• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 334
  • 160
  • 58
  • 53
  • 23
  • 18
  • 14
  • 13
  • 11
  • 11
  • 7
  • 6
  • 4
  • 4
  • 3
  • Tagged with
  • 765
  • 173
  • 133
  • 105
  • 99
  • 97
  • 87
  • 83
  • 82
  • 59
  • 59
  • 58
  • 57
  • 52
  • 49
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
361

Smarttelefonen - en säkerhetsrisk i samhället

Engberg, Emelie, Landerup, Marina January 1900 (has links)
Den tekniska utvecklingen i samhället går fortare och fortare framåt. Idag är det inte ovanligt att mobiltelefonerna används för att göra bankärenden, hantera e-post och vara aktiv på sociala medier. Tekniker och lösningar som utvecklas ska vara kostnadseffektiva och användarvänliga, men är detta på bekostnad av informationssäkerheten? Frågeställningar som har besvarat handlar om vilka sårbarheter i tekniken som angripare kan utnyttja för att ta sig in i en telefon, hur det upptäcks och vilka proaktiva åtgärder som kan implementeras. Dessutom har det undersökts hur personer använder sina smarta telefoner och hur pass insatta personer är inom telefonernas säkerhet. På vilka sätt en mobiltelefon kan innebära en säkerhetsrisk i samhället har undersökts genom att en fallstudie utförts. Studien är kvantitativ då bland annat en enkät har skickats ut på ett socialt medie för att undersöka allmänhetens medvetenhet och kunskap gällande mobiltelefoners informationssäkerhet. I studien har hela 210 respondenter deltagit, av dessa är det exempelvis endast 17 % som tycker det är självklart att använda antivirusprogram på mobiltelefonen. Dessutom är det enbart 27 % som prioriterar säkerheten före pris, utseende och popularitet, när de ska ladda ner en app. Genom att räkna ut korrelationer mellan respondenternas svar så kunde flertalet samband fastställas, exempelvis påvisas det att personer som anser sig ha bra koll på informationssäkerhet inte använder anti-virus på sin smarttelefon. Allmänhetens insikt och beteende gällande informationssäkerhet är i många avseenden direkt avgörande när det kommer till tekniska lösningars säkerhet. Om en anslutning har säkerhetsbrister är det extra viktigt att enheter används på ett korrekt och skyddande sätt, så att inte informationsläckage uppstår. Resultatet av studien kan användas som underlag för vidare forskning inom arbetet med mobiltelefoners informationssäkerhet. Fallstudien har gjorts på uppdrag av två utvecklingsingenjörer, vilka har utvecklat Portiér, ett portlås som ska låsas upp med hjälp av användarens mobiltelefon. Informationssäkerheten i portlåset har undersökts på det sättet att riskidentifiering och konsekvensbedömning har sammansats till en riskanalys. Genom fallstudien kunde frågan kring huruvida smarttelefonen utgör en säkerhetsrisk i samhället eller inte besvaras. / The technical development of society goes faster and faster. Today it is not rare that we use mobile phones to make banking transactions, manage email and be active on social media. Technologies and solutions that are developed should be cost-effective and user-friendly, but is it at the expense of information security? It ́s important to consider how unauthorized persons can penetrate a mobile phone, how it ́s detected and what proactive measures can be implemented. Moreover, in this study it has been investigated how people use their smart phones and how familiar people are in the phones' security. In what ways a cell phone can cause a security issue in modern society has also been raised in a case study. This study performed a quantitative analysis where a questionnaire was sent via social media to examine public awareness regarding mobile phones information. In the study, 210 respondents participated, of these, for example, only 17% responded that it ́s obvious to use antivirus program on their mobile phone. Moreover, only 27% that prioritize safety before price, appearance and popularity, when considering downloading an app. By calculating correlations between respondents' answers, several pertience established. Among other things, demonstrated correlation between people who, although they claimed to have good eye of information security, they did not use anti-virus on your smart phone. Public awareness and behavior regarding information security is in many respects crucial when it comes to technical solutions, security. If a connection involves security flaws, it ́s especially important that the devices are used correctly and in protective manner, to avoid information leakage. The results of the study can be used as a basis for further research and work in the field of mobile phone information security. The case study has been conducted in collaboration with two development engineers, who have developed a modern door lock which can be unlocked using a mobile phone. The information security in the door lock has been investigated and analyzied in the way that risk identification and impact assessment has the same batch to a risk analysis. The question to be answered through the case study is the one regarding whether the smartphone constitute a security risk in the society or not.
362

