24 research outputs found

    Gamification elements in smoking cessation mobile apps and their effects on the self-efficacy and motivation to quit of smokers

    Get PDF
    Background and Aim: Gamification can positively impact self-efficacy and motivation to quit, two vital factors associated with smoking cessation. Since it shares key components with behaviour change theories and is easily applicable to digital interventions, gamification has the potential of improving the effectiveness of mHealth solutions. However, the role of gamification in the context of smoking cessation and mHealth has been sparsely investigated. My research aims to examine gamification elements in smoking cessation mobile apps and quantitatively investigate their effects on the self-efficacy and motivation to quit of smokers seeking to quit. Methods: A review of smoking cessation apps on the UK market assessed app adherence to treatment guidelines and incorporation of gamification. One of two mobile apps identified from the review were assigned to smokers seeking to quit for a 4-week long study. Linear and logistic regression models investigated the effects of gamification on self-efficacy, motivation to quit and smoking cessation. Pairwise Pearson correlations compared self-reported and in-app engagement data. Statistical significance for all models and tests was determined at the 5% (.05) level. Results: Smoking cessation apps had low adherence to treatment guidelines and did not incorporate a high level of gamification. Compared to baseline, self-efficacy and motivation to quit statistically significantly increased after app use. Perceived engagement with overall gamification was associated with change in self-efficacy (β=3.35, 95% CI: 0.31 to 6.40) and motivation to quit (β=0.54, 95% CI: 0.15 to 0.94). Engagement with the steps/levels feature (based on self-reported and in-app data) was associated with change in self-efficacy and 7-day smoking cessation. Self-reported and in-app engagement data were positively moderately correlated. Conclusion: Gamification in mobile apps can have positive effects on the self-efficacy and motivation to quit of smokers. The findings provide important insights for tobacco control policymakers, mobile app developers and smokers trying to quit.Open Acces

    Efficient and Secure ECDSA Algorithm and its Applications: A Survey

    Get PDF
    Public-key cryptography algorithms, especially elliptic curve cryptography (ECC)and elliptic curve digital signature algorithm (ECDSA) have been attracting attention frommany researchers in different institutions because these algorithms provide security andhigh performance when being used in many areas such as electronic-healthcare, electronicbanking,electronic-commerce, electronic-vehicular, and electronic-governance. These algorithmsheighten security against various attacks and the same time improve performanceto obtain efficiencies (time, memory, reduced computation complexity, and energy saving)in an environment of constrained source and large systems. This paper presents detailedand a comprehensive survey of an update of the ECDSA algorithm in terms of performance,security, and applications

    Beyond Just Money Transactions: Redesigning Digital Peer-to-Peer Payments for Social Connections

