote learning, help teaching, offer vast resources, motivate students and save lesson time. Moreover, interviews with the teachers showed that mobile learning could offer several benefits like immediacy, saving lesson time, supporting differentiation, opportunities to learn anywhere, showing understanding, and offering vast resources. Most of the sample were also facing technical and classroom management challenges when employing mobile technologies in their lessons. In the interviews, most teachers complained of the difficulty to control their classes when they had mobile devices, which distracted their attention and understanding. They reported that their students were distracted by games and they needed to be trained to use mobile technologies for educational purposes. Most teachers recommended that certain parameters or restrictions should be established in any mobile learning project that restrict the usage of mobile technologies to educational purposes. In addition, teachers also emphasised that students needed to be trained on the advantages and limitations of mobile technologies. Teachers were also recommending that pedagogical training for using mobile technologies should be considered when implementing mobile learning in schools. These findings reveal that although of the challenges of managing their classes, teachers believe that mobile learning has great potential for learning. These results imply that mobile learning can be effectively implemented in school in Oman if certain factors and restrictions are considered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=effective%20implementation" title="effective implementation">effective implementation</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges" title=" challenges"> challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=opportunities" title=" opportunities"> opportunities</a> </p> <a href="https://publications.waset.org/abstracts/49455/exploring-the-use-of-mobile-technologies-in-schools-in-oman-opportunities-and-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">216</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3775</span> A Theoretical Framework for Design Theories in Mobile Learning: A Higher Education Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paduri%20Veerabhadram">Paduri Veerabhadram</a>, <a href="https://publications.waset.org/abstracts/search?q=Antoinette%20Lombard"> Antoinette Lombard</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper a framework for hypothesizing about mobile learning to complement theories of formal and informal learning is presented. As such, activity theory will form the main theoretical lens through which the elements involved in formal and informal learning for mobile learning will be explored, specifically related to context-aware mobile learning application. The author believes that the complexity of the relationships involved can best be analysed using activity theory. Activity theory, as a social, cultural and activity theory can be used as a mobile learning framework in an academic environment, but to develop an optimal artifact, through investigation of inherent system's contradictions. As such, it serves as a powerful modelling tool to explore and understand the design of a mobile learning environment in the study’s environment. The Academic Tool Kit Framework (ATKF) as also employed for designing of a constructivism learning environment, effective in assisting universities to facilitate lecturers to effectively implement learning through utilizing mobile devices. Results indicate a positive perspective of students in the use of mobile devices for formal and informal learning, based on the context-aware learning environment developed through the use of activity theory and ATKF. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collaborative%20learning" title="collaborative learning">collaborative learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperative%20learning" title=" cooperative learning"> cooperative learning</a>, <a href="https://publications.waset.org/abstracts/search?q=context-aware%20learning%20environment" title=" context-aware learning environment"> context-aware learning environment</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=pedagogy" title=" pedagogy"> pedagogy</a> </p> <a href="https://publications.waset.org/abstracts/32401/a-theoretical-framework-for-design-theories-in-mobile-learning-a-higher-education-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32401.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">568</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3774</span> A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hafiza%20Khaddija%20Saman">Hafiza Khaddija Saman</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Sufyan"> Muhammad Sufyan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=protocol" title="protocol">protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=ad-Hoc" title=" ad-Hoc"> ad-Hoc</a>, <a href="https://publications.waset.org/abstracts/search?q=communication" title=" communication"> communication</a> </p> <a href="https://publications.waset.org/abstracts/43620/a-review-of-routing-protocols-for-mobile-ad-hoc-networks-manet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43620.