12,922 research outputs found

    Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

    Full text link
    Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial log-in mechanism, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in smartphone have no incentive to re-authenticate, so this must be done in an automatic, non-bypassable way. Hence, this paper proposes a novel authentication system, iAuth, for implicit, continuous authentication of the end-user based on his or her behavioral characteristics, by leveraging the sensors already ubiquitously built into smartphones. We design a system that gives accurate authentication using machine learning and sensor data from multiple mobile devices. Our system can achieve 92.1% authentication accuracy with negligible system overhead and less than 2% battery consumption.Comment: Published in Hardware and Architectural Support for Security and Privacy (HASP), 201

    Smartphone Users’ Satisfaction and Regional Aspects: Factors that Emerge from Online Reviews

    Get PDF
    This study aims to analyze which factors related to smartphone users’ satisfaction emerge from online reviews. In addition, as the study was conducted in Brazil which is a developing country with a lot of regional diversity, a secondary aim of this study is to test whether regional aspects can affect users’ satisfaction level. Online reviews were analyzed through the Content Analysis technique. Next, we carried out a quantitative analysis using Ordinal Logistic Regression. The results showed that smartphones’ features related to hardware and software and sellers’ characteristics may significantly affect users’ satisfaction. The socioeconomic factor, represented by the GDP per capita of the cities where users live, had a significant and negative impact, indicating that users in more economically developed regions attribute lower satisfaction level to smartphones. This study contributes to the literature as it used online reviews as data source, which helps identifying factors related to users’ satisfaction beyond those analyzed in previous studies that applied questionnaires

    IT Identity: A Measure and Empirical Investigation of its Utility to IS Research

    Get PDF
    Because use is the critical link between information technology (IT) investments and organizational performance, IS researchers have focused attention on the post-adoption phase—after organizational IT are installed and used by employees in their work. To that end, recent theoretical work introduced IT identity—representing the strength of individuals’ self-identification with an IT—as a means to explain richer, post-adoption, IT use behaviors. Utilizing multiple methods and surveys, and focused on use of two different technologies, this study develops theory-based measures to establish IT identity’s utility for expanding the understanding of post-adoption use. Results show IT identity predicts different IT use behaviors and richer forms of use. Further, IT identity maintains its predictive validity when embedded in a model with other predictors. Given the importance of such value-creating behaviors in today’s multi-functional-platform based IT environments, our findings suggest future research consider IT identity an instrumental part of models seeking to explain IT use in post-adoption contexts

    Self-Control in Cyberspace: Applying Dual Systems Theory to a Review of Digital Self-Control Tools

    Get PDF
    Many people struggle to control their use of digital devices. However, our understanding of the design mechanisms that support user self-control remains limited. In this paper, we make two contributions to HCI research in this space: first, we analyse 367 apps and browser extensions from the Google Play, Chrome Web, and Apple App stores to identify common core design features and intervention strategies afforded by current tools for digital self-control. Second, we adapt and apply an integrative dual systems model of self-regulation as a framework for organising and evaluating the design features found. Our analysis aims to help the design of better tools in two ways: (i) by identifying how, through a well-established model of self-regulation, current tools overlap and differ in how they support self-control; and (ii) by using the model to reveal underexplored cognitive mechanisms that could aid the design of new tools.Comment: 11.5 pages (excl. references), 6 figures, 1 tabl

    Effects of user experience on user resistance to change to the voice user interface of an in‑vehicle infotainment system: Implications for platform and standards competition

    Get PDF
    This study examines the effects of user experience on user resistance to change—particularly, on the relationship between user resistance to change and its antecedents (i.e. switching costs and perceived value) in the context of the voice user interface of an in-vehicle infotainment (IVI) system. This research offers several salient findings. First, it shows that user experience positively moderates the relationship between uncertainty costs (one type of switching cost) and user resistance. It also negatively moderates the association between perceived value and user resistance. Second, the research test results demonstrate that users with a high degree of prior experience with the voice user interface of other smart devices exhibit low user resistance to change to the voice user interface in an IVI system. Third, we show that three types of switching costs (transition costs, in particular) may directly influence users to resist a change to the voice user interface. Fourth, our test results empirically demonstrate that both switching costs and perceived value affect user resistance to change in the context of an IVI system, which differs from the traditional IS research setting (i.e. enterprise systems). These findings may guide not only platform leaders in designing user interfaces, user experiences, and marketing strategies, but also firms that want to defend themselves from platform envelopment while devising defensive strategies in platform and standards competition

    Exploring value co-creation within buyer-seller relationship in mobile applications services : a model development

