Filters








103 Hits in 2.8 sec

Privacy in location-based services

Oliver Andreas Jorns
2009 unpublished
This dissertation discusses first various aspects of location-based systems and out of it the various needs that have to be addressed to be able to provide flexible location-based services to mobile users  ...  The main contribution of this work is a mechanism that is based on the notion of pseudonyms. The use of this kind of pseudonyms provides maximum security and privacy for users during communication.  ...  are rather evidence of poor practice.  ... 
doi:10.25365/thesis.6400 fatcat:b5joaols3nc45m42cyxplmwlra

Preventive Actions to Emerging Threats in Smart Devices Security

Nilay Mistry, M S Dahiya, Hitesh Sanghvi
2013 The International Journal of Forensic Computer Science  
The study revealed that the only type of phone, vulnerable to a virus attack is one that runs an operating system -a Smartphone.  ...  Year 2011/12 is an era of embedded systems -Smart Devices and Tablets are enormously common in use.  ...  Bluejacking Bluejacking -the distribution of unwanted messages over Bluetooth to Bluetooth-enabled devices such as cell phones, smart devices and PDAs sending a contact number information which typically  ... 
doi:10.5769/j201301003 fatcat:iegkyjodtjhcpptvvvup4a6nf4

A Simple Way to Improve the Security of Bluetooth Devices

Peter Dell, Khwaja Shan-ul-Hasan Ghori
2008 2008 International Symposium on Applications and the Internet  
A subsequent investigation of a number of devices determined that no way of configuring individual profiles was available.  ...  This fact, combined with the growing sophistication of devices, creates the potential for serious loss in the event of a security breach.  ...  BlueJack is also the name of a tool commonly used to perform this kind of attack.  ... 
doi:10.1109/saint.2008.39 dblp:conf/saint/DellG08 fatcat:cozo7uw6nvg7tfr4c7ontrwl7a

MOBILE MALWARE: COMING TO A SMARTPHONE NEAR YOU?

2014 Issues in Information Systems  
A total of 187 participants were surveyed, including undergraduates and doctoral students and alumni at a mid-Atlantic university.  ...  A set of recommendations for increasing awareness of preventative security measures for mobile malware were also presented.  ...  There are a few different types of vulnerabilities that can be exploited when Bluetooth connectivity is turned on for a mobile device. Bluejacking is a type of practical joke akin to spam.  ... 
doi:10.48009/2_iis_2014_116-123 fatcat:gd3e65pn3vf3rld5vrwzowz4re

PRIVACY AND SECURITY CONSIDERATIONS OF THE IOT: APPROACHING PRIVACY BY DESIGN

2020 Issues in Information Systems  
The Internet of Things (IoT) is an ever-expanding network of sensors and devices.  ...  In military environments, the consequences of privacy leakage can be enormous.  ...  Bluejacking refers to the practice of sending unwanted information to a bluetooth enabled device (e.g., pairing with unsuspecting headphones on an airplane).  ... 
doi:10.48009/2_iis_2020_57-63 fatcat:6ttf2g346jcndf4yid5sxwgggy

A leaky bucket called smartphone

Osman Ugus, Dirk Westhoff, Hariharan Rajasekaran
2012 2012 IEEE International Conference on Pervasive Computing and Communications Workshops  
The focus of this work is therefore to present a set of representative attacks on smartphone specific services and to identify meaningful locations where particular countermeasures available from the literature  ...  This paper does not intend to present a complete list of attacks.  ...  It is very difficult to stop such behavior unless someone actually studies the behavior of the App in a test environment.  ... 
doi:10.1109/percomw.2012.6197513 dblp:conf/percom/UgusWR12 fatcat:3ed7mzutf5dfrihxzv7bc56pn4

The Mobile Effect

Drew Hemment
2005 Convergence. The International Journal of Research into New Media Technologies  
I shall approach this by drawing upon a consideration of the practice of artists and technologists exploring social and creative applications of mobile technology, as well as upon certain representations  ...  distance or location irrelevant.  ...  Location-awareness, the technical capacity to locate, has emerged as a key concern across a broad range of contexts, for the routing of calls or the delivery of contextual information -information relevant  ... 
doi:10.1177/135485650501100204 fatcat:yo2hpxn4yzfojedajjaacoyjde

A User Perspective on the Vulnerabilities of Smart Watches: Is Security a Concern?

