701 research outputs found

    Off the Beaten tracks: Exploring Three Aspects of Web Navigation

    Get PDF
    This paper presents results of a long-term client-side Web usage study, updating previous studies that range in age from five to ten years. We focus on three aspects of Web navigation: changes in the distribution of navigation actions, speed of navigation and within-page navigation. “Navigation actions” corresponding to users’ individual page requests are discussed by type. We reconfirm links to be the most important navigation element, while backtracking has lost more than half of its previously reported share and form submission has become far more common. Changes of the Web and the browser interfaces are candidates for causing these changes. Analyzing the time users stayed on pages, we confirm Web navigation to be a rapidly interactive activity. A breakdown of page characteristics shows that users often do not take the time to read the available text or consider all links. The performance of the Web is analyzed and reassessed against the resulting requirements. Finally, habits of within-page navigation are presented. Although most selected hyperlinks are located in the top left corner of the screen, in nearly a quarter of all cases people choose links that require scrolling. We analyzed the available browser real estate to gain insights for the design of non-scrolling Web pages

    Wireless Efficiency Versus Net Neutrality

    Get PDF
    Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania\u27s Center for Technology Innovation and Competition on May 6-7, 2010. This Article first addresses congestion and congestion control in the Internet. It shows how congestion control has always depended upon altruistic behavior by end users. Equipment failures, malicious acts, or abandonment of altruistic behavior can lead to severe congestion within the Internet. Consumers benefit when network operators are able to control such congestion. One tool for controlling such congestion is giving higher priority to some applications, such as telephone calls, and giving lower priority or blocking other applications, such as file sharing. The Article then turns to wireless networks and shows that in addition to congestion issues, priority routing in wireless can make available capacity that would otherwise go unused. Wireless systems that are aware of the application being carried in each packet can deliver more value to consumers than can dumb networks that treat all packets identically. Handsets are both complements to and substitutes for the network infrastructure of wireless networks and any analysis of handset bundling should consider this complementarity. Next, the Article reviews analogous issues in electrical power and satellite communications and shows how various forms of priority are used to increase the total value delivered to consumers by these systems. Finally, the Article observes that regulations that prohibit priority routing of packets and flows on the Internet will create incentives to operate multiple networks

    A comparative investigation on the application and performance of Femtocell against Wi-Fi networks in an indoor environment

    Get PDF
    Due to the strenuous demands on the available spectrum and bandwidth, alongside the ever increasing rate at which data traffic is growing and the poor quality of experience QoE) faced with indoor communications, in order for cellular networks to remain dominant in areas pertaining to voice and data services, cellular service providers have to reform their marketing and service delivery strategies together with their overall network rchitecture. To accomplish this leap forward in performance, cellular service operators need to employ a network topology, which makes use of a mix of macrocells and small cells, effectively evolving the network, bringing it closer to the end-­‐user. This investigation explores the use of small cell technology, specifically Femtocell technology in comparison to the already employed Wi-­‐Fi technology as a viable solution to poor indoor communications.The performance evolution is done by comparing key areas in the every day use of Internet communications. These include HTTP testing, RTP testing and VoIP testing. Results are explained and the modes of operation of both technologies are compared

    Prospects of Mobile Search

    Get PDF
    Search faces (at least) two major challenges. One is to improve efficiency of retrieving relevant content for all digital formats (images, audio, video, 3D shapes, etc). The second is making relevant information retrievable in a range of platforms, particularly in high diffusion ones as mobiles. The two challenges are interrelated but distinct. This report aims at assessing the potential of future Mobile Search. Two broad groups of search-based applications can be identified. The first one is the adaptation and emulation of web search processes and services to the mobile environment. The second one is services exploiting the unique features of the mobile devices and the mobile environments. Examples of these context-aware services include location-based services or interfacing to the internet of things (RFID networks). The report starts by providing an introduction to mobile search. It highlights differences and commonalities with search technologies on other platforms (Chapter 1). Chapter 2 is devoted to the supply side of mobile search markets. It describes mobile markets, presents key figures and gives an outline of main business models and players. Chapter 3 is dedicated to the demand side of the market. It studies usersÂż acceptance and demand using the results on a case study in Sweden. Chapter 4 presents emerging trends in technology and markets that could shape mobile search. It is the author's view after discussing with many experts. One input to this discussion was the analysis of on forward-looking scenarios for mobile developed by the authors (Chapter 5). Experts were asked to evaluate these scenarios. Another input was a questionnaire to which 61 experts responded. Drivers, barriers and enablers for mobile search have been synthesised into SWOT analysis. The report concludes with some policy recommendations in view of the likely socio-economic implications of mobile search in Europe.JRC.DG.J.4-Information Societ

