6 research outputs found

    Multi-Dimensional-Personalization in mobile contexts

    Get PDF
    During the dot com era the word "personalisation” was a hot buzzword. With the fall of the dot com companies the topic has lost momentum. As the killer application for UMTS or the mobile internet has yet to be identified, the concept of Multi-Dimensional-Personalisation (MDP) could be a candidate. Using this approach, a recommendation of mobile advertisement or marketing (i.e., recommendations or notifications), online content, as well as offline events, can be offered to the user based on their known interests and current location. Instead of having to request or pull this information, the new service concept would proactively provide the information and services – with the consequence that the right information or service could therefore be offered at the right place, at the right time. The growing availability of "Location-based Services“ for mobile phones is a new target for the use of personalisation. "Location-based Services“ are information, for example, about restaurants, hotels or shopping malls with offers which are in close range / short distance to the user. The lack of acceptance for such services in the past is based on the fact that early implementations required the user to pull the information from the service provider. A more promising approach is to actively push information to the user. This information must be from interest to the user and has to reach the user at the right time and at the right place. This raises new requirements on personalisation which will go far beyond present requirements. It will reach out from personalisation based only on the interest of the user. Besides the interest, the enhanced personalisation has to cover the location and movement patterns, the usage and the past, present and future schedule of the user. This new personalisation paradigm has to protect the user’s privacy so that an approach supporting anonymous recommendations through an extended "Chinese Wall“ will be described

    Secure End-to-End Communications in Mobile Networks

    Get PDF
    2009 - 2010Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de ned. This does not seem a problem, but this is not true. Along the path across operator network, voice is at risk. It will only be encrypted again, with a di erent key, from the BS to the receiver if the receiver is herself a mobile user. Moreover, voice encryption is not mandatory. The choice whether or not to accept an unprotected communication is up to the network. When adopted, the same encryption algorithm is used for sending SMS messages between mobile telephones and base stations and for encrypting of calls. Unfortunately, vulnerabilities in this encryption systems were already revealed more than 10 years ago and more continue to be discovered. Currently the most popular communication technologies are the GSM and the UMTS. The UMTS is in use as a successor to GSM. Along with mobile phone services, It provides rapid data communication. The security algo- rithms in UMTS di ers from GSM in two important ways: encryption and mutual authentication. Although security standards have been improved, the end- to-end security is not provided... [edited by Author]IX n.s

    Personal data sovereignty : a sustainable interface layer for a human centered data ecosystem

    Get PDF
    The reality of ubiquitous computing and exponential personal data generation challenges the notion of privacy, as Surveillance Capitalism and Nation State endeavour to record and analyse personal data with the objective of leveraging influence and control. It is argued that this centralised model threatens to stifle the digital economy, destabilise our democracy, and fundamentally change our social norms. Real-time, non-statistical datasets offer huge potential for governance, commerce, and social cohesion. But the positive benefit of the emerging data driven society is threatened by the tensions formed through asymmetric power imbalances that manifest across a narrow band of walled gardened web services.In recent years work has been undertaken to counter the centralised model, despite these efforts there has been limited change in trajectory or sustained adoption of decentralised technologies. This research is designed to explore and evaluate the Decentralised Internet. Investigating the challenge of designing usable, sustainable tools for the everyday participant. This research engages mixed methods to explore the trajectory of technologies and public attitudes. Domain experts are consulted to explore application and value proposition. Practice extends the decentralised trajectory to consider participant journeys, interaction, and the interface layer.This research concludes that the core technological infrastructure now exists to facilitate a genuine Decentralised Internet and that an identity layer facilitated through Blockchain technology is progressing the domain towards Self Sovereign Identity (SSI). This research extends this trajectory through Conceptual Modelling to define a Sovereign Boundary Mechanism (SBM), an independent realm of interaction which enables the principles of decentralisation. Analysis suggests that this interaction is high in friction, requiring considerable internalised cognition and prior knowledge in order to engage.This research concludes that the concept of network privacy is poorly defined and miss-understood, and that participants struggle to see its value across context and cultures. Investigation indicates that the Decentralised Internet cannot be marketed, and instead has to supersede the centralised model through defined innovations. This research argues that a cohesive strategy is required to achieve adoption, one which collectively identifies and develops offerings of value through design thinking while defining a consistent narrative to deliver targeted solutions within cultural contexts.This research makes a theoretical contribution to knowledge by connecting the domains of Self Sovereign Identity (SSI) and Human Data Interaction (HDI). The research establishes the fundamental spheres of interaction for an analogue SSI system through what is defined as a Sovereign Boundary Mechanism (SBM). The research identifies issues and paradox’s relating to an SBM and identifies further required investigation and research. This research makes a practical contribution to knowledge by presenting a framework and resource for further innovation and development, the wider problem space for a Human-Centred Data Ecosystem is defined, and finally the research contributes to a wider adoption strategy through the identification of value proposition
    corecore