    Get PDF
    Mobile phones have become an indispensable part of consumers’ life where they access core and supporting services via mobile applications services (m-applications). The focus of the present study is to explore dyadic buyer-seller roles in m-applications services’ value creation taking mobile banking applications services (MB-applications) as a case study. While prior research on value co-creation in service dominant logic (S-d logic) serves as a foundation for this study, it does not provide adequate guidance on how buyer and seller co-create value in m-applications services.To address this shortcoming, semi-structured interviews were carried out with 12 banks’ officials in banks’ headquarters of Saudi Arabia. Also, six focus groups were conducted; three with MB-application services users and three with non-users which were held in Riyadh College of Technology (RCT). In addition, a content analysis of MB-applications services was conducted to support suppliers’ perspectives regarding value propositions (service offering). A conceptual framework is developed for managing co-creation to illustrate practical application of the framework.The findings pointed to six factors that shape shape service suppliers’ ability to offer and deliver value via MB-applications, namely; brand image building, bank’s business vision, customer culture-orientation, bank’s internal environment, information technology system and positioning strategy. These factors combine to establish a value proposition for banks’ customers in the MB-applications services domain.Customer’s value creation as value in-use during usage emerged in different usage situations. A value framework incorporating value consumptions (Sheth et al., 1991a) is proposed. It identifies the main value-adding elements in m-applications and the primary drivers for adopting m-applications. Findings revealed that bank managers attempted to support customers’ value creation, which was reflected in MB-application content. However, support was constrained by some insufficient assumptions about customers and the m-commerce architecture. Factors that impede MB-applications use include consumers’ banking habits, perceived risk (security and privacy); usability hindrance, marketing and promotion, technical problems, and socio-cultural barriers. Implications are drawn for service delivery value perception and mobile marketing theory, and recommendations are made to service suppliers and commercial banks to achieve sustained returns of investment from MB-applications services

    Information Technology (IT) Identity: A Conceptualization, Proposed Measures, and Research Agenda

    Get PDF
    With increasing embeddedness of information technologies (IT) in organizational processes, and services, individuals\u27 long-term IT use has become instrumental to business success. At the same time, IS research has illustrated that under-utilization by end-users often prevents organizations from realizing expected benefits from their technology investments. Because individual use is the critical link between technology investments and enhanced organizational performance through IT, in recent years, information systems researchers have begun to focus attention on the post-adoption phases of technology assimilation. The overarching goal of this relatively new research stream is to understand factors that influence individuals\u27 attempts to use IT to their fullest potential in the work setting. To advance research on post-adoption IT use, this three essay dissertation develops, operationalizes, and tests the new concept of information technology (IT) identity--defined as, the set of meanings an individual attaches to the self in relation to IT--as a product of individuals\u27 personal histories of interacting with IT, as well as a force that shapes their thinking and guides their IT use behaviors. The first essay builds the core concept through exploring whether young people\u27s individual self-concepts are tied to their interactions with mobile phones. The second essay draws on a rich repertoire of literature to formally theorize the domain and dimensions of IT identity, as well as its nomological net. By examining the processes by which IT identity is constructed and maintained, this essay offers IS researchers a new theoretical lens for examining individuals\u27 long-term IT use. The third essay develops an operational definition of IT identity and empirically tests the conditions under which the construct is a more or less salient predictor of individuals\u27 post-usage intentions and continued IT use than existing IS constructs. The results presented help delimit a role for IT identity in bridging the gap between current models of use and models that explain long term and richer IT use behaviors. Extending understanding of why and how individuals use IT in the long term may help provide a basis for designing managerial interventions that promote organizational assimilation of IT. Thus, by proposing and operationalizing IT identity as a core construct in explaining individual IT use, this research has the potential to advance theory and contribute to practice

    An empirical investigation of smartphone technology acceptance among Universiti Utara Malaysia students

    Get PDF
    This study investigated smartphone technology acceptance among Universiti Utara Malaysian (UUM) students by using the Technology Acceptance Model (TAM). The rapid diffusion of computer technology into smartphone increases smartphone penetration among Universiti Utara Malaysia students. The aim of this study was to determine the relationship of Perceived Ease of Use (PEU) and Perceived Usefulness (PU) as independent variables, and Attitude (ATT) and Behavioural intention (BI) as dependent variables on Smartphone Technology Acceptance among Universiti Utara Malaysia students. In addition, in this research Gender was used as a moderator to test the relationship between Attitude (ATT) and Behavioural intention (BI). In order to collect data a total of 500 questionnaires were distributed to (UUM) final year and postgraduate students in three colleges COB, CAS and COLGIS. The hypothesis results showed that there was a significant relationship among the four variables except Gender. This was because Gender failed to moderate in explaining the relationship between Attitude (ATT) and Behavioural intention (BI). On the other hand the statistical result showed that there was partial mediation effect of Perceived Usefulness (PU) on the relationship between Perceived Ease (PEU) of Use and Attitude (ATT) on Smartphone Technology Acceptance among Universiti Utara Malaysian students. Furthermore the researcher found that there was a significant relationship between both the dependent variables - Attitude (ATT) and Behavioural intention (BI) on smartphone technology acceptance among UUM students. The overall finding showed that technology advancement and breakthrough design of smartphone technology are the key factors that attract Universiti Utara Malaysia students to accept smartphone technology. On the other hand, usefulness and ease of use of the smartphone technology play important roles in influencing (UUM) students to have the intention to use smartphone technology in accomplishing their personal tasks. This is because the usefulness of smartphone technology with promising results makes (UUM) students rely heavily on this device
    • …
    corecore