Daniela Popescul, Mircea Georgescu
2017 Timisoara Journal of Economics and Business  
Inspired by a similar study conducted by (Genaro Motti & Caine, 2016), we selected and reviewed 931 comments posted by the buyers of the ten most popular smart watches, in order to identify the hardware  ...  Nowadays, we are witnessing a serious gain in popularity of the wearable smart things.  ...  The paper offers only a non-exhaustive review of hardware, software and connectivity problems attached to smart watches use, with the intention to raise the awareness in this area of large public interest  ... 
doi:10.1515/tjeb-2017-0009 fatcat:fhoxl7h4xjd73klwyt476hp2xq

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures [article]

Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin Heaslip, Ryan Gerdes
2019 arXiv   pre-print
The outcome of this study is of critical importance, because of two main reasons: (1) independent studies on security of VANETs on different strata need to come together and to be covered from a whole  ...  In this study, we attempt to add to the literature of Connected and Automated Vehicle (CAV) security by incorporating the security vulnerabilities and countermeasures of the Vehicular Ad hoc Networks (  ...  Bluejacking [126, 127] : Bluejacking is less of a harmful attack resembling fishing in software security.  ... 
arXiv:1903.01541v1 fatcat:ntanpbw3z5benhlbzn6vzqm7ne

Risk Analysis of BYOD in Afghanistan's Organization

2020 International journal of recent technology and engineering  
The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods.  ...  The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats.  ...  ACKNOWLEDGMENT The Authors would like to thank Higher Education Development Program (HEDP) of Afghanistan for supporting this study financially.  ... 
doi:10.35940/ijrte.c4684.099320 fatcat:esuavy5mvrclvacxis2ovtpos4

Influence of selection systems and shelterwood methods on understory plant communities of longleaf pine forests in flatwoods and uplands

Dale G. Brockway, Kenneth W. Outcalt
2015 Forest Ecology and Management  
Selection silviculture has been practiced on a limited scale in longleaf pine, but difficulty of using traditional approaches and absence of an evaluation across a range of site types has left managers  ...  This study was conducted to quantify the effects on understory plant communities of applying single-tree selection, group selection, irregular shelterwood and uniform shelterwood in longleaf pine forests  ...  Funding for this study was provided by the State of Florida, Division of Forestry [agreement SRS-04-CO-11330123-043].  ... 
doi:10.1016/j.foreco.2015.08.020 fatcat:ouwetkchavcuxfi7pcd6kctnzi

Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm

Manmeet Mahinderjit, Chen Wai, Zakiah Zulkefli
2017 International Journal of Advanced Computer Science and Applications  
The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere  ...  A survey was conducted in learning the current awareness of security and privacy importance in BYOD for higher education in Malaysia.  ...  When users connect their devices to an unsecure network such as public Wi-Fi, the devices will open for a variety of security and privacy attacks such as Wi-Fi hijacking, Bluejacking and etc.  ... 
doi:10.14569/ijacsa.2017.080208 fatcat:shztel5fxnfnrlez7xrthnmeci

Vertical organization of the division of labor within nests of the Florida harvester ant, Pogonomyrmex badius

Walter R. Tschinkel, Nicholas Hanley, Gadi V.P. Reddy
2017 PLoS ONE  
The importance of these findings for laboratory studies of division of labor are discussed. The efficient allocation of labor is a key component of superorganismal fitness. Fig 5.  ...  Distribution of marked seeds, larvae, callow and beetle pieces by depth. A. Distribution of marked seeds in 10 cm increments of depth; B.  ...  Acknowledgments We thank Christina Kwapich for advice on mark-recapture procedures and for helpful comments on an earlier version of this paper.  ... 
doi:10.1371/journal.pone.0188630 pmid:29182686 pmcid:PMC5705139 fatcat:eb7fcrz4efaehi37khssbp3qie

Techniques for Estimating the Size of Low-Density Gopher Tortoise Populations

Jonathan M. Stober, Rocio Prieto-Gonzalez, Lora L. Smith, Tiago A. Marques, Len Thomas
2017 Journal of Fish and Wildlife Management  
These techniques are applicable to other studies and species.  ...  Systematic line transect survey designs give better precision and are practical to implement and analyze.  ...  Acknowledgments Any use of trade, product, website, or firm names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government.  ... 
doi:10.3996/012017-jfwm-005 fatcat:gjw3dbwlwzc2pkjqi7cpgxv46a

Subtle effects of a managed fire regime: A case study in the longleaf pine ecosystem

Marcus A. Lashley, M. Colter Chitwood, Annemarie Prince, Morgan B. Elfelt, Eric L. Kilburg, Christopher S. DePerno, Christopher E. Moorman
2014 Ecological Indicators  
Mast was maintained, though in an unnatural distribution, as a result of an elaborate firebreak system.  ...  We evaluated the density and distribution of oak (Quercus spp.) and persimmon (Diospyros virgiana) stems and mast after 22 yr of a historical-based growing-season fire prescription that failed to consider  ...  Acknowledgments We thank the United States Department of Defense and Fort Bragg Military Installation for financial contributions to this research. We thank the Fort Bragg Wildlife Branch and A.  ... 
doi:10.1016/j.ecolind.2013.11.006 fatcat:3n4llxgkkfgitnkybbiac5ufci
« Previous Showing results 1 — 15 out of 103 results