Abstract: The health care must be a right for people around the
world, but in order to guarantee the access to all, it is necessary to
overcome geographical barriers. Telemedicine take advantage of
Information Communication Technologies to deploy health care
services around the world. To achieve those goals, it is necessary to
use existing last mile solution to create access for home users, which
is why is necessary to establish the channel characteristics for those
kinds of services. This paper presents an analysis of network
performance of last mile solution for the use of IPTV broadcasting
with the application of streaming for telemedicine apps.
Abstract: The UK is leading in online retail and mobile
adoption. However, there is a dearth of information relating to mobile
apparel retail, and developing an understanding about consumer
browsing and purchase behaviour in m-retail channel would provide
apparel marketers, mobile website and app developers with the
necessary understanding of consumers’ needs. Despite the rapid
growth of mobile retail businesses, no published study has examined
shopping behaviour on fashion mobile apps and websites. A mixed method approach helped to understand why fashion
consumers prefer websites on smartphones, when diverse mobile
apps are also available. The following research methods were
employed: survey, eye-tracking experiments, observation, and
interview with retrospective think aloud. The mobile gaze tracking
device by SensoMotoric Instruments was used to understand
frustrations in navigation and other issues facing consumers in
mobile channel. This method helped to validate and compliment
other traditional user-testing approaches in order to optimize user
experience and enhance the development of mobile retail channel.
The study involved eight participants - females aged 18 to 35 years
old, who are existing mobile shoppers. The participants used the
Topshop mobile app and website on a smart phone to complete a task
according to a specified scenario leading to a purchase. The
comparative study was based on: duration and time spent at different
stages of the shopping journey, number of steps involved and product
pages visited, search approaches used, layout and visual clues, as
well as consumer perceptions and expectations. The results from the data analysis show significant differences in
consumer behaviour when using a mobile app or website on a smart
phone. Moreover, two types of problems were identified, namely
technical issues and human errors. Having a mobile app does not
guarantee success in satisfying mobile fashion consumers. The
differences in the layout and visual clues seem to influence the
overall shopping experience on a smart phone. The layout of search
results on the website was different from the mobile app. Therefore,
participants, in most cases, behaved differently on different
platforms. The number of product pages visited on the mobile app
was triple the number visited on the website due to a limited visibility
of products in the search results. Although, the data on traffic trends
held by retailers to date, including retail sector breakdowns for visits
and views, data on device splits and duration, might seem a valuable
source of information, it cannot explain why consumers visit many
product pages, stay longer on the website or mobile app, or abandon
the basket. A comprehensive list of pros and cons was developed by
highlighting issues for website and mobile app, and recommendations
provided. The findings suggest that fashion retailers need to be aware of
actual consumers’ behaviour on the mobile channel and their expectations in order to offer a seamless shopping experience. Added
to which is the challenge of retaining existing and acquiring new
customers. There seem to be differences in the way fashion
consumers search and shop on mobile, which need to be explored in
further studies.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: Cloud computing is a new technology in industry and
academia. The technology has grown and matured in last half decade
and proven their significant role in changing environment of IT
infrastructure where cloud services and resources are offered over the
network. Cloud technology enables users to use services and
resources without being concerned about the technical implications of
technology. There are substantial research work has been performed
for the usage of cloud computing in educational institutes and
majority of them provides cloud services over high-end blade servers
or other high-end CPUs. However, this paper proposes a new stack
called “CiCKAStack” which provide cloud services over unutilized
computing resources, named as commodity computers.
“CiCKAStack” provides IaaS and PaaS using underlying commodity
computers. This will not only increasing the utilization of existing
computing resources but also provide organize file system, on
demand computing resource and design and development
environment.
Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.
Abstract: Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as Availability, Integrity and Confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring untrusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during untrusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the runtime of mobile application in response to information flow events.
Abstract: The world wide web coupled with the ever-increasing
sophistication of online technologies and software applications puts
greater emphasis on the need of even more sophisticated and
consistent quality requirements modeling than traditional software
applications. Web sites and Web applications (WebApps) are
becoming more information driven and content-oriented raising the
concern about their information quality (InQ). The consistent and
consolidated modeling of InQ requirements for WebApps at different
stages of the life cycle still poses a challenge. This paper proposes an
approach to specify InQ requirements for WebApps by reusing and
extending the ISO 25012:2008(E) data quality model. We also
discuss learnability aspect of information quality for the WebApps.
The proposed ISO 25012 based InQ framework is a step towards a
standardized approach to evaluate WebApps InQ.