66,032 research outputs found

    An Empirical Study on Android for Saving Non-shared Data on Public Storage

    Get PDF
    With millions of apps that can be downloaded from official or third-party market, Android has become one of the most popular mobile platforms today. These apps help people in all kinds of ways and thus have access to lots of user's data that in general fall into three categories: sensitive data, data to be shared with other apps, and non-sensitive data not to be shared with others. For the first and second type of data, Android has provided very good storage models: an app's private sensitive data are saved to its private folder that can only be access by the app itself, and the data to be shared are saved to public storage (either the external SD card or the emulated SD card area on internal FLASH memory). But for the last type, i.e., an app's non-sensitive and non-shared data, there is a big problem in Android's current storage model which essentially encourages an app to save its non-sensitive data to shared public storage that can be accessed by other apps. At first glance, it seems no problem to do so, as those data are non-sensitive after all, but it implicitly assumes that app developers could correctly identify all sensitive data and prevent all possible information leakage from private-but-non-sensitive data. In this paper, we will demonstrate that this is an invalid assumption with a thorough survey on information leaks of those apps that had followed Android's recommended storage model for non-sensitive data. Our studies showed that highly sensitive information from billions of users can be easily hacked by exploiting the mentioned problematic storage model. Although our empirical studies are based on a limited set of apps, the identified problems are never isolated or accidental bugs of those apps being investigated. On the contrary, the problem is rooted from the vulnerable storage model recommended by Android. To mitigate the threat, we also propose a defense framework

    Agricultural information dissemination using ICTs: a review and analysis of information dissemination models in China

    Get PDF
    Open Access funded by China Agricultural UniversityOver the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs). Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer

    Impacts of WeChat on Millennials’ Perceptions and Consumption Behaviors in the Hotel Industry

    Full text link
    Social media, known as interactive Web 2.0 Internet-based applications, has deeply changed and reformed interpersonal communication and business operation with the wide spread of Internet and the development of technology. In the past few years, since mobile apps are becoming more and more popular, the access of social media is not limited to tablet computers only, but is also available for almost all kinds of smart phone devices, such as iPhone, Android, Symbian and so on. The function of social media is not confined to real- time message transmission or information sharing any more. It has expanded to a widely range of features, such as online purchase and payment, e-commerce business, and service for different types of social events. Social media plays an increasingly important role in daily personal life as well as in business activities. People are not merely considered as social media users, but also the component of social media itself. As a result, it is very crucial for people to realize the importance and impacts of social media, especially for those business operators. WeChat (Weixin in Chinses, literally “micro message”) is a cross-platform instant text and voice messaging communication service for multiple mobile devices, developed by Tecent in China, first released in the January of 2011. It is claimed to provide “the new way to connect” and create “a way of life”. It is free to download, install and register, and support all kinds of smart phone platforms with multiple language versions, such as Chinese, English, Japanese, French, and Spanish. WeChat provides its users different ways to communicate and interact with friends innovatively through instant text messaging, hold-to-talk voice messaging, group messaging, lively video sharing, location sharing, money transferring, and contact information sharing. Among all the WeChat users, Millennials is the majority. With the growing-up of Millennials, they are becoming more and more powerful and important to the society and will be the next target segmentation for most of the industries in the very near future. Especially for the hotel industry, the industry that urges to attract Millennials patrons for further substantial development, how to attract Millennials is becoming a critical issue for those hotel operators

    Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture

    Get PDF
    The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures. The author spends a large majority of the paper delineating China’s Internet infrastructure and prevalent Internet Censorship Technologies/Techniques (ICTs), paying particular attention to how the ICTs function at a technical level. The author further analyzes the state of Internet Censorship in both Iran and Russia from a broader perspective to give a better understanding of Internet Censorship around the globe. The author also highlights specific CTs, explaining how they function at a technical level. Findings indicate that among all three nation-states, state control of Internet Service Providers is the backbone of Internet Censorship. Specifically, within China, it is discovered that the infrastructure functions as an Intranet, thereby creating a closed system. Further, BGP Hijacking, DNS Poisoning, and TCP RST attacks are analyzed to understand their use-case within China. It is found that Iran functions much like a weaker version of China in regards to ICTs, with the state seemingly using the ICT of Bandwidth Throttling rather consistently. Russia’s approach to Internet censorship, in stark contrast to Iran and China, is found to rely mostly on the legislative system and fear to implement censorship, though their technical level of ICT implementation grows daily. TOR, VPNs, and Proxy Servers are all analyzed and found to be robust CTs. Drawing primarily from the examples given throughout the paper, the author highlights the various effects of Internet Censorship on culture – noting that at its core, Internet Censorship destroys democracy
    • …
    corecore