20,710 research outputs found

    Smartphone: The Ultimate IoT and IoE Device

    Get PDF
    Internet of Things (IoT) and Internet of Everything (IoE) are emerging communication concepts that will interconnect a variety of devices (including smartphones, home appliances, sensors, and other network devices), people, data, and processes and allow them to communicate with each other seamlessly. These new concepts can be applied in many application domains such as healthcare, transportation, and supply chain management (SCM), to name a few, and allow users to get real-time information such as location-based services, disease management, and tracking. The smartphone-enabling technologies such as built-in sensors, Bluetooth, radio-frequency identification (RFID) tracking, and near-field communications (NFC) allow it to be an integral part of IoT and IoE world and the mostly used device in these environments. However, its use imposes severe security and privacy threats, because the smartphone usually contains and communicates sensitive private data. In this chapter, we provide a comprehensive survey on IoT and IoE technologies, their application domains, IoT structure and architecture, the use of smartphones in IoT and IoE, and the difference between IoT networks and mobile cellular networks. We also provide a concise overview of future opportunities and challenges in IoT and IoE environments and focus more on the security and privacy threats of using the smartphone in IoT and IoE networks with a suggestion of some countermeasures

    Perceived risk and sensitive data on mobile devices

    Get PDF
    This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users. The primary objective was to shed light on the level of information security awareness in smartphone users and determine the extent of sensitive information such users typically hold on these mobile devices

    Дослідження системи операційного менеджменту організації, на прикладі Apple Computer, Inc

    Get PDF
    The object of investigation is the process of managing of operating activities of Apple, Inc. The aim of the work is to formulate theoretical approaches and to develop practical recommendations on directions of improvement of operating management at the organization. Research methods cover methods of analysis, synthesis, comparison, detailing, system approach. This master’s research paper analyzes the operational management of Apple, Inc. and provides recommendations for it’s improvement. In particular, the main directions of solving the problems of operational management of the company have been outlined, the proposals on improvement of expansion distribution network and organization of innovative activity of the Apple Inc. have been made.Об'єкт дослідження ‒ процес управління операційною діяльністю компанії Apple, Inc. Мета дослідження - формування теоретичних підходів та розробка практичних рекомендацій щодо напрямів вдосконалення системи операційного менеджменту компанії Apple, Inc. Методи дослідження: методи аналізу, синтезу, порівняння, деталізації, системний підхід. У роботі проведено аналіз операційного менеджменту Apple, Inc., а також викладені рекомендації щодо його вдосконалення. Зокрема, окреслено основні напрями вирішення проблем операційного менеджменту компанії, внесено пропозиції щодо розширення дистриб’юторської мережі, а також вдосконалення організації інноваційної діяльності Apple Inc.Introduction 6 CHAPTER 1 THE THEORETICAL FRAMEWORK OF OPERATIONAL MANAGEMENT 8 1.1 Meanings and definition of operational management 8 1.2 Principles and methods of operations management 12 1.3 Factors affecting the Operations activity of Apple Inc. company 21 CHAPTER 2 RESEARCH AND ANALYSIS 31 2.1 Сompany introduction 31 2.2 SWOT - analysis of Apple Inc. Company 46 2.3 Analysis of operation management at Apple Inc 50 CHAPTER 3 RECOMMENDATIONS FOR IMPROVING OF OPERATIONAL MANAGEMENT AT THE APPLE INC 63 3.1 The main directions of solving operational management problems of the company 63 3.2 Recommendations concerning improvements of Distribution in the organization 65 3.3 Recommendations concerning improvements of innovative activity at the organization 67 CHAPTER 4 SPECIAL PART 73 4.1 Current trends in the field 73 4.2 Company policy in the market 75 CHAPTER 5 RATIONALE FOR RECOMMENDATIONS 77 5.1 Statement for recommendations at Company 77 CHAPTER 6 OCCUPATIONAL HEALTH AND SAFETY AT THE ENTERPRISE 79 6.1 The aim of occupational health 79 6.2 Organization of occupational health and safety at the enterprise 86 CHAPTER 7 ENVIRONMENTAL ISSUES 92 7.1 Environmental issues in the field 92 7.2 Еnvironmental factors 94 Conclusions 96 References 98 Appendices 10

