Smartphones and other connected devices rely on data services,such as Web Services(WS),Google Cloud Messaging(GCM)and Firebase Cloud Messaging(FCM),to share the information they collect or use.Traditionally,these serv...Smartphones and other connected devices rely on data services,such as Web Services(WS),Google Cloud Messaging(GCM)and Firebase Cloud Messaging(FCM),to share the information they collect or use.Traditionally,these services were classified according to the average number of bytes transmitted or their delivery time.However,when dealing with battery-operated devices,another important parameter to be taken into account is their power consumption.Furthermore,software designers and developers often do not consider the efficiency of a data communication system,but are simply concerned about ease-of-use and response time.In this paper,we compare FCM,GCM and two types of WS,namely Simple Object Access Protocol(SOAP)and REpresentational State Transfer(REST)WS in terms of delay,data efficiency,and power consumption.The final outcome is that RESTful WS outperforms all others,making GCM and FCM a viable alternative only when the amount of data to be transmitted is very limited,or when the mobile application requires the advanced services offered by FCM or GCM only.展开更多
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in...Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.展开更多
Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US s...Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US society at least $13.6 billion annually and is expected to rise to $15.6 billion by 2021. The purpose of this study is to explore the feasibility of Text Messaging Intervention (TMI) in recognizing, responding and preventing IPV among college students. The research questions are: Will TMI 1) improve participant knowledge of warning signs of IPV? (Knowledge) and 2) improve participant confidence to intervene in IPV? (Confidence). Methods: A mixed methods design in data collection and data analysis was used. One-way ANOVA and Chi-square test were used to analyze quantitative data from the pre and post TMI survey. Results of the qualitative data analysis are included verbatim. Results: Results showed that knowledge level pre to post test increased from 2.00 ± 1.00 to 2.7 ± 0.48 (p < 0.001) and confidence level pre to post test increased from 2.89 ± 0.60 to 3.30 ± 0.68 (p < 0.001). Conclusions: Further research is needed in evaluating the feasibility and effectiveness of IPV prevention programs that uses mobile devices to create the best optimal health outcomes.展开更多
This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the sam...This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.展开更多
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has...The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.展开更多
Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire surve...Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.展开更多
The Multimedia Messaging Service (MMS)will be a new business growth point for mobile operators,and be an effective method to stimulate more users to use mobile services and ultimately improve the value of ARPU.The pap...The Multimedia Messaging Service (MMS)will be a new business growth point for mobile operators,and be an effective method to stimulate more users to use mobile services and ultimately improve the value of ARPU.The paper introduces MMS applications and its message sending/ receiving modes, analyzes its system architecture and technical implementation,and finally discusses issues related to MMS message structures and content production.展开更多
Nowadays, there has been a rapid increase in the variety and popularity of messaging systems and social networks. It is imperative to consider the effect and impact of the number of words feature on the verification p...Nowadays, there has been a rapid increase in the variety and popularity of messaging systems and social networks. It is imperative to consider the effect and impact of the number of words feature on the verification process for modern messaging systems such as Twitter, Facebook, SMS and Email. Given the volume of text is often a restricted factor (due to the nature of messaging systems), key to this investigation is a better understanding of what length of message is required to improve performance. A large historical dataset containing 50 participants, the four datasets containing a large number of messaging system samples (4539 samples for Facebook, 13,616 for Twitter, 6538 for Email and 106,359 for Text message), the best performance was for Text messages, with an EER of 7.6% if the number of words was more than nine;followed by Email with an EER of 14.9% if the number of words was between 25 to 60;then, Twitter tweets, with an EER of 22.5% if the number of words was less than ten. Finally, the Facebook platform with an EER of 31.9% if the number of words was over 11.展开更多
Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smar...Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a 'closed' environment generally provides a high level of security. In a closed environment no other smartcards are employed and the card use is restricted to the smartcard's own firmware, approved software applications, and approved card reader. However, the same level of security cannot be claimed for open environments where smartcards from different manufacturers might interact with various smartcard applications. The reason is that despite a number of existing standards and certification protocols like Common Criteria and CWA 14169, secure and convenient smartcard interoperability has remained a challenge. Ideally, just one middleware would handle the interactions between various software applications and different smartcards securely and seamlessly. In our ongoing research we investigate the underlying interoperability and security problems specifically for digital signature processes. An important part of such a middleware is a set of utilities and libraries that support cryptographic applications including authentication and digital signatures for a significant number of smartcards. The open-source project OpenSC provides such utilities and libraries. Here we identify some security lacks of OpenSC used as such a middleware. By implementing a secure messaging function in OpenSC 0.12.0 that protects the PIN and data exchange between the SC and the middleware, we address one important security weakness. This enables the integration of digital signature functionality into the OpenSC environment.展开更多
