134,020 research outputs found

    Hikester - the event management application

    Full text link
    Today social networks and services are one of the most important part of our everyday life. Most of the daily activities, such as communicating with friends, reading news or dating is usually done using social networks. However, there are activities for which social networks do not yet provide adequate support. This paper focuses on event management and introduces "Hikester". The main objective of this service is to provide users with the possibility to create any event they desire and to invite other users. "Hikester" supports the creation and management of events like attendance of football matches, quest rooms, shared train rides or visit of museums in foreign countries. Here we discuss the project architecture as well as the detailed implementation of the system components: the recommender system, the spam recognition service and the parameters optimizer

    Will mobile video become the killer application for 3G? - an empirical model for media convergence

    Get PDF
    Mobile carriers have continually rolled out 3G mobile video applications to increase their revenue and profits. The presumption is that video is superior to the already successful SMS, ringtones, and pictures, and can create greater value to users. However, recent market surveys revealed contradicting results. Motivated by this discrepancy, we propose in this paper a parsimonious model for user acceptance of mobile entertainment as digital convergence. Integrating research on Information Systems, Flow, and Media Psychology, we take a unique approach to user acceptance of digital convergence - platform migration. Our key proposition is that the interaction between media types and the platform-specific constraints is the key determinant of user evaluation. Particularly, users' involvement in the media is determined by both the entertaining time span on the original platform and the attentional constraint of the new platform. The mismatch between the two spans can result in lower level involvement, which in turn cause no or even negative user emotional responses. The model was tested with empirical data. We discuss the theoretical contributions, strategic and design implications, and future research directions derived from this theoretical framewor

    The Transitivity of Trust Problem in the Interaction of Android Applications

    Full text link
    Mobile phones have developed into complex platforms with large numbers of installed applications and a wide range of sensitive data. Application security policies limit the permissions of each installed application. As applications may interact, restricting single applications may create a false sense of security for the end users while data may still leave the mobile phone through other applications. Instead, the information flow needs to be policed for the composite system of applications in a transparent and usable manner. In this paper, we propose to employ static analysis based on the software architecture and focused data flow analysis to scalably detect information flows between components. Specifically, we aim to reveal transitivity of trust problems in multi-component mobile platforms. We demonstrate the feasibility of our approach with Android applications, although the generalization of the analysis to similar composition-based architectures, such as Service-oriented Architecture, can also be explored in the future
    • …
    corecore