Explore chapters and articles related to this topic
2 Types of IP Video
Published in Wes Simpson, Howard Greenfield, IPTV and Internet Video:, 2012
Wes Simpson, Howard Greenfield
The term walled garden refers to a collection of content that has been preselected by a service provider and indicates that choices outside of this collection are not available to viewers. This is virtually always the case for IPTV providers, as shown in Table 2.13, because each channel made available to viewers needs to be under the control of the service provider, for both functional and financial reasons. Similarly, IPVOD services tend to be limited to the content selections that the service provider has been able to obtain from owners.
An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication
Published in Behaviour & Information Technology, 2018
Flynn Wolf, Ravi Kuber, Adam J Aviv
To manage their own mobile authentication risk, based upon the type of data exposure, some security-conscious users wanted more granular insight and control of processes on their devices. For example, Participant 3 demonstrated using a network analysis application on his tablet to characterise the dozens of open wireless connections in his surroundings, and to observe the connections made by other apps he had installed. He explained that being able to see this extra information motivated his desire to use strong authentication and to control the individual service permissions given to applications, as well as his refusal to load many common mobile applications that he felt would risk his credentials. Participant 13, a CTO for a security systems integration company, predicted a similar response to authentication challenges in the future for himself and other security-conscious users. He felt that these users would ‘dig in their heels’ to be the ‘back of the pack’ in adopting new technology that might undermine their ability to control their own devices and the information they collect, so as to ‘dilute’ the ‘correlatable ability between platforms.’ As an implication, security-conscious users in this regard might well be suggestive of users who may want more ability to configure ‘under the hood’ of their device processes, such as what specifically the device tells the user about changes in the use of their persona-based services or stored authenticated data. This desire may be a challenge to ‘walled garden’ approaches that would instead restrict user control. As stated previously (Section 1.1), the transferability of this finding to everyday users is an important consideration. While studies of security experts have found differing outlook and behaviour from everyday users, it appears that this informed demographic itself is growing, and that greater concern for mobile computing risks may be spreading to everyday users.