Explore chapters and articles related to this topic
Security and Privacy in Mobile Cloud Computing
Published in Mukesh Kumar Awasthi, Ravi Tomar, Maanak Gupta, Mathematical Modeling for Intelligent Systems, 2023
The mobile terminal’s openness and adaptability constantly attract the attention of attackers. Some malware can be downloaded and carried without the user’s knowledge, alongside helpful programs and systems. This allows the malware to get unauthorized access to personal information without the user’s intervention. In order to combat malware, several security firms have created antivirus software for mobile devices. However, as harmful assaults get more complicated, antimalware solutions should perform a similar role to that of the desktop. They have limited capacity and resources, necessitating antimalware solutions that need considerable compute resources difficult to achieve.
Design of a Secure Infrastructure for Cognitive IoT Platforms and Applications
Published in Pethuru Raj, Anupama C. Raman, Harihara Subramanian, Cognitive Internet of Things, 2022
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
Smartphones have the capability to connect to various types of external systems like internet, GPS, and other different types of mobile devices using wireless networking technology. This is the key feature of smartphone which makes it one of the most widely used and popular devices. Many cognitive IoT applications which are run using smartphones store personal data like address book, bank account details, meeting and appointment details, and so on, in the smartphones. Proliferation of technologies like near-field communication (NFC) for various purposes makes it very critical to ensure security of the smartphone and the data which is stored in the smartphone. A smartphone is exposed to a lot of vulnerabilities which can compromise its security.
The Power of Light
Published in Denise Wilson, Wearable Solar Cell Systems, 2019
Distinctions among portable, mobile, and wearable devices used to be clear. A portable device was an electronic device that could be carried around relatively easily—lightweight and not too bulky. A mobile device referred to a portable device that allowed its users to be mobile, typically through a meaningful degree of connectivity, whether Wi-Fi or cellular. A wearable device was one that did not need to be carried but managed to stay on an individual's body without assistance, albeit with no connectivity to the rest of the world.
Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea
Published in Journal of Computer Information Systems, 2023
Claire Seungeun Lee, Dongsim Kim
An additional 10 statements with yes (1) or no (0) responses were added to measure cybersecurity protection behavior on mobile devices. These items specifically include: (1) Do not arbitrarily set smartphone permissions; (2) Turn off the ‘Install apps from unknown sources (unauthorized)’ feature; (3) Install the smishing blocking app; (4) Mobile antivirus installation and check (V3, tablet Android, phone antispy, etc.); (5) Updating the operating system (iOS, Android) to the latest version; (6) Use only the official app market; (7) Checking whether the required permissions are appropriate when installing the app; (8) Do not activate phone administrator privileges; (9) Avoid visiting untrusted websites; and (10) Turn on wireless interfaces such as Bluetooth and wireless LAN only when using. Recommended protection behaviors for mobile devices include only downloading applications from official app stores and not visiting untrustworthy websites.
Customization Support in Computer-Based Technologies for Autism: A Systematic Mapping Study
Published in International Journal of Human–Computer Interaction, 2020
Roberto E. Lopez-Herrejon, Oishi Poddar, Gerardo Herrera, Javier Sevilla
Research question RQ2 – computer technologies. We adhered to the classification scheme by Kientz et al. (2013) as follows: personal computers, for example, desktops and laptops.web-based systems that fundamentally require a web browser for interaction.video shown in devices such as DVD players, cameras, or computers.multimedia including sounds, lights, or any combination thereof.mobile devices such as smartphones and tablets.shared active surfaces such as smartboards, smart tables, and smart displays.virtual and augmented reality immersive environments.sensor-based and wearables for instance to measure the level of attention or engagement of users.natural input that includes for instance movements, gestures, or speech commands.
Application-oriented offloading in heterogeneous networks for mobile cloud computing
Published in Enterprise Information Systems, 2018
Fan-Hsun Tseng, Hsin-Hung Cho, Kai-Di Chang, Jheng-Cong Li, Timothy K. Shih
Mobile devices have gained popularity among our life, e.g., smartphone, tablet, smart watches and smart glass. The hardware of mobile device becomes more powerful and equips with high computing capability. As a result, more and more applications and services not only can be executed on desktops or laptops but also on mobile and portable devices (Wang et al. 2014). A vast numbers of applications have been conducted for personal usage recently, e.g., face recognition (Soyata et al. 2012), virtual and augmented reality games (Lewis and Rosie 2012) (Yamabe and Nakajima 2013). However mobile device suffers from these high computing applications due to its finite resource capacity (Bi et al. 2015) (Tseng, 2015a) such as limited battery (Yen et al. 2008), fixed amount of Central Processing Unit (CPU) and memory (Cho et al. 2016). Various applications have exhausted the computing resources of mobile devices, thereby the Mobile