Smartphone As the Incumbent “Thing” Among the Internet of Things
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Texting on a Smartwatch Versus a Smartphone: a Comparison of Their Effects on Driving Performance
TEXTING ON A SMARTWATCH VERSUS A SMARTPHONE: A COMPARISON OF THEIR EFFECTS ON DRIVING PERFORMANCE A Dissertation by Joel Persinger Master of Arts, Wichita State University, 2014 Bachelor of Science, Eastern Kentucky University, 2005 Submitted to the Department of Psychology and the faculty of the Graduate School of Wichita State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy December 2017 ©Copyright 2017 by Joel A. Persinger All Rights Reserved TEXTING ON A SMARTWATCH VERSUS A SMARTPHONE: A COMPARISON OF THEIR EFFECTS ON DRIVING PERFORMANCE The following faculty members have examined the final copy of this dissertation for form and content, and recommend that it be accepted in partial fulfillment of the requirement for the degree of Doctor of Philosophy, with a major in Psychology. _____________________________________________ Rui Ni, Committee Chair _____________________________________________ Alex Chaparro, Committee Member _____________________________________________ Barbara Chaparro, Committee Member _____________________________________________ Jibo He, Committee Member _____________________________________________ Jeremy Patterson, Committee Member Accepted for the College of Liberal Arts and Sciences _______________________________________________ Ron Matson, Dean Accepted for the Graduate School _______________________________________________ Dennis Livesay, Dean iii DEDICATION To my beautiful wife, who has pushed me to go further than I ever thought I could. She has truly carried me though graduate school with love and encouragement. iv ABSTRACT The National Safety Council reports that 6 percent or more car crashes involved text messaging from a smartphone. In addition, many studies have found that cell phone while driving increases crash risk by 2.8–5 times (Klauer et al. 2006; Redelmeier and Tibshirani 1997; Violanti 1998; Violanti and Marshall 1996). -
Listen Only When Spoken To: Interpersonal Communication Cues As Smart Speaker Privacy Controls
Proceedings on Privacy Enhancing Technologies ; 2020 (2):251–270 Abraham Mhaidli*, Manikandan Kandadai Venkatesh, Yixin Zou, and Florian Schaub Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls Abstract: Internet of Things and smart home technolo- 1 Introduction gies pose challenges for providing effective privacy con- trols to users, as smart devices lack both traditional Internet of Things (IoT) and smart home devices have screens and input interfaces. We investigate the poten- gained considerable traction in the consumer market [4]. tial for leveraging interpersonal communication cues as Technologies such as smart door locks, smart ther- privacy controls in the IoT context, in particular for mostats, and smart bulbs offer convenience and utility smart speakers. We propose privacy controls based on to users [4]. IoT devices often incorporate numerous sen- two kinds of interpersonal communication cues – gaze sors from microphones to cameras. Though these sensors direction and voice volume level – that only selectively are essential for the functionality of these devices, they activate a smart speaker’s microphone or voice recog- may cause privacy concerns over what data such devices nition when the device is being addressed, in order to and their sensors collect, how the data is processed, and avoid constant listening and speech recognition by the for what purposes the data is used [35, 41, 46, 47, 70]. smart speaker microphones and reduce false device acti- Additionally, these sensors are often in the background vation. We implement these privacy controls in a smart or hidden from sight, continuously collecting informa- speaker prototype and assess their feasibility, usability tion. -
Personification and Ontological Categorization of Smart Speaker-Based Voice Assistants by Older Adults
“Phantom Friend” or “Just a Box with Information”: Personification and Ontological Categorization of Smart Speaker-based Voice Assistants by Older Adults ALISHA PRADHAN, University of Maryland, College Park, USA LEAH FINDLATER, University of Washington, USA AMANDA LAZAR, University of Maryland, College Park, USA As voice-based conversational agents such as Amazon Alexa and Google Assistant move into our homes, researchers have studied the corresponding privacy implications, embeddedness in these complex social environments, and use by specific user groups. Yet it is unknown how users categorize these devices: are they thought of as just another object, like a toaster? As a social companion? Though past work hints to human- like attributes that are ported onto these devices, the anthropomorphization of voice assistants has not been studied in depth. Through a study deploying Amazon Echo Dot Devices in the homes of older adults, we provide a preliminary assessment of how individuals 1) perceive having social interactions with the voice agent, and 2) ontologically categorize the voice assistants. Our discussion contributes to an understanding of how well-developed theories of anthropomorphism apply to voice assistants, such as how the socioemotional context of the user (e.g., loneliness) drives increased anthropomorphism. We conclude with recommendations for designing voice assistants with the ontological category in mind, as well as implications for the design of technologies for social companionship for older adults. CCS Concepts: • Human-centered computing → Ubiquitous and mobile devices; • Human-centered computing → Personal digital assistants KEYWORDS Personification; anthropomorphism; ontology; voice assistants; smart speakers; older adults. ACM Reference format: Alisha Pradhan, Leah Findlater and Amanda Lazar. -