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">261</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3773</span> Determinants of the Users Intention of Social-Local-Mobile Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Chen%20Chen">Chia-Chen Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Mu-Yen%20Chen"> Mu-Yen Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SoLoMo%20%28social" title="SoLoMo (social">SoLoMo (social</a>, <a href="https://publications.waset.org/abstracts/search?q=local" title=" local"> local</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20mobile%29" title=" and mobile)"> and mobile)</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation%20diffusion%20theory" title=" innovation diffusion theory"> innovation diffusion theory</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20externality" title=" network externality"> network externality</a> </p> <a href="https://publications.waset.org/abstracts/13054/determinants-of-the-users-intention-of-social-local-mobile-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">528</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3772</span> Managers’ Mobile Information Behavior in an Openness Paradigm Era</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abd%20Latif%20Abdul%20Rahman">Abd Latif Abdul Rahman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuraidah%20Arif"> Zuraidah Arif</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Faizal%20Iylia"> Muhammad Faizal Iylia</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Ghazali"> Mohd Ghazali</a>, <a href="https://publications.waset.org/abstracts/search?q=Asmadi%20Mohammed%20Ghazali"> Asmadi Mohammed Ghazali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20information%20behavior" title="mobile information behavior">mobile information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20behavior" title=" information behavior"> information behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20information" title=" mobile information"> mobile information</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a> </p> <a href="https://publications.waset.org/abstracts/45724/managers-mobile-information-behavior-in-an-openness-paradigm-era" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3771</span> UniFi: Universal Filter Model for Image Enhancement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aleksei%20Samarin">Aleksei Samarin</a>, <a href="https://publications.waset.org/abstracts/search?q=Artyom%20Nazarenko"> Artyom Nazarenko</a>, <a href="https://publications.waset.org/abstracts/search?q=Valentin%20Malykh"> Valentin Malykh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Image enhancement is becoming more and more popular, especially on mobile devices. Nowadays, it is a common approach to enhance an image using a convolutional neural network (CNN). Such a network should be of significant size; otherwise, a possibility for the artifacts to occur is overgrowing. The existing large CNNs are computationally expensive, which could be crucial for mobile devices. Another important flaw of such models is they are poorly interpretable. There is another approach to image enhancement, namely, the usage of predefined filters in combination with the prediction of their applicability. We present an approach following this paradigm, which outperforms both existing CNN-based and filter-based approaches in the image enhancement task. It is easily adaptable for mobile devices since it has only 47 thousand parameters. It shows the best SSIM 0.919 on RANDOM250 (MIT Adobe FiveK) among small models and is thrice faster than previous models. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=universal%20filter" title="universal filter">universal filter</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20enhancement" title=" image enhancement"> image enhancement</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20vision" title=" computer vision"> computer vision</a> </p> <a href="https://publications.waset.org/abstracts/151664/unifi-universal-filter-model-for-image-enhancement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151664.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3770</span> Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Hadi%20Khorashadi%20Zadeh">Mohammad Hadi Khorashadi Zadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BYOD" title="BYOD">BYOD</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20cloud%20computing" title=" mobile cloud computing"> mobile cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20security" title=" mobile security"> mobile security</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20management" title=" information management"> information management</a> </p> <a href="https://publications.waset.org/abstracts/45737/secure-intelligent-information-management-by-using-a-framework-of-virtual-phones-on-cloud-computation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45737.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">317</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3769</span> The Adoption of Mobile Learning in Saudi Women Faculty in King Abdulaziz University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Leena%20Alfarani">Leena Alfarani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although mobile devices are ubiquitous on university campuses, teacher-readiness for mobile learning has yet to be fully explored in the non-western nations. This study shows that two main factors affect the adoption and use of m-learning among female teachers within a university in Saudi Arabia—resistance to change and perceived social culture. These determinants of the current use and intention to use of m-learning were revealed through the analysis of an online questionnaire completed by 165 female faculty members. This study reveals several important issues for m-learning research and practice. The results further extend the body of knowledge in the field of m-learning, with the findings revealing that resistance to change and perceived social culture are significant determinants of the current use of and the intention to use m-learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blended%20learning" title="blended learning">blended learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20learning" title=" mobile learning"> mobile learning</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20adoption" title=" technology adoption"> technology adoption</a>, <a href="https://publications.waset.org/abstracts/search?q=devices" title=" devices"> devices</a> </p> <a href="https://publications.waset.org/abstracts/28249/the-adoption-of-mobile-learning-in-saudi-women-faculty-in-king-abdulaziz-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28249.