Value co-creation via smartphone applications

Åsman, Andreas January 2015 (has links)
The purpose of this thesis is to describe how value propositions can be seen as an operant resource in a wireless environment, for service providers’ opportunity to co-create value with their customers. To see how a service provider offer service in a wireless environment interviews have been conducted at Westra Wermlands Sparbank with the focus on service offered through a smartphone application. The findings in the empirical study was that the service provider does not have the opportunity to actively instruct its customers in a wireless environment since the majority of the customers get the smartphone application on their own without processing from the service provider. What the service provider therefore can do is to integrate its instructions into the smartphone application so it is easy to understand and to show the customers what possibilities they have when using it. Thereby the offered value proposition can be seen as an operant resource in a wireless environment. Moreover, the service provider gets the opportunity to co-create value with its customers.
363

Assessing the Energy Consumption of Smartphone Applications

Abousaleh, Mustafa M. 27 August 2013 (has links)
Mobile devices are increasingly becoming essential in people's lives. The advancement in technology and mobility factor are allowing users to utilize mobile devices for communication, entertainment, financial planning, fitness tracking, etc. As a result, mobile applications are also becoming important factors contributing to user utility. However, battery capacity is the limiting factor impacting the quality of user experience. Hence, it is imperative to understand how much energy impact do mobile apps have on the system relative to other device activities. This thesis presents a systematic studying of the energy impact of mobile apps features. Time-series electrical current measurements are collected from 4 different modern smartphones. Statistical analysis methodologies are used to calculate the energy impact of each app feature by identifying and extracting mobile app-feature events from the overall current signal. In addition, the app overhead energy costs are also computed. Total energy consumption equations for each component is developed and an overall total energy consumption equation is presented. Minutes Lost (ML) of normal phone operations due to the energy consumption of the mobile app functionality is computed for cases where the mobile app is simulated to run on the various devices for 30 minutes. Tutela Technologies Inc. mobile app, NAT, is used for this study. NAT has two main features: QoS and Throughput. The impact of the QoS feature is indistinguishable, i.e. ML is zero, relative to other phone activities. The ML with only the TP feature enabled is on average 2.1 minutes. Enabling the GPS increases the ML on average to 11.5 minutes. Displaying the app GUI interface in addition to running the app features and enabling the GPS results in an average ML of 12.4 minutes. Amongst the various mobile app features and components studied, the GPS consumes the highest amount of energy. It is estimated that the GPS increases the ML by about 448%. / Graduate / 0544 / mustafa.abousaleh@gmail.com
364

Development and Evaluation of a BlackBerry-based Wearable Mobility Monitoring System

Wu, Hui Hsien 05 January 2012 (has links)
A Wearable Mobility Monitoring System (WMMS) can be an advantageous device for rehabilitation decision-making. This thesis presents the design and evaluation of a proof-of-concept WMMS that uses the BlackBerry Smartphone platform. A Java program was developed for the BlackBerry 9550, using the integrated tri-axial accelerometer, Global Positioning System sensor (GPS), CMOS digital video camera, and timer to identify change-of-state (CoS) among static states, dynamic states, small activity of daily living (ADL) movements, and car riding. Static states included sitting, lying, standing, and taking an elevator. Dynamic states included walking on level ground, walking on stairs, and walking on a ramp. Small activity of daily living movements included bathroom activities, working in the kitchen, and meal preparation. Following feature extraction from the sensor data, two decision trees were used to distinguish CoS and mobility activities. CoS identification subsequently triggered video recording for improved mobility context analysis during post-processing.
365