Samrt Speakers Growth at a Discount.Pdf
Technology, Media, and Telecommunications Predictions 2019 Deloitte’s Technology, Media, and Telecommunications (TMT) group brings together one of the world’s largest pools of industry experts—respected for helping companies of all shapes and sizes thrive in a digital world. Deloitte’s TMT specialists can help companies take advantage of the ever- changing industry through a broad array of services designed to meet companies wherever they are, across the value chain and around the globe. Contact the authors for more information or read more on Deloitte.com. Technology, Media, and Telecommunications Predictions 2019 Contents Foreword | 2 Smart speakers: Growth at a discount | 24 1 Technology, Media, and Telecommunications Predictions 2019 Foreword Dear reader, Welcome to Deloitte Global’s Technology, Media, and Telecommunications Predictions for 2019. The theme this year is one of continuity—as evolution rather than stasis. Predictions has been published since 2001. Back in 2009 and 2010, we wrote about the launch of exciting new fourth-generation wireless networks called 4G (aka LTE). A decade later, we’re now making predic- tions about 5G networks that will be launching this year. Not surprisingly, our forecast for the first year of 5G is that it will look a lot like the first year of 4G in terms of units, revenues, and rollout. But while the forecast may look familiar, the high data speeds and low latency 5G provides could spur the evolution of mobility, health care, manufacturing, and nearly every industry that relies on connectivity. In previous reports, we also wrote about 3D printing (aka additive manufacturing). Our tone was posi- tive but cautious, since 3D printing was growing but also a bit overhyped. -
Ten Steps to Smartphone Security
Ten Steps to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer as mobile cybersecurity threats are growing. These mobile security tips can help you reduce the risk of exposure to mobile security threats: 1. Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones. 2. Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack. 3. Backup and secure your data. You should backup all of the data stored on your phone – such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased. 4. Only install apps from trusted sources. -
Completing the TAC Request Application Form
Training Module Four: Completing the TAC Request Application Form TAC Application Module July 2018 v1.0 All product names, model numbers or other manufacturer identifiers not attributed to GSMA are the property of their respective owners. ©GSMA Ltd 2018 Before applying for TAC, your company must be registered and have sufficient TAC credit Brand owner 1 registration TAC 2 payment TAC 3 application TAC 4 certificate Select Request a TAC to begin the TAC Application Request Form process Take great care completing the form with the details of the device that will use the TAC The form has seven sections: 1 2 3 4 5 6 7 Device Manufacturing Operating Networks LPWAN Device Review details details System Certification Bodies Your details will already be there! 1 2 3 4 5 6 7 Device details Applicant name Applicant email This information is address automatically populated from log-in, It is not editable here C Brand Name Select the equipment type you require TAC for, from the dropdown 1 2 3 4 5 6 7 Device details Feature phone Smartphone Tablet IoT device Wearable Dongle Modem WLAN router There should be only one model name, but you may input up to three marketing names 1 2 3 4 5 6 7 Device details Device model name is a specific name given to the Model name handset. This can vary from the marketing name. The marketing name is typically used as the name the TM Marketing name device is sold/marketed to general public. You can include up to 3 marketing names, separated by a comma. -
A Taxonomy-Based Analysis of Platform Ecosystems for Fitness Trackers