In this paper we look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication, and we specifically focus on the integration of clou...In this paper we look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication, and we specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, we investigate the performance of four relevant push technologies for the Android platform, namely C2DM, XMPP, Xtify and Urban Airship. The comparison focuses on three aspects of the libraries: 1) The stability;2) Response times;and 3) Energy consumption. The test is conducted on both WLAN and 3G, and includes several mobile device types. Additionally, we also integrate with the Google App Engine to provide the cloud integration server that is responsible for sending push messages to the mobile devices.展开更多
By tracing the history of instant messaging(IM),comparing the language used in English IM to historical English,and reviewing the current state of syntax and vocabulary used in IM,some predictions for the future of la...By tracing the history of instant messaging(IM),comparing the language used in English IM to historical English,and reviewing the current state of syntax and vocabulary used in IM,some predictions for the future of language can be made.展开更多
Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers...Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers and the public, people with a sickle cell trait experience life-threatening outcomes that are exacerbated by extreme conditions. There is a severe lack of awareness and understanding of sickle cell trait and the associated health complications among sickle cell trait carriers and healthcare providers. Purpose/Aim: Interventions that aim to improve awareness of sickle cell trait differ in approaches and are not well documented in the literature. This typology aims to highlight current efforts to inform targeted interventions that raise awareness through consistent messaging, educate people and providers on sickle cell trait and the related health complications, and support the design and implementation of comprehensive sickle cell trait awareness initiatives. Methods: We conducted a scoping review of United States-based sickle cell trait interventions and performed a content analysis to identify the categories and characteristics of these efforts. We then organized the results into a typology according to established protocols. Results: Among 164 interventions, twenty-five (15%) met the typology inclusion criteria described above and were grouped into categories: Seven of twenty-five interventions were Educational Interventions (28%), three of twenty-five interventions (12%) were Combined Screening and Educational-Based Interventions, eight of twenty-five interventions (32%) were Policy and Guideline-Based Intervention, and six of twenty-five interventions (24%) were Sickle Cell Trait Organization-Led Interventions. Conclusions: There is a lack of consistency in messaging across interventions whether delivered by credible healthcare institutions or national organizations, which can result in lack of education and awareness and confusion around sickle cell trait. Categorizing interventions through a typology allows clarity and informs consistency in messaging, which should be at the forefront of future sickle cell trait efforts.展开更多
Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to e...Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to each of these groups. For the general public, effective risk communication requires that technical information be translated to first gain attention and build understanding of risk, and then continue to be exchanged by all parties. The World Meteorological Organization and its partner agencies have recognised this need for translated information by moving away from warnings describing risks solely in terms of meteorological parameters and towards clearer messaging emphasizing significance and potential impacts. While the move towards more relatable weather warning messaging is a positive one, risk communication is a complex, dynamic and interactive process that is highly dependent on audience psychology, knowledge, skills, and capabilities; presenting at once difficulties and opportunities for agencies. Over recent years, advertisers, politicians and public safety advocates have all improved their messaging through the use of big data, psychology, social networking and behavioural economics principles, yet the links between these elements and weather risk communication are still relatively immature. This report aims to build links between weather forecasters, social scientists and related industries by outlining three conceptual models social scientists have developed to meet different challenges in the field of risk communication; the mental models approach, risk information seeking and processing, and the protective action decision making model. Recent issues and successes in the communication of tropical cyclone risk will then be examined and compared to these models, and future opportunities will be discussed.展开更多
文摘Smartphones and other connected devices rely on data services,such as Web Services(WS),Google Cloud Messaging(GCM)and Firebase Cloud Messaging(FCM),to share the information they collect or use.Traditionally,these services were classified according to the average number of bytes transmitted or their delivery time.However,when dealing with battery-operated devices,another important parameter to be taken into account is their power consumption.Furthermore,software designers and developers often do not consider the efficiency of a data communication system,but are simply concerned about ease-of-use and response time.In this paper,we compare FCM,GCM and two types of WS,namely Simple Object Access Protocol(SOAP)and REpresentational State Transfer(REST)WS in terms of delay,data efficiency,and power consumption.The final outcome is that RESTful WS outperforms all others,making GCM and FCM a viable alternative only when the amount of data to be transmitted is very limited,or when the mobile application requires the advanced services offered by FCM or GCM only.