    A Study on the Use of Checksums for Integrity Verification of Web Downloads

    Get PDF
    App stores provide access to millions of different programs that users can download on their computers. Developers can also make their programs available for download on their websites and host the program files either directly on their website or on third-party platforms, such as mirrors. In the latter case, as users download the software without any vetting from the developers, they should take the necessary precautions to ensure that it is authentic. One way to accomplish this is to check that the published file’s integrity verification code – the checksum – matches that (if provided) of the downloaded file. To date, however, there is little evidence to suggest that such process is effective. Even worse, very few usability studies about it exist. In this paper, we provide the first comprehensive study that assesses the usability and effectiveness of the manual checksum verification process. First, by means of an in-situ experiment with 40 participants and eye-tracking technology, we show that the process is cumbersome and error-prone. Second, after a 4-month long in-the-wild experiment with 134 participants, we demonstrate how our proposed solution – a Chrome extension that verifies checksums automatically – significantly reduces human errors, improves coverage, and has only limited impact on usability. It also confirms that, sadly, only a tiny minority of websites that link to executable files in our sample provide checksums (0.01%), which is a strong call to action for web standards bodies, service providers and content creators to increase the use of file integrity verification on their properties

    Revista Economica

    Get PDF

    Systems and Methods for Measuring and Improving End-User Application Performance on Mobile Devices

    Full text link
    In today's rapidly growing smartphone society, the time users are spending on their smartphones is continuing to grow and mobile applications are becoming the primary medium for providing services and content to users. With such fast paced growth in smart-phone usage, cellular carriers and internet service providers continuously upgrade their infrastructure to the latest technologies and expand their capacities to improve the performance and reliability of their network and to satisfy exploding user demand for mobile data. On the other side of the spectrum, content providers and e-commerce companies adopt the latest protocols and techniques to provide smooth and feature-rich user experiences on their applications. To ensure a good quality of experience, monitoring how applications perform on users' devices is necessary. Often, network and content providers lack such visibility into the end-user application performance. In this dissertation, we demonstrate that having visibility into the end-user perceived performance, through system design for efficient and coordinated active and passive measurements of end-user application and network performance, is crucial for detecting, diagnosing, and addressing performance problems on mobile devices. My dissertation consists of three projects to support this statement. First, to provide such continuous monitoring on smartphones with constrained resources that operate in such a highly dynamic mobile environment, we devise efficient, adaptive, and coordinated systems, as a platform, for active and passive measurements of end-user performance. Second, using this platform and other passive data collection techniques, we conduct an in-depth user trial of mobile multipath to understand how Multipath TCP (MPTCP) performs in practice. Our measurement study reveals several limitations of MPTCP. Based on the insights gained from our measurement study, we propose two different schemes to address the identified limitations of MPTCP. Last, we show how to provide visibility into the end- user application performance for internet providers and in particular home WiFi routers by passively monitoring users' traffic and utilizing per-app models mapping various network quality of service (QoS) metrics to the application performance.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/146014/1/ashnik_1.pd

    Examining older users’ online privacy-enhancing experience from a human-computer interaction perspective

