scholarly journals A Lifelog Browser for Visualization and Search of Mobile Everyday-Life

2014 ◽  
Vol 10 (3) ◽  
pp. 243-258 ◽  
Author(s):  
Keum-Sung Hwang ◽  
Sung-Bae Cho

Mobile devices can now handle a great deal of information thanks to the convergence of diverse functionalities. Mobile environments have already shown great potential in terms of providing customized service to users because they can record meaningful and private information continually for long periods of time. The research for understanding, searching and summarizing the everyday-life of human has received increasing attention in recent years due to the digital convergence. In this paper, we propose a mobile life browser, which visualizes and searches human's mobile life based on the contents and context of lifelog data. The mobile life browser is for searching the personal information effectively collected on his/her mobile device and for supporting the concept-based searching method by using concept networks and Bayesian networks. In the experiments, we collected the real mobile log data from three users for a month and visualized the mobile lives of the users with the mobile life browser developed. Some tests on searching tasks confirmed that the result using the proposed concept-based searching method is promising.

2015 ◽  
pp. 1182-1203
Author(s):  
Lemi Baruh ◽  
Mihaela Popescu

In the wake of the quick penetration of mobile devices into the everyday lives of individuals, protection of privacy in mobile ecosystems has become a hot button issue. Existing regulatory efforts on mobile privacy primarily focus on protection of the informational privacy of individuals. While necessary, focusing solely on informational privacy may not be sufficient in terms of protecting users' privacy in mobile environments. The chapter discusses the privacy implications of design architectures and economic arrangements in the mobile ecosystems and argues that mobile environments create privacy-threatening “sticky” relationships that make it increasingly difficult for individuals not only to control flow of information about themselves, but also flow of communication that targets them. This chapter argues that an important supplement to protecting users' privacy is to restore users' control over the communicative interaction with the companies seeking to target them. To that purpose, the chapter offers a set of principles, called “home mode” for mobile privacy, in implementing remedies for threats to privacy in mobile environments.


2012 ◽  
Vol 9 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Won-Ik Park ◽  
Sanggil Kang ◽  
Young-Kuk Kim

With the development and diffusion of compact and portable mobile devices, users can use multimedia content such as music and movie on personal mobile devices, anytime and anywhere. However, even with the rapid development of mobile device technology, it is still not easy to search multimedia content or manage large volume of content in a mobile device with limited resources. To resolve these problems, an approach for recommending content on the server-side is one of the popular solutions. However, the recommendation in a server also leads to some problems like the scalability for a lot of users and the management of personal information. Therefore, this paper defines a personal content manager which acts between content providers (server) and mobile devices and proposes a method for recommending multimedia content in the personal content manager. For the recommendation based on user's personal characteristic and preference, this paper adopts and applies the DISC model which is verified in psychology field for classifying user's behavior pattern. The proposed recommendation method also includes an algorithm for reflecting dynamic environmental context. Through the implements and evaluation of a prototype system, this paper shows that the proposed method has acceptable performance for multimedia content recommendation.


2019 ◽  
Vol 5 (2) ◽  
pp. 85-102
Author(s):  
Aleksandra Gralczyk

Abstract In the presented article, the author explains the need for reflection on the use of a smartphone or tablet by the youngest media users. It presents current research on the use and impact of mobile devices on children, as well as the destructive dimension of the consequences caused by their excessive use as well as the need and scope of education of media competence of preschoolers. The author also presents the results of her own research regarding parents’ opinions on the role and impact of a smartphone / tablet in children’s everyday life. It also presents the teachers’ view on the role of educators in the process of acquiring media competence by children.


2015 ◽  
Vol 23 (5) ◽  
pp. 450-475 ◽  
Author(s):  
Himanshu Srivastava ◽  
Shashikala Tapaswi

Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them. Design/methodology/approach – Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods. Findings – Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified. Research limitations/implications – The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices. Practical implications – The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation. Originality/value – This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.


