21,063 research outputs found

    Community-Based Security for the Internet of Things

    Full text link
    With more and more devices becoming connectable to the internet, the number of services but also a lot of threats increases dramatically. Security is often a secondary matter behind functionality and comfort, but the problem has already been recognized. Still, with many IoT devices being deployed already, security will come step-by-step and through updates, patches and new versions of apps and IoT software. While these updates can be safely retrieved from app stores, the problems kick in via jailbroken devices and with the variety of untrusted sources arising on the internet. Since hacking is typically a community effort? these days, security could be a community goal too. The challenges are manifold, and one reason for weak or absent security on IoT devices is their weak computational power. In this chapter, we discuss a community based security mechanism in which devices mutually aid each other in secure software management. We discuss game-theoretic methods of community formation and light-weight cryptographic means to accomplish authentic software deployment inside the IoT device community

    Barriers to older adults’ uptake of mobile-based mental health interventions

    Get PDF
    Background To address increasing demand of mental healthcare treatments for older adults and the need to reduce delivery costs, healthcare providers are turning to mobile applications. The importance of psychological barriers have been highlighted in the uptake of mobile-based mental health interventions and efforts have been made to identify these barriers in order to facilitate initial uptake and acceptance. However, limited research has focused on older adults’ awareness of these applications and factors that might be hindering their use. Objective The purpose of this study was to explore the perceived barriers that older adults experience in the uptake of mobile-based mental health interventions. Methods Semi-structured interviews were conducted with a sample of 10 older adults, 50 years or older (female = 7, mean age = 68 years), who experienced periods of low mood. National Health Service applications were demonstrated to facilitate conversation and explore participants’ understanding of mental health and mobile-based mental health interventions. Thematic analysis was used to analyse the interview transcripts. Results The social ecological model was adopted as an organising framework for the thematic analysis which identified six distinct barriers to older adults’ uptake of mobile-based mental health interventions: mental electronic-health (e-health) awareness, interaction with technology, discontinuation, ‘seeing’ facilitates therapeutic alliance, incongruent role of the general practitioner and privacy and confidentiality. Conclusions Older adults experience a number of barriers to uptake ranging from the individual level to a macro, organisational level. The practical implications of these barriers are discussed such as the need for increased awareness of mobile-based mental health interventions among older adults

    Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do

    Get PDF
    Smartphone apps can harvest very personal details from the phone with ease. This is a particular privacy concern. Unthinking installation of untrustworthy apps constitutes risky behaviour. This could be due to poor awareness or a lack of knowhow: knowledge of how to go about protecting privacy. It seems that Smartphone owners proceed with installation, ignoring any misgivings they might have, and thereby irretrievably sacrifice their privacy

    Interrogating Capabilities of IoT Devices

    Get PDF
    This research is supported by the UK Research Councils’ Digital Economy IT as a Utility Network+ (EP/K003569/1) and the dot.rural Digital Economy Hub (EP/G066051/1).Postprin

    Why Do People Adopt, or Reject, Smartphone Password Managers?

    Get PDF
    People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers
    corecore