    Get PDF
    The advancement of Internet technologies, including instant and unlimited access to information and services, has been an excellent source of support for older adults. However, pervasive and continuous online tracking can pose severe threats to older adults’ information privacy. Surprisingly, very few empirical studies have focused on older users’ online privacy-enhancing experience from a Human-Computer Interaction perspective. Therefore, it remains unclear how older users protect their online information privacy and what factors influence their online behaviors. Thus, my thesis aims to study older users’ online privacy-enhancing experience by examining the following questions: 1) what older users know and do to protect their online information privacy, 2) how their emotional state influences their adoption of privacy-enhancing technologies (PETs), and 3) what usability challenges they encounter while using one of the most popular PETs currently available to the public. To examine these questions, a diverse set of empirical approaches was adopted, including a survey, a quasi-experiment, and a usability study. My research findings suggest that three are three elements that play a crucial role in older users' online privacy-enhancing practices. First, older users' knowledge of online privacy has a significant influence on their daily online privacy protection behaviors. In addition, there seems to be a privacy knowledge gap among older users that reveals the phenomenon of ‘Privacy Divide.' Second, the design of privacy-enhancing features affects older users’ emotional state and their attitudes regarding their future adoption of the tool. Third, the findings of usability study indicate that the current design of a privacy- enhancing browsing tool, Tor Browser, poses particular challenges for older users. For instance, the technical terminologies and recurring warning messages have made Tor Browser more difficult for older users to use. These usability challenges not only decrease older users’ satisfaction in but also deter their future adoption of the tool. Therefore, it is crucial that current design of PETs considers older users’ needs. My thesis research contributes to the privacy literature in several ways. First of all, this is the first empirical research examining older users’ actual online privacy protection behaviors. In addition, this thesis includes the very first empirical study that illustrate the importance of the role of emotion in users’ adoption of a privacy-enhancing tool. Furthermore, this thesis provides usability recommendations that can improve the current design of Tor Browser for older user audiences. As the world's aging population continues to grow and advances in Internet technologies progress rapidly, the design of future technologies, from smart homes to self-driving cars, has to adopt user-centered approach, which consider end-users' needs of all age groups. Also, information privacy has become a significant aspect in our digital world, which makes the design of user-friendly privacy-enhancing tools an essential mission ahead of us. Moreover, knowledge and awareness are a key factor in older users’ online privacy- enhancing practices. Henceforth, creating educational programs for older adults is extremely important in protecting their online privacy

    Mobile Internet Usage - Network Traffic Measurements

    Get PDF
    Perustavanlaatuisia muutoksia on tapahtumassa tietoliikennetoimialalla kun Internet ja mobiili konvergoituvat. Matkapuhelimet ovat kehittymÀssÀ multimediatietokoneiksi ja kannettavat tietokoneet muuttuvat pienemmiksi ja sisÀltÀvÀt kasvavissa mÀÀrin liitettÀvyyden matkapuhelinverkkoon. Kun samaan aikaan mobiililaajakaistojen hinnat ovat laskeneet ja tarjotut kaistannopeudet kasvaneet, mobiilin Internetin kÀyttö on lisÀÀntynyt nopeasti viimeisten parin vuoden aikana. Uusia tulonlÀhteitÀ etsiessÀ teollisuuden eri sidosryhmÀt ovat kiinnostuneita mittauksista jotka voivat auttaa ymmÀrtÀmÀÀn mobiilin Internetin kÀyttöÀ. TÀmÀ diplomityö keskittyy mobiiliverkon liikennemittauksiin ja niiden soveltuvuuden tutkimiseen markkinatiedon tuottamisessa eri sidosryhmille. TyössÀ analysoidaan suomalaisissa mobiiliverkoissa tehtyjÀ liikennemittauksia ja tuotetaan statistiikkaa mobiilin Internetin kÀytöstÀ. LisÀksi nykyisen mittausjÀrjestelyn ominaisuuksia analysoidaan, mahdolliset mittausten kehittÀmisalueet luokitellaan ja suosituksia esitetÀÀn mittausten kehittÀmiseksi. Statistiikat Suomen mobiilii-Internetin kÀytöstÀ osoittivat ettÀ tietokoneet generoivat suurimman osan Suomen liikennevolyymistÀ, kun taas matkapuhelinten tuottaman liikenteen osuus on alle prosentti. Symbian-kÀyttöjÀrjestelmÀ dominoi matkapuhelinten kÀyttöÀ joka on web-orientoitunutta. Muitakin web-liikenteen luokkia kuin web-selailua, kuten email- ja muuta synkronointiliikennettÀ, huomattiin kÀytettÀvÀn matkapuhelimilla. Perinteiset kotimaiset mediatalot, sosiaalisen median sivustot ja Nokia ovat suosituimpien web-sisÀllöntuottajien joukossa. Koska eri mittauspisteet mobiiliverkossa tuottavat eri tarkkuustason tietoa, tÀytyy mittausprosessiin liittyvÀt valinnat tehdÀ mittauksen tavoitteiden mukaan. Jos kehittynyt analyysi on tarpeen, mittausten olisi suositeltavaa suoritettavan pisteessÀ jossa kÀyttÀjien tunnistaminen on mahdollista, kun taas pelkÀstÀ IP-liikenteestÀ saatavat tulokset ovat riittÀviÀ yleisempÀÀn markkinan kuvaamiseen. Mobiilioperaattorin kannalta yhtÀjaksoiset ja automatisoidut mittaukset mahdollistaisivat tulosten hyvÀksikÀyttÀmisen useissa eri yrityksen toiminnoissa. Yleisesti liikennemittausten mahdollisuudet ovat laajat, mutta toisaalta tÀyden hyödyn saavuttamiseksi resurssivaateet saattavat olla suuria. Liikennemittaukset voivat kuitenkin tuottaa tietoa ja tukea operaattoreita pÀÀtöksenteossa ja liiketoiminnan kehittÀmisessÀ.Fundamental transformations are taking place in the telecommunication domain as the Internet and mobile industries are converging. Mobile phones are developing into multimedia computers and laptops are getting smaller with cellular connectivity, increasing the amount of mobile Internet capable devices. Furthermore, as mobile broadband prices have decreased and offered bandwidths increased, also the usage of mobile Internet has been increasing rapidly during the past couple of years. In search for new revenue sources, various industry stakeholders are interested in measurements that can help understanding the mobile Internet usage patterns. This thesis focuses on mobile network traffic measurements and studies their applicability for providing market understanding for the different stakeholders. First, measurements from operational Finnish mobile networks are analyzed to provide factual statistics on the usage patterns of the Finnish market. Second, the properties of the existing measurement organization are analyzed, possible measurement design and development areas are classified, and recommendations are provided for further development of the measurements. The factual statistics showed that most of the Finnish mobile Internet usage traffic volume is generated by computers, whereas the share of mobile handset generated traffic is less than one percent. Symbian operating system dominates the web oriented mobile handset usage. Traditional Finnish media houses, social media sites, and Nokia are among the most popular content providers for web usage. In addition, also other web traffic classes than web browsing, such as email and synchronization, were observed to be used by mobile handsets. As different measurement points in a mobile network provide different data granularity, the choices related to the measurement have to be made according to the objectives of the measurement. If advanced analysis is needed, the measurements are recommended to be conducted at a point in the mobile network where user identification is possible, whereas total traffic level patterns from IP traffic are adequate for general market description. From a mobile operator viewpoint, automated and continuous data collection and analysis could enable utilization of the results in multiple corporate functions. In general, the possibilities of traffic measurements are vast. On the other hand, they may require a lot of resources to succeed in their full potential. Nevertheless, mobile network traffic measurements can provide intelligence and support for operators in their decision making and business development