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">464</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3768</span> People Abandoning Mobile Social Games: Using Candy Crush Saga as an Example</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pei-Shan%20Wei">Pei-Shan Wei</a>, <a href="https://publications.waset.org/abstracts/search?q=Szu-Ying%20Lee"> Szu-Ying Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hsi-Peng%20Lu"> Hsi-Peng Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jen-Chuen%20Tzou"> Jen-Chuen Tzou</a>, <a href="https://publications.waset.org/abstracts/search?q=Chien-I%20Weng"> Chien-I Weng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile social games recently become extremely popular, spawning a whole new entertainment culture. However, mobile game players are fickle, quickly and easily picking up and abandoning games. This pilot study seeks to identify factors that influence users to discontinue playing mobile social games. We identified three sacrifices which can prompt users to abandon games: monetary sacrifice, time sacrifice and privacy sacrifice. The results showed that monetary sacrifice has a greater impact than the other two factors in causing players to discontinue usage intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=abandon" title="abandon">abandon</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20devices" title=" mobile devices"> mobile devices</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20social%20games" title=" mobile social games"> mobile social games</a>, <a href="https://publications.waset.org/abstracts/search?q=perceived%20sacrifice" title=" perceived sacrifice"> perceived sacrifice</a> </p> <a href="https://publications.waset.org/abstracts/15547/people-abandoning-mobile-social-games-using-candy-crush-saga-as-an-example" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15547.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">495</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3767</span> Transferring Data from Glucometer to Mobile Device via Bluetooth with Arduino Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tolga%20Hayit">Tolga Hayit</a>, <a href="https://publications.waset.org/abstracts/search?q=Ucman%20Ergun"> Ucman Ergun</a>, <a href="https://publications.waset.org/abstracts/search?q=Ugur%20Fidan"> Ugur Fidan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Being healthy is undoubtedly an indispensable necessity for human life. With technological improvements, in the literature, various health monitoring and imaging systems have been developed to satisfy your health needs. In this context, the work of monitoring and recording the data of individual health monitoring data via wireless technology is also being part of these studies. Nowadays, mobile devices which are located in almost every house and which become indispensable of our life and have wireless technology infrastructure have an important place of making follow-up health everywhere and every time because these devices were using in the health monitoring systems. In this study, Arduino an open-source microcontroller card was used in which a sample sugar measuring device was connected in series. In this way, the glucose data (glucose ratio, time) obtained with the glucometer is transferred to the mobile device based on the Android operating system with the Bluetooth technology channel. A mobile application was developed using the Apache Cordova framework for listing data, presenting graphically and reading data over Arduino. Apache Cordova, HTML, Javascript and CSS are used in coding section. The data received from the glucometer is stored in the local database of the mobile device. It is intended that people can transfer their measurements to their mobile device by using wireless technology and access the graphical representations of their data. In this context, the aim of the study is to be able to perform health monitoring by using different wireless technologies in mobile devices that can respond to different wireless technologies at present. Thus, that will contribute the other works done in this area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arduino" title="Arduino">Arduino</a>, <a href="https://publications.waset.org/abstracts/search?q=Bluetooth" title=" Bluetooth"> Bluetooth</a>, <a href="https://publications.waset.org/abstracts/search?q=glucose%20measurement" title=" glucose measurement"> glucose measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20health%20monitoring" title=" mobile health monitoring"> mobile health monitoring</a> </p> <a href="https://publications.waset.org/abstracts/79642/transferring-data-from-glucometer-to-mobile-device-via-bluetooth-with-arduino-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79642.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">322</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3766</span> Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Dennis">Huang Dennis</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelio%20Aziel"> Aurelio Aziel</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20operating%20system" title="mobile operating system">mobile operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Malware" title=" Malware"> Malware</a> </p> <a href="https://publications.waset.org/abstracts/168876/study-on-security-and-privacy-issues-of-mobile-operating-systems-based-on-malware-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=126">126</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=127">127</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=mobile%20devices&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10