23,354 research outputs found

    Ambient intelligence

    Get PDF

    A Security Pattern for Cloud service certification

    Get PDF
    Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However, the task of verifying security properties in services running on cloud is not trivial. We notice the provision and security of a cloud service is sensitive. Because of the potential interference between the features and behavior of all the inter-dependent services in all layers of the cloud stack (as well as dynamic changes in them). Besides current cloud models do not include support for trust-focused communication between layers. We present a mechanism to implement cloud service certification process based on the usage of Trusted Computing technology, by means of its Trusted Computing Platform (TPM) implementation of its architecture. Among many security security features it is a tamper proof resistance built in device and provides a root of trust to affix our certification mechanism. We present as a security pattern the approach for service certification based on the use TPM.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tec

    Rethinking affordance

    Get PDF
    n/a – Critical survey essay retheorising the concept of 'affordance' in digital media context. Lead article in a special issue on the topic, co-edited by the authors for the journal Media Theory

    Online Mobile Phone Recharge System in Nigeria

    Get PDF
    An e-portal system that allows mobile phone users to recharge their phones online without necessary purchasing any recharge card is proposed. With this e-portal system, users simply provide the amount to be loaded on the specified phone number and some series of validation are performed before finally recharging the phone with the specified amount. This e-portal system also eliminates the burden of generating random numbers as recharge cards and the subsequent huge database accompanied with the storage of these randomly generated numbers. Mobile service providers are still faced with the challenges of inefficient bandwidth utilization and congestion in the transmission channel. One of the main reasons for this congestion is the toll placed on the network by the need to reload/recharge phone credits in order to enable calls. The solution proposed in this paper is meant to improve bandwidth utilization by taking the process of recharging off the mobile clients

    Effect of Values and Technology Use on Exercise: Implications for Personalized Behavior Change Interventions

    Full text link
    Technology has recently been recruited in the war against the ongoing obesity crisis; however, the adoption of Health & Fitness applications for regular exercise is a struggle. In this study, we present a unique demographically representative dataset of 15k US residents that combines technology use logs with surveys on moral views, human values, and emotional contagion. Combining these data, we provide a holistic view of individuals to model their physical exercise behavior. First, we show which values determine the adoption of Health & Fitness mobile applications, finding that users who prioritize the value of purity and de-emphasize values of conformity, hedonism, and security are more likely to use such apps. Further, we achieve a weighted AUROC of .673 in predicting whether individual exercises, and we also show that the application usage data allows for substantially better classification performance (.608) compared to using basic demographics (.513) or internet browsing data (.546). We also find a strong link of exercise to respondent socioeconomic status, as well as the value of happiness. Using these insights, we propose actionable design guidelines for persuasive technologies targeting health behavior modification
    • …
    corecore