Modeling and Evaluating Energy Performance of Smartphones

Palit, Rajesh January 2012 (has links)
With advances in hardware miniaturization and wireless communication technologies even small portable wireless devices have much communication bandwidth and computing power. These devices include smartphones, tablet computers, and personal digital assistants. Users of these devices expect to run software applications that they usually have on their desktop computers as well as the new applications that are being developed for mobile devices. Web browsing, social networking, gaming, online multimedia playing, global positioning system based navigation, and accessing emails are examples of a few popular applications. Mobile versions of thousands of desktop applications are already available in mobile application markets, and consequently, the expected operational time of smartphones is rising rapidly. At the same time, the complexity of these applications is growing in terms of computation and communication needs, and there is a growing demand for energy in smartphones. However, unlike the exponential growth in computing and communication technologies, in terms of speed and packaging density, battery technology has not kept pace with the rapidly growing energy demand of these devices. Therefore, designers are faced with the need to enhance the battery life of smartphones. Knowledge of how energy is used and lost in the system components of the devices is vital to this end. With this view, we focus on modeling and evaluating the energy performance of smartphones in this thesis. We also propose techniques for enhancing the energy efficiency and functionality of smartphones. The detailed contributions of the thesis are as follows: (i) we present a nite state machine based model to estimate the energy cost of an application running on a smartphone, and provide practical approaches to extract model parameters; (ii) the concept of energy cost pro le is introduced to assess the impact of design decisions on energy cost at an early stage of software design; (iii) a generic architecture is proposed and implemented for enhancing the capabilities of smartphones by sharing resources; (iv) we have analyzed the Internet tra c of smartphones to observe the energy saving potentials, and have studied the implications on the existing energy saving techniques; and nally, (v) we have provided a methodology to select user level test cases for performing energy cost evaluation of applications. All of our concepts and proposed methodology have been validated with extensive measurements on a real test bench. Our work contributes to both theoretical understanding of energy e ciency of software applications and practical methodologies for evaluating energy e ciency. In summary, the results of this work can be used by application developers to make implementation level decisions that affect the energy efficiency of software applications on smartphones. In addition, this work leads to the design and implementation of energy e cient smartphones.
366

顧客滿意度─以智慧型手機使用者為研究 / Customer Satisfaction- The Case Study of Smartphone Users

李婉如, Li, Wan Ju Unknown Date (has links)
Today, smartphone has defined as an important tool in our daily lives; the market has been growing every year and the future global smartphone shipment is predicted to be nearly 1 billion in 2015. The function of smartphone is no longer limited to make calls to friends and family only, but also productivities, entertainments and multimedia functions (e.g. music, ringtones, games, web browsing, text messages and camera) provided by smartphone itself. With the increasing competitions in the smartphone market, smartphone companies find it difficult to retain the existing customers and increase the market share. In that context, the objective of this research explanatory study aims to identify the main factors that determine the customer satisfaction of smartphone users. The study survey was completed by 285 smartphone users who helped evaluating their smartphone satisfaction; the data was analyzed by IBM SPSS Statistics 20 and the results revealed the main findings are (1) image has high correlations with customer expectation, customer satisfaction and customer loyalty; (2) customer expectation has high correlations with perceive quality, perceived value and customer satisfaction; (3) perceived quality has high correlations with perceived value and customer satisfaction; (4) perceived value has a high correlation with customer satisfaction; (5) Customer satisfaction has a high correlation with customer loyalty; (6) the proposed model TCSI is proven with the effectiveness in explaining the relationships among image, customer expectation, perceived quality, perceived value, customer satisfaction and customer loyalty for smartphone users. The conclusion of this study provides valuable information for smartphone producers, especially Taiwanese brand HTC, to develop the smartphones meet with customers’ expectations and satisfactions.
367

Study on developing a potential way-finding map design of an iPhone & iPod web application for Rochester Institute of Technology (RIT) Library /

Kim, Jeong Ah. January 2010 (has links)
Typescript. Includes bibliographical references.
368

Hur kan virus, maskar och trojaner i mobila enheter påverka informationssäkerheten i datorbaserade system genom Bluetooth som kommunikationsväg?