基金Supported by the National Natural Science Foundation of China (60573136)
文摘Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.
文摘Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US society at least $13.6 billion annually and is expected to rise to $15.6 billion by 2021. The purpose of this study is to explore the feasibility of Text Messaging Intervention (TMI) in recognizing, responding and preventing IPV among college students. The research questions are: Will TMI 1) improve participant knowledge of warning signs of IPV? (Knowledge) and 2) improve participant confidence to intervene in IPV? (Confidence). Methods: A mixed methods design in data collection and data analysis was used. One-way ANOVA and Chi-square test were used to analyze quantitative data from the pre and post TMI survey. Results of the qualitative data analysis are included verbatim. Results: Results showed that knowledge level pre to post test increased from 2.00 ± 1.00 to 2.7 ± 0.48 (p < 0.001) and confidence level pre to post test increased from 2.89 ± 0.60 to 3.30 ± 0.68 (p < 0.001). Conclusions: Further research is needed in evaluating the feasibility and effectiveness of IPV prevention programs that uses mobile devices to create the best optimal health outcomes.
文摘This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices.
文摘The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security.
基金jointly supported by the National Social Science Foundation of China(Grant No.:14BTQ044)Wuhan University Academic Development Plan for Scholars born after the 1970s for the project of"research on Internet user behavior"Wuhan University Postgraduate English Course on Internet User Behavior and Luo Jia Youth Scholar of Wuhan University
文摘Purpose: We conducted an empirical study to find out the role of demographic variables in affecting information sharing behaviors of college student users of WeChat.Design/methodology/approach: A questionnaire survey was carried out to investigate the relationship between demographic variables (gender, grade level, dating status, and singleparent family background) and information sharing behaviors of WeChat users. The participants were college students and a total of 255 valid questionnaires were collected. Data was analyzed using descriptive statistics and multiple regression analysis.Findings: Grade level and single-parent family background were found to be significantly correlated with information sharing behaviors whereas no effect of gender was found on information sharing behaviors. Dating status had no significant impact on user browsing behavior, but was related to users' publishing posts and posting replies.Implications: The study will help understand individual differences in information sharing among WeChat users.Limitations: First, the relatively small sample size is a limitation in exploring the effects of demographic variables on user information sharing behaviors. Second, this study only used questionnaire surveys to collect data and more research methods such as interviews should be adopted to improve the accuracy of the study results.Originality/value: This paper is one of the first studies to explore the relationship between demographic variables and user information sharing behaviors on WeChat.
文摘The Multimedia Messaging Service (MMS)will be a new business growth point for mobile operators,and be an effective method to stimulate more users to use mobile services and ultimately improve the value of ARPU.The paper introduces MMS applications and its message sending/ receiving modes, analyzes its system architecture and technical implementation,and finally discusses issues related to MMS message structures and content production.
文摘Nowadays, there has been a rapid increase in the variety and popularity of messaging systems and social networks. It is imperative to consider the effect and impact of the number of words feature on the verification process for modern messaging systems such as Twitter, Facebook, SMS and Email. Given the volume of text is often a restricted factor (due to the nature of messaging systems), key to this investigation is a better understanding of what length of message is required to improve performance. A large historical dataset containing 50 participants, the four datasets containing a large number of messaging system samples (4539 samples for Facebook, 13,616 for Twitter, 6538 for Email and 106,359 for Text message), the best performance was for Text messages, with an EER of 7.6% if the number of words was more than nine;followed by Email with an EER of 14.9% if the number of words was between 25 to 60;then, Twitter tweets, with an EER of 22.5% if the number of words was less than ten. Finally, the Facebook platform with an EER of 31.9% if the number of words was over 11.
