3 research outputs found
Consumer Intentions to Accept and Use Mobile Advertising
Mobilne naprave se vse bolj vkljuÄujejo v življenja ljudi. S tem so oglaÅ”evalci pridobili nove priložnosti za komuniciranje s svojimi strankami, podjetja pa možnosti za oglaÅ”evanje svojih produktov in storitev na personaliziran naÄin. Mobilno oglaÅ”evanje je tako pritegnilo pozornost oglaÅ”evalcev in raziskovalcev. Kljub dejstvu, da potroÅ”niki že dolgo za svojimi mobilnimi napravami preživijo veliko Äasa, pa tržniki Å”e vedno iÅ”Äejo naÄine, kako bi v celoti izkoristili vse prednosti tega medija. Raziskovalci so v zadnjem Äasu izvedli veÄ Å”tudij na podroÄju presoje in napovedovanja odnosa potroÅ”nikov do mobilnega oglaÅ”evanja, toda nekatere nejasnosti Å”e vedno obstajajo. Slednje Å”e posebej velja za Pakistan, kjer je bilo opravljenih zelo malo raziskav na podroÄju mobilnega oglaÅ”evanja. PriÄujoÄa disertacija zato teoretsko obravnava presojo namer potroÅ”nikov o sprejetju in uporabi mobilnega oglaÅ”evanja in vkljuÄuje empiriÄno Å”tudijo v Pakistanu. Tema je relativno mlada in Å”e premalo raziskana, zato prinaÅ”a Å”tevilne priložnosti za razvoj novih in razÅ”iritev obstojeÄih teorij. PriÄujoÄa disertacija želi razÅ”iriti obstojeÄo teorijo, to je Združeno teorijo o tehnoloÅ”kem sprejetju in uporabi. Za to je bil oblikovan meÅ”an raziskovalni pristop (ang. Mixed Methods Approach), v katerem se rezultati ustvarijo s kvantitativno in kvalitativno analizo podatkov, z namenom identifikacije kljuÄnih dejavnikov, ki lahko vplivajo na namero potroÅ”nikov o sprejetju mobilnega oglaÅ”evanja. Cilj disertacije je premostiti vrzel v znanju na podroÄju presoje namere potroÅ”nikov in njihovega odnosa do uporabe mobilnega oglaÅ”evanja. Teoretski in empiriÄni rezultati so izpostavili nekaj kljuÄnih dejavnikov (kot na primer priÄakovan trud, priÄakovani uÄinek, zaznan užitek, zaznana nadležnost in personalizacija), ki vplivajo na namero potroÅ”nikov o sprejetju mobilnega oglaÅ”evanja. Poleg tega so rezultati razkrili tudi odnos med potroÅ”nikovo namero sprejetja in sprejetjem mobilnega oglaÅ”evanja.The world has witnessed a high level of mobile device penetration in peopleās lives. This has not only created an opportunity for marketers to communicate with their customers but has also enabled companies to advertise their products and services in personalized way. Due to this, mobile advertising has got the attention of both marketers and researchers. However, marketers have been struggling to fully exploit the benefits of this medium, even though consumers spend a considerable amount of their time on mobile devices. Recently, researchers have conducted various studies into ways to assess and predict consumer attitudes towards mobile advertising, but there is still ambiguity in this area. This is particularly the case in Pakistan, where very little research has been conducted in the area of mobile advertising. The current thesis is targeted towards assessing consumer intentions to accept and use mobile advertising. This under-researched topic is still in its infancy and there are lots of opportunities to not only come up with new theories but also extend the existing ones. The current thesis attempts to extend the existing unified theory of acceptance and use of technology (UTAUT). To do this, a mixed methodological approach was adopted where both quantitative and qualitative analysis techniques were applied to the data in order to uncover crucial factors that can affect consumer intentions to accept and use mobile advertising. The goal of the current thesis is to bridge the knowledge gap by assessing consumer intentions and actual behaviour towards mobile advertising. The results highlight some of the crucial factors (such as effort expectancy, performance expectancy, perceived enjoyment, perceived irritation, and personalization) that can affect consumer intentions to accept and use mobile advertising. In addition to this, the results also highlight the relationship between consumer intentions to accept and use mobile advertising
Automata-based Model Counting String Constraint Solver for Vulnerability Analysis
Most common vulnerabilities in modern software applications are due to errors in string manipulation code. String constraint solvers are essential components of program analysis techniques for detecting and repairing vulnerabilities that are due to string manipulation errors. In this dissertation, we present an automata-based string constraint solver for vulnerability analysis of string manipulating programs.Given a string constraint, we generate an automaton that accepts all solutions that satisfy the constraint. Our string constraint solver can also map linear arithmetic constraints to automata in order to handle constraints on string lengths. By integrating our string constraint solver to a symbolic execution tool, we can check for string manipulation errors in programs. Recently, quantitative and probabilistic program analyses techniques have been proposed which require counting the number of solutions to string constraints. We extend our string constraint solver with model counting capability based on the observation that, using an automata-based constraint representation, model counting reduces to path counting, which can be solved precisely. Our approach is parameterized in the sense that, we do notassume a finite domain size during automata construction, resulting in a potentially infinite set of solutions, and our model counting approach works for arbitrarily large bounds.We have implemented our approach in a tool called ABC (Automata-Based model Counter) using a constraint language that is compatible with the SMTLIB language specification used by satifiabilty-modula-theories solvers. This SMTLIB interface facilitates integration of our constraint solver with existing symbolic execution tools. We demonstrate the effectiveness of ABC on a large set of string constraints extracted from real-world web applications.We also present automata-based testing techniques for string manipulating programs. A vulnerability signature is a characterization of all user inputs that can be used to exploit a vulnerability. Automata-based static string analysis techniques allow automated computation of vulnerability signatures represented as automata. Given a vulnerability signature represented as an automaton, we present algorithms for test case generation based on state, transition, and path coverage. These automaticallygenerated test cases can be used to test applications that are not analyzable statically, and to discover attack strings that demonstrate how the vulnerabilities can be exploited. We experimentally comparedifferent coverage criteria and demonstrate the effectiveness of our test generation approach
Visual configuration of mobile privacy policies
Mobile applications often require access to private user informtion, such as the user or device ID, the location or the contact list. Usage of such data varies across different applications. A notable example is advertising. For contextual advertising, some applications release precise data, such as the userās exact address, while other applications release only the userās country. Another dimension is the user. Some users are more privacy demanding than others. Existing solutions for privacy enforcement are neither app- nor user- sensitive, instead performing general tracking of private data into release points like the Internet. The main contribution of this paper is in refining privacy enforcement by letting the user configure privacy preferences through a visual interface that captures the applicationās screens enriched with privacy-relevant information. We demonstrate the efficacy of our approach w.r.t. advertising and analytics, which are the main (third-party) consumers of private user information. We have implemented our approach for Android as the VisiDroid system. We demonstrate VisiDroidās efficacy via both quantitative and qualitative experiments involving top-popular Google Play apps. Our experiments include objective metrics, such as the average number of configuration actions per app, as well as a user study to validate the usability of VisiDroid