    Get PDF
    Financial activities, such as the exchange of money between individuals, have long been considered a crucial aspect of how people build and maintain their interpersonal relationships (i.e., a strong, deep, or close association/acquaintance between two or more people) with individuals they know because money is a sensitive social construct. In particular, over the past decade, how to conduct, manage, and experience money exchanges and processes between individuals has been dramatically transformed due to the increasing popularity of digital peer-to-peer (P2P) payment services (i.e., performing one to one online money transactions via a digital device). In this sense, digital P2P payments have shown the potential to affect how people pay and interact with each other regarding money, an important impact factor on various forms of interpersonal relationships, by facilitating direct money transactions between individuals through computer-mediated channels. Therefore, this dissertation research is motivated to leverage a sociotechnical approach to conduct an in-depth investigation of the nuanced human experiences of personal money exchanges mediated by digital P2P payments between people who know each other and the unique role of digital P2P payments in shaping these individuals\u27 social connections with each other online and offline. In doing so, this dissertation research aims to (i) reveal and elaborate the multidimensional influences of digital P2P payments on interpersonal relationships between people who already know each other in terms of both experiences of money exchanges and everyday social interactions; ii) advance our knowledge and understanding of how digital P2P payments systems can be redesigned to better support people\u27s social connections with individuals they know; and iii) envision the future landscape of digital P2P payments in our increasingly networked digital society. This dissertation research involves four studies. Grounded in 158 social media posts and 8 interviews, Study 1 explores how people perceive the increasing trend of integrating digital P2P payments with social media services (e.g., Facebook Messenger payment) and why they decide not to use this service in their daily lives. Study 2 reports findings of a qualitative study of 31 in-depth semi-structured interviews to investigate the influences of using digital P2P payments on people\u27s offline interpersonal relationships. Study 3 reports results of a large-scale anonymous online survey with 218 valid responses to measure the specific immediate social consequences and lasting impacts of using digital P2P payments on people\u27s interpersonal relationships. Study 4 adopts the research through design (RtD) approach with a specific emphasis on participatory design activities to both elicit and qualitatively investigate user needs and user-generated design solutions for digital P2P payment services that can better support people\u27s social connections. This dissertation research thus contributes to innovating financial technologies in the perspective of Human-Computer Interaction and Human-Centered Computing by better understanding new and more complicated social phenomena and dynamics emerging in today\u27s digital economy. First, this dissertation research offers one of the first empirical evidence to unpack and explicate the multidimensional influences of digital P2P payments on both financial experiences/processes and everyday social connections between known contacts, which is understudied in prior scholarship. In doing so, we provide new perspectives on today\u27s technology-mediated financial life and shed light on the intertwining financial and social relationships through technology. These insights also help re-conceptualize computer-mediated interpersonal relationships in today\u27s networked society. Second, we identify and further reflect on user-generated design recommendations and develop prototypes that highlight the importance of taking the interplay of financial and social engagement, in addition to security and privacy, into consideration when redesigning digital P2P payments platforms. Through this RtD approach, we thus rethink and envision the future landscape of digital P2P payments where such technologies can be designed, developed, and used in a more comfortable, innovative, and emotionally satisfactory way. As we are entering a post COVID-19 pandemic age, there is an increasing interest to make digital financial technologies not only secure but also more human-centered, interaction-centric, and culturally sensitive, which can be used to better support and maintain human connections through daily financial activities with or without face-to-face interaction. Therefore, in a broader sense, this dissertation research on the social values of digital P2P payments also contributes to building a more robust and inclusive digital economy in today\u27s changing society

    Secure Authentication for Mobile Users

    Get PDF
    RÉSUMÉ :L’authentification biométrique telle que les empreintes digitales et la biométrie faciale a changé la principale méthode d’authentification sur les appareils mobiles. Les gens inscrivent facilement leurs modèles d’empreintes digitales ou de visage dans différents systèmes d’authentification pour profiter de leur accès facile au smartphone sans avoir besoin de se souvenir et de saisir les codes PIN/mots de passe conventionnels. Cependant, ils ne sont pas conscients du fait qu’ils stockent leurs caractéristiques physiologiques ou comportementales durables sur des plates-formes non sécurisées (c’est-à-dire sur des téléphones mobiles ou sur un stockage en nuage), menaçant la confidentialité de leurs modèles biométriques et de leurs identités. Par conséquent, un schéma d’authentification est nécessaire pour préserver la confidentialité des modèles biométriques des utilisateurs et les authentifier en toute sécurité sans compter sur des plates-formes non sécurisées et non fiables.La plupart des études ont envisagé des approches logicielles pour concevoir un système d’authentification sécurisé. Cependant, ces approches ont montré des limites dans les systèmes d’authentification sécurisés. Principalement, ils souffrent d’une faible précision de vérification, en raison des transformations du gabarit (cancelable biometrics), de la fuite d’informations (fuzzy commitment schemes) ou de la réponse de vérification non en temps réel, en raison des calculs coûteux (homomorphic encryption).---------- ABSTRACT: Biometric authentication such as fingerprint and face biometrics has changed the main authentication method on mobile devices. People easily enroll their fingerprint or face template on different authentication systems to take advantage of their easy access to the smartphone with no need to remember and enter the conventional PINs/passwords. However, they are not aware that they store their long-lasting physiological or behavioral characteristics on insecure platforms (i.e., on mobile phones or on cloud storage), threatening the privacy of their biometric templates and their identities. Therefore, an authentication scheme is required to preserve the privacy of users’ biometric templates and securely authenticate them without relying on insecure and untrustworthy platforms. Most studies have considered software-based approaches to design a privacy-reserving authentication system. However, these approaches have shown limitations in secure authentication systems. Mainly, they suffer from low verification accuracy, due to the template transformations (in cancelable biometrics), information leakage (in fuzzy commitment schemes), or non real-time verification response, due to the expensive computations (in homomorphic encryption)