Lilja, Adam January 2005 (has links)
<p>Denna rapport undersöker en frågeställning som kom upp efter virusutvecklingen som skedde 2004 med illasinnad kod som spreds mellan mobila enheter via Bluetooth. Rapporten undersöker vilka hot som finns om Smartphones och handdatorer sprider illasinnad kod via Bluetooth till datorbaserade system.</p><p>Undersökningen som gjordes var en hermeneutisk explorativ undersökning. Sammanlagt gjordes tre intervjuer med experter inom områdena informationssäkerhet, mobila enheter och Bluetooth.</p><p>Resultatet visade att illasinnad kod i Smartphones och handdatorer som sprids till datorbaserade system skulle kunna utgöra samma hot mot informationssäkerheten som traditionell illasinnad kod, det vill säga virus, maskar och trojaner som sprids mellan datorer. Därmed bör den illasinnade kod som rapporten behandlar betraktas lika allvarligt som traditionell illasinnad kod.</p>
369

Utilizing Crowd Sourced Analytics for Building Smarter Mobile Infrastructure and Achieving Better Quality of Experience

Yarish, David 04 January 2016 (has links)
There is great power in knowledge. Having insight into and predicting network events can be both informative and profitable. This thesis aims to assess how crowd-sourced network data collected on smartphones can be used to improve the quality of experience for users of the network and give network operators insight into how the networks infrastructure can also be improved. Over the course of a year, data has been collected and processed to show where networks have been performing well and where they are under-performing. The results of this collection aim to show that there is value in the collection of this data, and that this data cannot be adequately obtained without a device side presence. The various graphs and histograms demonstrate that the quantities of measurements and speeds recorded vary by both the location and time of day. It is these variations that cannot be determined via traditional network-side measurements. During the course of this experiment, it was observed that certain times of day have much greater numbers of people using the network and it is likely that the quantities of users on the network are correlated with the speeds observed at those times. Places of gathering such as malls and public areas had a higher user density, especially around noon which could is a normal time when people would take a break from the work day. Knowing exactly where and when an Access Point (AP) is utilized is important information when trying to identify how users are utilizing the network. / Graduate / davidyarish@gmail.com
370

Exploring the barriers of consumer purchasing in M-commerce : A Qualitative Study

Larsson, Jennie, Litchfield, Charley, Smedberg, Filippa January 2018 (has links)
Purpose: Explore the external and internal barriers preventing consumer purchases in M- commerce. Research Questions:RQ1: What are the external barriers that prevent consumer purchases on smartphones?RQ2: What are the internal barriers that prevent consumer purchases on smartphones? Methodology: This thesis is a qualitative study using an exploratory purpose and used a cross- sectional strategy collecting data through two focus groups. Conclusion: There are existing external barriers in M-commerce that consist of; unadjusted webpages for the smartphone, small screen size, and inconvenient internet connection. Along with that, internal barriers consist of; the inability to complete a task efficiently, consumers’ motivation to use the smartphone other than purchasing, technology perceived as difficult, security concerns and lack of trust, and finally the lack of skill. Thus, the findings of this thesis explored how these factors prevent consumer purchasing in M-commerce. Theoretical contributions/limitations/future research: The key contributions of this thesis is in the field of M-commerce. More specifically, dividing the barriers of purchasing in M-commerce into two categories, external and internal barriers, which has not been studied before. Since this thesis used an exploratory purpose, the subjective nature therefore has implications affecting its validity and reliability resulting in lower levels of generalizability and replication. Along with this, the language barriers in the focus groups may have had an effect on the results. A suggestion for future research is to focus on the relationship between the external and internal barriers in M-commerce rather than distinguishing them. Future research could also consist of identifying other approaches of the barriers in M-commerce.

Page generated in 0.017 seconds