共查询到20条相似文献,搜索用时 593 毫秒
1.
2.
3G智能手机的普及,将使得其成为人们日常生活中另一个越来越为重要的网络终端,给人们的生活和通讯交流带来了革命性的便利。但是一些安全风险也随之浮出水面并迅速蔓延,影响范围广泛。3G手机用户们正面临着同电脑情况一样的病毒和木马泛滥;个人隐私受到侵犯和泄漏;垃圾短信和骚扰电话层出不穷。不仅影响到个人生活,也带来了不同程度的经济损失。解决手机安全问题,需要来自手机安全软件生产商、手机生产商、移动运营商和行业规范制订和管理者等多方面共同努力。本文主要介绍了3G手机面临的安全问题和可能采取的防范手段。 相似文献
3.
4.
5.
6.
7.
8.
私家车的普及使驾驶安全越来越引起人们的关注,而驾驶中由于移动电话导致的安全事故占不小的比例,本问就传统的IVR(Interactive Voice Response)平台在驾驶安全中的应用进行创新,系统包括部署一套IVR平台和一个手机客户端软件;客户端软件用于在开车过程中启动客户端软件,打开驾驶状态,此时手机不再有来电和来短信的声音提示,所有的来电转接到IVR平台,所有的来短信均自动回复,IVR平台用于处理设置驾驶状态的手机来电,接受到来电后提示此人正在开车,同时自动短信提示提示对方,当手机客户端取消驾驶状态后,IVR平台服务器把这段驾驶时间段内的所有来电信息下发到手机客户端,由用户回拨等处理。 相似文献
9.
10.
11.
Jiun-Hung Ding Roger Chien Shih-Hao Hung Yi-Lan Lin Che-Yang Kuo Ching-Hsien Hsu Yeh-Ching Chung 《International Journal of Information Management》2014
As mobile networks and devices being rapidly innovated, many new Internet services and applications have been deployed. However, the current implementation faces security, management, and performance issues, which are critical to the use in business environments. Migrating sensitive information, management facilities, and intensive computation to security hardened virtualized environment in the cloud provides effective solutions. This paper proposes an innovative Internet service and business model to provide a secure and consolidated environment for enterprise mobile information management based on the infrastructure of cloud-based virtual phones (CVP). Our proposed solution enables the users to execute Android and web applications in the cloud and connect to other users of CVP with enhanced performance and protected privacy. The organization of CVP can be mixed with centralized control and distributed protocols, which emulates the behavior of human societies. This minimizes the need to handle sensitive data in mobile devices, eases the management of data, and reduces the overhead of mobile application deployment. 相似文献
12.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed. 相似文献
13.
在充满压力的生活中,我们需要一种能够使人放松心情,释放压力的方式,“乐动我心”就是一款通过Android平台来实现这个目的的应用程序。这是一款休闲类应用,它拥有在线更新、下载歌曲、播放图片文字的功能,并且拥有国际化设计,实现多语言。除此之外,还可以将用户喜欢的内容分享到微博。 相似文献
14.
随着移动技术的发展,图书馆数字化的资源已不局限于在电脑上进行展示,手机已成为用户浏览图书馆数字化资源的重要工具。本文根据笔者所在图书馆的服务需求进行分析,在图书馆Aleph500 20版OPAC系统的X-Server服务接口基础上,基于Android手机2.3操作系统,以客户端形式实现了手机移动图书馆,并介绍了实现的设计思路和具体开发步骤。 相似文献
15.
16.
Exploring solutions for mobile companionship: A design research approach to context-aware management
Tor-Morten Grønli Gheorghita Ghinea Bendik Bygstad 《International Journal of Information Management》2013
The mobile phone is not just another device; it is with you day and night, and you rely on its capabilities in work and in private. In short, the mobile phone is your companion. As your companion, it should understand your situational and informational needs. How do we increase the friendliness of your mobile phone, in order to fulfil this promise? In this paper, we explore how context awareness can be used for managing the user mobile experience. To this end, we employed a design research approach to integrate context-aware and cloud based services in an Android application. Through a user evaluation and proof-of-concept implementation we show how new technologies can increase the friendliness of your mobile phone. In so doing, we provide evidence that adaptive applications based on user context offer a fertile ground for taking mobile companionship to the next level. 相似文献
17.
传统的手机通讯录比较单一,缺乏一些相对智能便捷的功能。针对用户对通讯录的要求,设计并实现了在Android系统上运行的手机通讯管理软件,除了实现手机通讯录的基本功能外,还新增了头像选择、个人空间、数据备份与还原、模糊查询、选择单个和多个联系人等特色功能。经系统测试达到了预期目标。 相似文献
18.
19.
Recent privacy-related incidents of mobile services have shown that app stores and providers face the challenge of mobile users’ information privacy concerns, which can prevent users from installing mobile apps or induce them to uninstall an app. In this paper, we investigate the role of app permission requests and compare the impact on privacy concerns with other antecedents of information privacy concerns, i.e., prior privacy experience, computer anxiety, and perceived control. To test these effects empirically, we conducted an online survey with 775 participants. Results of our structural equation modeling show that prior privacy experience, computer anxiety, and perceived control have significant effects on privacy concerns. However, concerns for app permission requests have approximately twice as much predictive value than the other factors put together to explain mobile users’ overall information privacy concerns. We expect that our findings can provide a theoretical contribution for future mobile privacy research as well as practical implications for app stores and providers. 相似文献
20.
随着全球移动通信技术和无线网络技术的迅猛发展,移动电话用户数迅速增长,移动电子商务得到了快速发展。然而,网络给人们带来便利的同时,也使得用户的大量个人信息在未经许可的情况下被收集和利用,消费者隐私权受到严峻挑战。文章从移动电子商务的视角出发,对隐私侵权问题进行探讨,在隐私安全理论上进行突破和创新,并结合中国特色提出解决方案。 相似文献