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Digital exclusion as a hindrance to the emergence of the information society: the case of Poland

    Get PDF
    There is no doubt, that digital transformation (knowledge-based transformation) has emerged as the crucial megatrend in modern civilization. Artificial intelligence (AI), machines and autonomous vehicles, the Internet of Things (IoT), financial technology (Fin/Tech), smart investing and the analysis and processing of big data are the most recent manifestations of this trend, but not the only ones. All of these phenomena have led to the emergence and continuing development of the so-called ‘Information Society’ (IS), which refers to a new type of social organization that is clearly distinct from the earlier forms of society. In this new society, information and knowledge play an essential role in facilitating the Knowledge-Based Economy (KBE), where information is collected, transmitted and processed in a faster and more effective manner, and can subsequently be used to foster accelerated economic growth. Unfortunately, the problem of digital exclusion still occurs, also in Poland. The author in the conclusion comes to opinion that people who are digitally excluded find it much more difficult to overcome psychological rather than technical barriers to having access to the Internet and learning basic computer skills. This situation calls for urgent improvement. In the modern information society, a lack of basic knowledge about computers translates into partial or total digital illiteracy and makes it difficult to perform a range of everyday tasks. It is therefore essential in Poland to prevent digital exclusion. People who do not use the Internet are socially and professionally limited, or virtually handicapped, which results in quantifiable economic losses. This translates to lower creativity and innovativeness and reduced revenue of state budget, and impedes the competitiveness of the economy and the development of a post-modern, post-industrial social model. The main research goal is to show the causes of the phenomenon of digital exclusion in Poland and ways to counteract it. In the course of the research, the most frequently used method was causal and effect analysis as well as institutional and legal analysis. Elements of the decision-making, historical, comparative and statistical methods were also used

    In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments

    Get PDF
    In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo, i.e. directly on the smartphone. We present a tool chain to do this and present experimental results showing that this tool chain can run on smartphones in a reasonable amount of time and with a realistic effort. Our findings also identify challenges to be addressed before running powerful runtime monitoring and instrumentations directly on smartphones. We implemented two use-cases leveraging the tool chain: BetterPermissions, a fine-grained user centric permission policy system and AdRemover an advertisement remover. Both prototypes improve the privacy of Android systems thanks to in-vivo bytecode instrumentation.Comment: ISBN: 978-2-87971-111-

    How 5G wireless (and concomitant technologies) will revolutionize healthcare?

    Get PDF
    The need to have equitable access to quality healthcare is enshrined in the United Nations (UN) Sustainable Development Goals (SDGs), which defines the developmental agenda of the UN for the next 15 years. In particular, the third SDG focuses on the need to “ensure healthy lives and promote well-being for all at all ages”. In this paper, we build the case that 5G wireless technology, along with concomitant emerging technologies (such as IoT, big data, artificial intelligence and machine learning), will transform global healthcare systems in the near future. Our optimism around 5G-enabled healthcare stems from a confluence of significant technical pushes that are already at play: apart from the availability of high-throughput low-latency wireless connectivity, other significant factors include the democratization of computing through cloud computing; the democratization of Artificial Intelligence (AI) and cognitive computing (e.g., IBM Watson); and the commoditization of data through crowdsourcing and digital exhaust. These technologies together can finally crack a dysfunctional healthcare system that has largely been impervious to technological innovations. We highlight the persistent deficiencies of the current healthcare system and then demonstrate how the 5G-enabled healthcare revolution can fix these deficiencies. We also highlight open technical research challenges, and potential pitfalls, that may hinder the development of such a 5G-enabled health revolution
    corecore