    Design Tools

    Get PDF
    This book aims at encompassing the panorama of design tools being developed, tested and adopted by researchers and professors at the Department of Design of Politecnico di Milano. The tools are organized in a taxonomy that reflects the path of choice of a possible user in need for the right tool for a task to be performed. The taxonomy is based on a formalization of the design process proposed by the authors, which characterizes the Design System at Politecnico di Milano. The book essentially offers two main contributions: an original taxonomy that guides towards the organization of design tools and their usage with different actors; a representative collection of design tools developed within the Department of Design of Politecnico di Milano with specific instructions on how to use them. Design Tools is addressed both to practitioners and academics in the field of design that are interested in getting to know more about the discourse around design tools in general and in particular how this discourse takes a shape within Politecnico di Milano and resolves in usable and shareable tools

    Cooperative Radio Communications for Green Smart Environments

    Get PDF
    The demand for mobile connectivity is continuously increasing, and by 2020 Mobile and Wireless Communications will serve not only very dense populations of mobile phones and nomadic computers, but also the expected multiplicity of devices and sensors located in machines, vehicles, health systems and city infrastructures. Future Mobile Networks are then faced with many new scenarios and use cases, which will load the networks with different data traffic patterns, in new or shared spectrum bands, creating new specific requirements. This book addresses both the techniques to model, analyse and optimise the radio links and transmission systems in such scenarios, together with the most advanced radio access, resource management and mobile networking technologies. This text summarises the work performed by more than 500 researchers from more than 120 institutions in Europe, America and Asia, from both academia and industries, within the framework of the COST IC1004 Action on "Cooperative Radio Communications for Green and Smart Environments". The book will have appeal to graduates and researchers in the Radio Communications area, and also to engineers working in the Wireless industry. Topics discussed in this book include: • Radio waves propagation phenomena in diverse urban, indoor, vehicular and body environments• Measurements, characterization, and modelling of radio channels beyond 4G networks• Key issues in Vehicle (V2X) communication• Wireless Body Area Networks, including specific Radio Channel Models for WBANs• Energy efficiency and resource management enhancements in Radio Access Networks• Definitions and models for the virtualised and cloud RAN architectures• Advances on feasible indoor localization and tracking techniques• Recent findings and innovations in antenna systems for communications• Physical Layer Network Coding for next generation wireless systems• Methods and techniques for MIMO Over the Air (OTA) testin

    Efcient and secure ECDSA algorithm and its applications: a survey

    Get PDF
    Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronic-banking, electronic-commerce, electronic-vehicular, and electronic-governance. These algorithms heighten security against various attacks and the same time improve performance to obtain efciencies (time, memory, reduced computation complexity, and energy saving) in an environment of constrained source and large systems. This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications

    Cooperative Radio Communications for Green Smart Environments

    Get PDF
    The demand for mobile connectivity is continuously increasing, and by 2020 Mobile and Wireless Communications will serve not only very dense populations of mobile phones and nomadic computers, but also the expected multiplicity of devices and sensors located in machines, vehicles, health systems and city infrastructures. Future Mobile Networks are then faced with many new scenarios and use cases, which will load the networks with different data traffic patterns, in new or shared spectrum bands, creating new specific requirements. This book addresses both the techniques to model, analyse and optimise the radio links and transmission systems in such scenarios, together with the most advanced radio access, resource management and mobile networking technologies. This text summarises the work performed by more than 500 researchers from more than 120 institutions in Europe, America and Asia, from both academia and industries, within the framework of the COST IC1004 Action on "Cooperative Radio Communications for Green and Smart Environments". The book will have appeal to graduates and researchers in the Radio Communications area, and also to engineers working in the Wireless industry. Topics discussed in this book include: • Radio waves propagation phenomena in diverse urban, indoor, vehicular and body environments• Measurements, characterization, and modelling of radio channels beyond 4G networks• Key issues in Vehicle (V2X) communication• Wireless Body Area Networks, including specific Radio Channel Models for WBANs• Energy efficiency and resource management enhancements in Radio Access Networks• Definitions and models for the virtualised and cloud RAN architectures• Advances on feasible indoor localization and tracking techniques• Recent findings and innovations in antenna systems for communications• Physical Layer Network Coding for next generation wireless systems• Methods and techniques for MIMO Over the Air (OTA) testin
    corecore