Is Open Always Better? - A Taxonomy-based Analysis of Platform Ecosystems for Fitness Trackers Anne-Katrin Witte1, Rüdiger Zarnekow1 1 Technical University of Berlin, Chair for Information and Communication Management, Berlin, Germany {a.witte,ruediger.zarnekow}@tu-berlin.de Abstract. The wearable fitness technology sector is growing steadily as a result of the increasing miniaturization of sensors and the rapid rise of the mobile internet. In this context the use of fitness trackers promises the consumer the provision of personalized health services. This additional value cannot be achieved by a single company but is realized by a multitude of different actors that collectively create value within platform ecosystems. In order to understand their structure and properties and get a current market overview, a taxonomy to analyze wearable fitness technology platform ecosystems is developed following the methodology by Nickerson et al. [1]. The empirical-to-conceptual approach is conducted by applying the flagship fitness tracker of the ten highest rated manufacturers as a fundamental platform technology. Using the taxonomy four clusters could be identified that primarily distinguish the fitness tracker companies regarding their openness to consumers and developers. Keywords: Fitness tracker, wearable fitness technology, platform ecosystem 1 Introduction Fitness tracker offer the potential to provide personalized and ubiquitous health services to consumers [2]. Through their numerous sensors and functions, they enable and empower users to track and change their habits to lead a healthier lifestyle. This can be either done for private application by using an app to analyze the recorded health data or in context with medical treatment where the physician receives the collected health data to improve the care of the patient. -
SMS “Virtual Collection Center” Smartphone
Feed the Future Innovation Lab for Livestock Systems INNOVATION SUMMARY: SMS “VIRTUAL COLLECTION CENTER” SMARTPHONE APP The Virtual Collection Center (VCC) is an innovative short message service (SMS) mobile application (app) for improved goat marketing. Through the use of the VCC app, inventory updates flow from cooperative members to leaders, while cooperative leaders use the VCC app to share price information with members and fill orders from traders by inviting members to sales events. The VCC app improves the goat value chain by reducing transaction costs, which should strengthen cooperatives and benefit small livestock producers by increasing trade volumes. Lead Implementing Institution: University of Florida Category: Marketing & Distribution Applied in: Nepal The VCC app is implemented by Heifer International Nepal whose Innovation Type: Technology New/Adapted: New field personnel assist cooperative members in downloading the app while providing training and Created for: Mainly Women Nutrition Linkage: Dietary Quality monitoring in the initial stages. The app is designed to be intuitive, eliminating the need for intensive training. Within cooperatives, the In Nepal, goats are an essential source of income and nearly every rural Nepali household app is accessed by “VCC owns at least a few goats. To buy goats, traders often travel over large areas characterized managers”, who are members of cooperative self-help groups by rugged terrain and poor infrastructure, making multiple visits to individual households necessary to complete sales. The resulting high transaction costs can stifle the value chain. (subgroups within the Cooperatives can reduce transaction costs by allowing for bulk purchases of animals. But cooperatives), and cooperative cooperatives may struggle to coordinate sales by members spread out over large areas of leaders. -
Mobile Phones and Cloud Computing
Mobile phones and cloud computing A quantitative research paper on mobile phone application offloading by cloud computing utilization Oskar Hamrén Department of informatics Human Computer Interaction Master’s programme Master thesis 2-year level, 30 credits SPM 2012.07 Abstract The development of the mobile phone has been rapid. From being a device mainly used for phone calls and writing text messages the mobile phone of today, or commonly referred to as the smartphone, has become a multi-purpose device. Because of its size and thermal constraints there are certain limitations in areas of battery life and computational capabilities. Some say that cloud computing is just another buzzword, a way to sell already existing technology. Others claim that it has the potential to transform the whole IT-industry. This thesis is covering the intersection of these two fields by investigating if it is possible to increase the speed of mobile phones by offloading computational heavy mobile phone application functions by using cloud computing. A mobile phone application was developed that conducts three computational heavy tests. The tests were run twice, by not using cloud computing offloading and by using it. The time taken to carry out the tests were saved and later compared to see if it is faster to use cloud computing in comparison to not use it. The results showed that it is not beneficial to use cloud computing to carry out these types of tasks; it is faster to use the mobile phone. 1 Table of Contents Abstract ..................................................................................................................................... 1 Table of Contents ..................................................................................................................... 2 1. Introduction .......................................................................................................................... 5 1.1 Previous research ........................................................................................................................ -