    A review of the Siyakhula Living Lab’s network solution for Internet in marginalized communities

    Get PDF
    Changes within Information and Communication Technology (ICT) over the past decade required a review of the network layer component deployed in the Siyakhula Living Lab (SLL), a long-term joint venture between the Telkom Centres of Excellence hosted at University of Fort Hare and Rhodes University in South Africa. The SLL overall solution for the sustainable internet in poor communities consists of three main components – the computing infrastructure layer, the network layer, and the e-services layer. At the core of the network layer is the concept of BI, a high-speed local area network realized through easy-to deploy wireless technologies that establish point-to-multipoint connections among schools within a limited geographical area. Schools within the broadband island become then Digital Access Nodes (DANs), with computing infrastructure that provides access to the network. The review, reported in this thesis, aimed at determining whether the model for the network layer was still able to meet the needs of marginalized communities in South Africa, given the recent changes in ICT. The research work used the living lab methodology – a grassroots, user-driven approach that emphasizes co-creation between the beneficiaries and external entities (researchers, industry partners and the government) - to do viability tests on the solution for the network component. The viability tests included lab and field experiments, to produce the qualitative and quantitative data needed to propose an updated blueprint. The results of the review found that the network topology used in the SLL’s network, the BI, is still viable, while WiMAX is now outdated. Also, the in-network web cache, Squid, is no longer effective, given the switch to HTTPS and the pervasive presence of advertising. The solution to the first issue is outdoor Wi-Fi, a proven solution easily deployable in grass-roots fashion. The second issue can be mitigated by leveraging Squid’s ‘bumping’ and splicing features; deploying a browser extension to make picture download optional; and using Pihole, a DNS sinkhole. Hopefully, the revised solution could become a component of South African Government’s broadband plan, “SA Connect”.Thesis (MSc) -- Faculty of Science, Computer Science, 202
    • 

    corecore