7,748 research outputs found

    Privacy Conscious Web Apps Composition

    No full text
    International audienceSo called "apps" are widespread today on the Internet. Most of them allow users to extend the range of functionalities their websites offer. However, they potentially jeopardize the privacy of users. Indeed, they collect, store and process personal pieces of information. Recent studies show that users feel they lack control over information. They also show that users distrust apps providers and would rather turn to their friends or family when they choose apps. In this paper we propose a model-driven approach to empower end-users with an extended control over their information. Our work is implemented as a web-based tool to compose apps and manage end-users privacy requirements. Our work showcases the unexploited possibilities of current web protocols and technologies in terms of privacy management

    The patterning of finance/security : a designerly walkthrough of challenger banking apps

    Get PDF
    Culture is being ‘appified’. Diverse, pre-existing everyday activities are being redesigned so they happen with and through apps. While apps are often encountered as equivalent icons in apps stores or digital devices, the processes of appification – that is, the actions required to turn something into an app – vary significantly. In this article, we offer a comparative analysis of a number of ‘challenger’ banking apps in the United Kingdom. As a retail service, banking is highly regulated and banks must take steps to identify and verify their customers before entering a retail relationship. Once established, this ‘secured’ financial identity underpins a lot of everyday economic activity. Adopting the method of the walkthrough analysis, we study the specific ways these processes of identifying and verifying the identity of the customer (now the user) occur through user onboarding. We argue that banking apps provide a unique way of binding the user to an identity, one that combines the affordances of smart phones with the techniques, knowledge and patterns of user experience design. With the appification of banking, we see new processes of security folded into the everyday experience of apps. Our analysis shows how these binding identities are achieved through what we refer to as the patterning of finance/security. This patterning is significant, moreover, given its availability for wider circulation beyond the context of retail banking apps

    Fingerprinting Smart Devices Through Embedded Acoustic Components

    Full text link
    The widespread use of smart devices gives rise to both security and privacy concerns. Fingerprinting smart devices can assist in authenticating physical devices, but it can also jeopardize privacy by allowing remote identification without user awareness. We propose a novel fingerprinting approach that uses the microphones and speakers of smart phones to uniquely identify an individual device. During fabrication, subtle imperfections arise in device microphones and speakers which induce anomalies in produced and received sounds. We exploit this observation to fingerprint smart devices through playback and recording of audio samples. We use audio-metric tools to analyze and explore different acoustic features and analyze their ability to successfully fingerprint smart devices. Our experiments show that it is even possible to fingerprint devices that have the same vendor and model; we were able to accurately distinguish over 93% of all recorded audio clips from 15 different units of the same model. Our study identifies the prominent acoustic features capable of fingerprinting devices with high success rate and examines the effect of background noise and other variables on fingerprinting accuracy

    FCJ-180 ‘Spotify has added an event to your past’: (re)writing the self through Facebook’s autoposting apps

    Get PDF
    Drawing on in-depth interviews with sixteen Facebook users, this paper presents a series of vignettes that explore cross-platform Facebook apps as ‘tools’ for self-writing, self-expression and identity performance. The paper argues that the capacity of apps to write in the user’s stead – at times without the user’s knowledge or explicit consent – works to intervene in and on occasion disrupt users’ staged self-performances to their ‘invisible audience’ (Sauter, 2013) on Facebook. Furthermore, if such instances of automated self-writing are treated as performative, apps hold the constitutional capacity to actively rewrite, regulate and even constitute the self to suit the logic of the ‘like economy’ (Gelitz and Helmond, 2013), in ways that transcend the boundaries of Facebook

    Modelling Online Advertising Design Quality Influences on Millennial Consumer Attitudes in South Africa

    Get PDF
    Millennials’ advanced knowledge and exposure to product experiences, and irrelevant placement of online advertising has led to an increase of online advertising avoidance. However, effective online advertising design may assist in establishing more positive sentiments towards digital forms of marketing communication. The study used the visual rhetoric theory as the theoretical basis to examine millennial consumer attitudes. The main research aims were to propose an online advertising design quality model, and to ascertain the influence of online advertising design quality on millennial consumer attitudes. The study employed a quantitative research design via an empirical online survey. Online advertising design quality has resulted in a positive effect on relevant information, value, disruptive online placement and timing, personalization and price consciousness, a negative influence on privacy concern and distrust, and ad irritation across various online platforms. This study heightens the importance of design elements and the visual aesthetics of online advertising
    • …
    corecore