66,032 research outputs found
An Empirical Study on Android for Saving Non-shared Data on Public Storage
With millions of apps that can be downloaded from official or third-party
market, Android has become one of the most popular mobile platforms today.
These apps help people in all kinds of ways and thus have access to lots of
user's data that in general fall into three categories: sensitive data, data to
be shared with other apps, and non-sensitive data not to be shared with others.
For the first and second type of data, Android has provided very good storage
models: an app's private sensitive data are saved to its private folder that
can only be access by the app itself, and the data to be shared are saved to
public storage (either the external SD card or the emulated SD card area on
internal FLASH memory). But for the last type, i.e., an app's non-sensitive and
non-shared data, there is a big problem in Android's current storage model
which essentially encourages an app to save its non-sensitive data to shared
public storage that can be accessed by other apps. At first glance, it seems no
problem to do so, as those data are non-sensitive after all, but it implicitly
assumes that app developers could correctly identify all sensitive data and
prevent all possible information leakage from private-but-non-sensitive data.
In this paper, we will demonstrate that this is an invalid assumption with a
thorough survey on information leaks of those apps that had followed Android's
recommended storage model for non-sensitive data. Our studies showed that
highly sensitive information from billions of users can be easily hacked by
exploiting the mentioned problematic storage model. Although our empirical
studies are based on a limited set of apps, the identified problems are never
isolated or accidental bugs of those apps being investigated. On the contrary,
the problem is rooted from the vulnerable storage model recommended by Android.
To mitigate the threat, we also propose a defense framework
Agricultural information dissemination using ICTs: a review and analysis of information dissemination models in China
Open Access funded by China Agricultural UniversityOver the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs). Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer
Impacts of WeChat on Millennials’ Perceptions and Consumption Behaviors in the Hotel Industry
Social media, known as interactive Web 2.0 Internet-based applications, has deeply changed and reformed interpersonal communication and business operation with the wide spread of Internet and the development of technology. In the past few years, since mobile apps are becoming more and more popular, the access of social media is not limited to tablet computers only, but is also available for almost all kinds of smart phone devices, such as iPhone, Android, Symbian and so on. The function of social media is not confined to real- time message transmission or information sharing any more. It has expanded to a widely range of features, such as online purchase and payment, e-commerce business, and service for different types of social events.
Social media plays an increasingly important role in daily personal life as well as in business activities. People are not merely considered as social media users, but also the component of social media itself. As a result, it is very crucial for people to realize the importance and impacts of social media, especially for those business operators.
WeChat (Weixin in Chinses, literally “micro message”) is a cross-platform instant text and voice messaging communication service for multiple mobile devices, developed by Tecent in China, first released in the January of 2011. It is claimed to provide “the new way to connect” and create “a way of life”. It is free to download, install and register, and support all kinds of smart phone platforms with multiple language versions, such as Chinese, English, Japanese, French, and Spanish. WeChat provides its users different ways to communicate and interact with friends innovatively through instant text messaging, hold-to-talk voice messaging, group messaging, lively video sharing, location sharing, money transferring, and contact information sharing.
Among all the WeChat users, Millennials is the majority. With the growing-up of Millennials, they are becoming more and more powerful and important to the society and will be the next target segmentation for most of the industries in the very near future. Especially for the hotel industry, the industry that urges to attract Millennials patrons for further substantial development, how to attract Millennials is becoming a critical issue for those hotel operators
Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures. The author spends a large majority of the paper delineating China’s Internet infrastructure and prevalent Internet Censorship Technologies/Techniques (ICTs), paying particular attention to how the ICTs function at a technical level. The author further analyzes the state of Internet Censorship in both Iran and Russia from a broader perspective to give a better understanding of Internet Censorship around the globe. The author also highlights specific CTs, explaining how they function at a technical level. Findings indicate that among all three nation-states, state control of Internet Service Providers is the backbone of Internet Censorship. Specifically, within China, it is discovered that the infrastructure functions as an Intranet, thereby creating a closed system. Further, BGP Hijacking, DNS Poisoning, and TCP RST attacks are analyzed to understand their use-case within China. It is found that Iran functions much like a weaker version of China in regards to ICTs, with the state seemingly using the ICT of Bandwidth Throttling rather consistently. Russia’s approach to Internet censorship, in stark contrast to Iran and China, is found to rely mostly on the legislative system and fear to implement censorship, though their technical level of ICT implementation grows daily. TOR, VPNs, and Proxy Servers are all analyzed and found to be robust CTs. Drawing primarily from the examples given throughout the paper, the author highlights the various effects of Internet Censorship on culture – noting that at its core, Internet Censorship destroys democracy
Recommended from our members
The influence of national culture on the attitude towards mobile recommender systems
This is the post-print version of the final paper published in Technological Forecasting and Social Change. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2013 Elsevier B.V.This study aimed to identify factors that influence user attitudes towards mobile recommender systems and to examine how these factors interact with cultural values to affect attitudes towards this technology. Based on the theory of reasoned action, belief factors for mobile recommender systems are identified in three dimensions: functional, contextual, and social. Hypotheses explaining different impacts of cultural values on the factors affecting attitudes were also proposed. The research model was tested based on data collected in China, South Korea, and the United Kingdom. Findings indicate that functional and social factors have significant impacts on user attitudes towards mobile recommender systems. The relationships between belief factors and attitudes are moderated by two cultural values: collectivism and uncertainty avoidance. The theoretical and practical implications of applying theory of reasoned action and innovation diffusion theory to explain the adoption of new technologies in societies with different cultures are also discussed.National Research Foundation
of Korea Grant funded by the Korean governmen
- …