The Classic Blackberry – Supercharged
COMING SOON! The classic BlackBerry – supercharged. BlackBerry® Curve™ 3G smartphone The new BlackBerry Curve 3G smartphone from AT&T is BlackBerry Curve 3G powerful yet affordable. This BlackBerry classic now gives smartphone you 3G speed and everything you expect from the popular The first 3G Curve BlackBerry Curve family, with a QWERTY keyboard, work and from AT&T. personal email, powerful personal management capabilities and much more. A superior connection. • Be at the forefront. With simultaneous voice and data when using the 3G or Wi-Fi network, you can check the facts on email or the web while talking on the phone with clients or colleagues. • Work with speed and confidence. The BlackBerry Curve 3G • Speed with flexibility. The BlackBerry Curve 3G smartphone has a powerful 624 MHz processor, 256 MB flash smartphone allows you to quickly download and upload memory/256 MB SDRAM and an included 2 GB microSD™ card content and surf the web faster on the nation’s fastest for storage, expandable up to 32 GB. broadband mobile network.* And with built-in Wi-Fi® • Focused applications. Keep up-to-date and informed of your (802.11 b/g/n), access the information and download the work and life – explore BlackBerry® App World™ and pre-loaded large files you need at Wi-Fi speeds. applications including LinkedIn™, My-Cast® Weather, Bloomberg® • Automatically unlimited. The new BlackBerry Curve 3G Mobile, AllSport GPS™, WHERE®, City ID®, Facebook®, MySpace™, smartphone automatically connects to AT&T Wi-Fi Hot Twitter™ and more. Spots in the U.S.** for unlimited usage on the AT&T Wi-Fi • Capture the moment. -
Uses and Effects of Mobile Computing Devices in K–8 Classrooms
Uses and Effects of Mobile Computing Devices in K–8 Classrooms Karen Swan Mark van ‘t Hooft Annette Kratcoski Kent State University Darlene Unger Virginia Commonwealth University Abstract This preliminary study employed mixed methodologies to explore students’ use of mobile comput- ing devices and its effects on their motivation to learn, engagement in learning activities, and support for learning processes. Data collected from students in four elementary and two seventh grade science classes in Northeast Ohio included usage logs, student work samples, student and teacher interviews, and classroom observations. Findings highlight the personalization of learning afforded by such devices both in terms of individuals and individual classroom cultures, as well as their usefulness in extending learning beyond the classroom. They also sug- gest that increased motivation due to mobile device use leads to increases in the quality and quantity of student work. (Keywords: mobile computing, motivation, writing.) BACKGROUND More than a decade ago, Mark Weiser (1991) wrote that we live in a society in which technology is so pervasive that we do not notice it anymore when used for everyday tasks such as information retrieval, communication, and entertainment. Defining this environment as ubiquitous computing, he described it more as a state of mind, as “a new way of thinking about computers in the world . [that] allows the computers themselves to vanish into the background . [and] be- come indistinguishable from everyday life” (p. 94). As a result, the current gener- ation of K–12 students is growing up more technologically literate than children their age were a decade ago, with access to an increasing number of devices and services such as video game consoles, mobile gaming devices, cell phones, the In- ternet, and instant messaging. -
Wi-Fi® Smart Device Enablement Kit User Guide
ATWINC15x0 Smart Device Kit Wi-Fi® Smart Device Enablement Kit User Guide Introduction The Wi-Fi Smart Device Enablement Kit is a small and easy demonstration and development platform for Internet of Things (IoT) solutions. It is designed to demonstrate the design of typical IoT applications. The kit is controlled by a SAML21G18B host MCU. It is equipped with an ATWINC15x0 IEEE® 802.11 b/g/n network controller, an ATECC608A CryptoAuthentication™ device, an MCP73833 Li-Ion/Li-Po charge management controller, a MIC5317 High PSRR LDO, BME280 environment sensor and VEML6030 light sensor. It can be programmed and debugged with an Atmel-ICE programmer through SWD interface or programmed with an SAM-BA® in-system programmer through USB interface. The Wi-Fi Smart Device Enablement Kit is pre-programmed and configured for demonstrating connectivity to the AWS® IoT cloud, working with Amazon Alexa®. The user can speak to an Alexa- enabled device (for example, Echo Dot®) to get the sensor data and control LED of the kit. A mobile application is provided for board registration and network configuration. It can be used to monitor and control the kit. As an IoT edge, this firmware provides the control, monitoring, Wi-Fi connectivity and security functions in a typical IoT scenario. This board is used for evaluation/demonstration purposes only. © 2019 Microchip Technology Inc. User Guide DS50002880A-page 1 ATWINC15x0 Smart Device Kit Table of Contents Introduction .....................................................................................................................1