文摘Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a 'closed' environment generally provides a high level of security. In a closed environment no other smartcards are employed and the card use is restricted to the smartcard's own firmware, approved software applications, and approved card reader. However, the same level of security cannot be claimed for open environments where smartcards from different manufacturers might interact with various smartcard applications. The reason is that despite a number of existing standards and certification protocols like Common Criteria and CWA 14169, secure and convenient smartcard interoperability has remained a challenge. Ideally, just one middleware would handle the interactions between various software applications and different smartcards securely and seamlessly. In our ongoing research we investigate the underlying interoperability and security problems specifically for digital signature processes. An important part of such a middleware is a set of utilities and libraries that support cryptographic applications including authentication and digital signatures for a significant number of smartcards. The open-source project OpenSC provides such utilities and libraries. Here we identify some security lacks of OpenSC used as such a middleware. By implementing a secure messaging function in OpenSC 0.12.0 that protects the PIN and data exchange between the SC and the middleware, we address one important security weakness. This enables the integration of digital signature functionality into the OpenSC environment.
文摘In this paper we look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication, and we specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, we investigate the performance of four relevant push technologies for the Android platform, namely C2DM, XMPP, Xtify and Urban Airship. The comparison focuses on three aspects of the libraries: 1) The stability;2) Response times;and 3) Energy consumption. The test is conducted on both WLAN and 3G, and includes several mobile device types. Additionally, we also integrate with the Google App Engine to provide the cloud integration server that is responsible for sending push messages to the mobile devices.
文摘By tracing the history of instant messaging(IM),comparing the language used in English IM to historical English,and reviewing the current state of syntax and vocabulary used in IM,some predictions for the future of language can be made.
文摘Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers and the public, people with a sickle cell trait experience life-threatening outcomes that are exacerbated by extreme conditions. There is a severe lack of awareness and understanding of sickle cell trait and the associated health complications among sickle cell trait carriers and healthcare providers. Purpose/Aim: Interventions that aim to improve awareness of sickle cell trait differ in approaches and are not well documented in the literature. This typology aims to highlight current efforts to inform targeted interventions that raise awareness through consistent messaging, educate people and providers on sickle cell trait and the related health complications, and support the design and implementation of comprehensive sickle cell trait awareness initiatives. Methods: We conducted a scoping review of United States-based sickle cell trait interventions and performed a content analysis to identify the categories and characteristics of these efforts. We then organized the results into a typology according to established protocols. Results: Among 164 interventions, twenty-five (15%) met the typology inclusion criteria described above and were grouped into categories: Seven of twenty-five interventions were Educational Interventions (28%), three of twenty-five interventions (12%) were Combined Screening and Educational-Based Interventions, eight of twenty-five interventions (32%) were Policy and Guideline-Based Intervention, and six of twenty-five interventions (24%) were Sickle Cell Trait Organization-Led Interventions. Conclusions: There is a lack of consistency in messaging across interventions whether delivered by credible healthcare institutions or national organizations, which can result in lack of education and awareness and confusion around sickle cell trait. Categorizing interventions through a typology allows clarity and informs consistency in messaging, which should be at the forefront of future sickle cell trait efforts.
文摘Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to each of these groups. For the general public, effective risk communication requires that technical information be translated to first gain attention and build understanding of risk, and then continue to be exchanged by all parties. The World Meteorological Organization and its partner agencies have recognised this need for translated information by moving away from warnings describing risks solely in terms of meteorological parameters and towards clearer messaging emphasizing significance and potential impacts. While the move towards more relatable weather warning messaging is a positive one, risk communication is a complex, dynamic and interactive process that is highly dependent on audience psychology, knowledge, skills, and capabilities; presenting at once difficulties and opportunities for agencies. Over recent years, advertisers, politicians and public safety advocates have all improved their messaging through the use of big data, psychology, social networking and behavioural economics principles, yet the links between these elements and weather risk communication are still relatively immature. This report aims to build links between weather forecasters, social scientists and related industries by outlining three conceptual models social scientists have developed to meet different challenges in the field of risk communication; the mental models approach, risk information seeking and processing, and the protective action decision making model. Recent issues and successes in the communication of tropical cyclone risk will then be examined and compared to these models, and future opportunities will be discussed.