7,705 research outputs found

    Going Rogue: Mobile Research Applications and the Right to Privacy

    Get PDF
    This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced. In particular, this Article (1) catalogues and analyzes the nonsectoral data privacy, security, and breach notification statutes of all fifty states and the District of Columbia; (2) applies these statutes to mobile-app-mediated health research conducted by independent scientists, citizen scientists, and patient researchers; and (3) proposes substantive amendments to state law that could help protect the privacy and security of all health data subjects, including mobile-app-mediated health research participants

    Utilization of Artificial Intelligence Technology in Assisting House Chores

    Get PDF
    AI is accomplished by the combination of a large amount of input, repetitive analysis, and intelligent algorithms. This enables the program to automatically learn from the trends or features found in the results. Artificial intelligence is also being used in a variety of areas, one of which is schooling. It may also be used to assist households with domestic chores. Technology was developed to improve the life of a large number of citizens. Western technology is heavily reliant on computer technology as a result of a scarcity of human capital. That is why they developed a large number of robotic machines. Technology is extremely beneficial in terms of performance, efficacy, and also cost; utilizing technology is significantly less expensive. Any of the most prominent AI developments are reimagining the consumer electronics market, such as the smarthome. AI has enabled the easy control of household appliances

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs

    N.O.V.I.: Note Organizer for the Visually Impaired

    Get PDF
    Visually impaired students face extra challenges when it comes to the basic necessity of note-taking. Current assistive technology is fragmented in function. These students often need to combine solutions such as voice recording lectures, hiring someone to transcribe notes to braille, hiring a reader, etc. The amount of time and money they need for these solutions proves to be a great disadvantage, and we wish to provide an easier solution that will give these students a more independent and productive learning experience. Our solution is an application that can offer intuitive, convenient, and comprehensive access to notes for the visually impaired. We would implement our solution through an iOS mobile application that would allow users to upload hand written or text notes so that they could be organized and accessed through voice prompts. Users with visual disabilities would then have a platform to store and organize their notes in order to increase their ability to learn independently

    pDroid

    Get PDF
    When an end user attempts to download an app on the Google Play Store they receive two related items that can be used to assess the potential threats of an application, the list of permissions used by the application and the textual description of the application. However, this raises several concerns. First, applications tend to use more permissions than they need and end users are not tech-savvy enough to fully understand the security risks. Therefore, it is challenging to assess the threats of an application fully by only seeing the permissions. On the other hand, most textual descriptions do not clearly define why they need a particular permission. These two issues conjoined make it difficult for end users to accurately assess the security threats of an application. This has lead to a demand for a framework that can accurately determine if a textual description adequately describes the actual behavior of an application. In this Master Thesis, we present pDroid (short for privateDroid), a market-independent framework that can compare an Android application’s textual description to its internal behavior. We evaluated pDroid using 1562 benign apps and 243 malware samples, and pDroid correctly classified 91.4% of malware with a false positive rate of 4.9%

    Raising awareness of smartphone overuse among university students: a persuasive systems approach

    Get PDF
    Smartphone overuse can lead to a series of physical, mental and social disturbances. This problem is more prevalent among young adults as compared to other demographic groups. Additionally, university students are already undergoing high cognitive loads and stress conditions; therefore, they are more susceptible to smartphone addiction and its derived problems. In this paper, we present a novel approach where a conversational mobile agent uses persuasive messages exploring the reflective mind to raise users’ awareness of their usage and consequently induce reduction behaviors. We conducted a four-week study with 16 university students undergoing stressful conditions—a global lockdown during their semester—and evaluated the impact of the agent on smartphone usage reduction and the perceived usefulness of such an approach. Results show the efficacy of self-tracking in the behavior change process: 81% of the users reduced their usage time, and all of them mentioned that having a conversational agent alerting them about their usage was useful. Before this experiment, only 68% of them considered such an approach could be useful. In conclusion, users deemed it essential to have an engaging conversational agent on their smartphones, in terms of helping them become more aware of usage times.info:eu-repo/semantics/publishedVersio
    corecore