Author(s):  
Chara Papoutsi ◽  
Athanasios Drigas

<strong>Mobile devices, such as mobile phones and personal digital assistants, have gained wide-spread popularity and are part of the everyday life of billions of people. Today’s mobile phones represent a rich and powerful computing platform, given their sensing, processing, social and communication capabilities. Empathy is the ability to identify with and understand another person’s situation and feelings. Our ability to empathize affects how well we communicate our thoughts and feelings with others, how well we understand others, and how comfortable people feel communicating with us. Mobile devices have made a huge step in trying to cultivate empathy to people and different social groups through interesting applications.</strong>


Author(s):  
Lemi Baruh ◽  
Mihaela Popescu

In the wake of the quick penetration of mobile devices into the everyday lives of individuals, protection of privacy in mobile ecosystems has become a hot button issue. Existing regulatory efforts on mobile privacy primarily focus on protection of the informational privacy of individuals. While necessary, focusing solely on informational privacy may not be sufficient in terms of protecting users’ privacy in mobile environments. The chapter discusses the privacy implications of design architectures and economic arrangements in the mobile ecosystems and argues that mobile environments create privacy-threatening “sticky” relationships that make it increasingly difficult for individuals not only to control flow of information about themselves, but also flow of communication that targets them. This chapter argues that an important supplement to protecting users’ privacy is to restore users’ control over the communicative interaction with the companies seeking to target them. To that purpose, the chapter offers a set of principles, called “home mode” for mobile privacy, in implementing remedies for threats to privacy in mobile environments.


2017 ◽  
Vol 17 (02) ◽  
pp. e14 ◽  
Author(s):  
Flávia L. Arantes ◽  
Fernanda Maria P. Freire ◽  
Jan Breuer ◽  
André Constantino da Silva ◽  
Renato César Alves de Oliveira ◽  
...  

Mobile devices, such as tablets and smartphones, are increasingly present in the everyday life of young people. Despite such insertion, the use of those devices in scenarios such as m-learning is still a missed opportunity. In a previous work we verified that an editor that aggregates various kinds of media can help students in their studies. With that motivation in mind, we realized the Multimodal Editor – a useful tool to leverage the multimedia authorship. In this paper we describe our trajectory toward the Editor – requirements gathering, implementation, challenges, usage scenario and evaluation.


2019 ◽  
Vol 27 (1) ◽  
pp. 62-80 ◽  
Author(s):  
Vinayak Agrawal ◽  
Shashikala Tapaswi

Purpose The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts. Design/methodology/approach Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted. Findings Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory. Research limitations/implications As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications. Practical implications Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation. Originality/value This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.


2018 ◽  
Vol 232 ◽  
pp. 04022
Author(s):  
Xiao-yang Hu ◽  
Kai-yan Chen ◽  
Yang Zhang ◽  
Dong-xin Guo ◽  
Yan-hai Wei

The portability and various functions of mobile devices enable them to go deep into people's study, work and life. While it is convenient for people, mobile devices contain a large number of user’s private information, such as the user's personal property information, identity information and even the confidential information of enterprise etc. Side-channel attack is currently one of the most effective ways to steal private information of cryptographic devices thus the threat to mobile devices can be imagined. In this paper, the electromagnetic side-channel attack based on AES encryption algorithm on mobile device—PCM-9589F Multi-COM Board is studied. A new signal acquisition platform is designed, which solves the problem that the difficulty in locating the side-channel electromagnetic leakage signal of the mobile devices. In addition,using the time-frequency analysis and filter technology,we extract the encryption features of AES on PCM-9589F Multi-COM Board.


Author(s):  
DAVIDE BELLINZONA ◽  
CLAUDIA RAIBULET

Nowadays, mobile devices have an increasing role in the generation and visualization of multimedia content. The issues raised by the management of multimedia content in mobile environments are mostly due to the variety of available devices, their limitations in front of the traditional ones, the network characteristics, the variety of the multimedia content types and formats, as well as to the lack of common standards related to the provisioning of services. In this context, Alembik aims to address these limitations and to provide a framework to transcode and adapt the multimedia content at runtime to the properties of the requiring mobile device. The main keywords which characterize Alembik are: dynamicity, flexibility, extensibility, standardization, user transparency, platform independence, high performance, and open source.


Sign in / Sign up

Export Citation Format

Share Document