Mining Smartphone Data to Classify Life-Facets of Social Relationships Jun-Ki Min, Jason Wiese, Jason I

Total Page:16

File Type:pdf, Size:1020Kb

Mining Smartphone Data to Classify Life-Facets of Social Relationships Jun-Ki Min, Jason Wiese, Jason I Mining Smartphone Data to Classify Life-Facets of Social Relationships Jun-Ki Min, Jason Wiese, Jason I. Hong, John Zimmerman Human-Computer Interaction Institute, Carnegie Mellon University [email protected], {jwwiese, jasonh, johnz}@cs.cmu.edu ABSTRACT Even social devices and services like smartphones and People engage with many overlapping social networks and social networking services (SNS) operate with a enact diverse social roles across different facets of their tremendously limited understanding of social role, often lives. Unfortunately, many online social networking classifying everyone as “friend” or “friend of friend.” services reduce most people’s contacts to “friend.” A richer Systems with a richer understand of role could assist people computational model of relationships would be useful for a in a variety of ways. At the highest level, these systems number of applications such as managing privacy settings could engage in much more situationally appropriate and organizing communications. In this paper, we take a behavior. More pragmatically, these systems could help by step towards a richer computational model by using call and organizing and prioritizing communications, by working to text message logs from mobile phones to classifying prevent unwanted self-disclosure or socially inappropriate contacts according to life facet (family, work, and social). behavior when sharing on SNSs, by reminding people of We extract various features such as communication the role they should be enacting before taking a phone call intensity, regularity, medium, and temporal tendency, and or engaging in other mediated communication, and by classify the relationships using machine-learning mining situational enactments of different roles to help techniques. Our experimental results on 40 users showed systems better understand the meaning of a place, of a that we could classify life facets with up to 90.5% accuracy. situation, or of the services people might most desire. The most relevant features include call duration, channel selection, and time of day for the communication. Some computational systems provide tools for users to manually label groups and assign their contacts to these Author Keywords groups; however, people do not appear to use these tools. Mobile social network; interpersonal relationships mining; One recent study reported that only 16% of people create life-facets; smartphone. any contact groups on their mobile phones [20]. In addition, ACM Classification Keywords Facebook reported that less than 5% of users create groups H.5.m. Information interfaces and presentation (e.g., HCI): within their set of friends [23]. We suspect that these Miscellaneous. features are rarely used because people do not perceive enough value in improved services to invest the time and General Terms attention necessary to categorize the hundreds of contacts Algorithms; Experimentation; Human Factors. they digitally maintain. The challenge is greater than simply INTRODUCTION classifying each contact once. Research shows relationships People enact many different social roles as they move are dynamic [35,3]. Kelley et al. argue that groups created between contexts and interact with different people. A for privacy purposes need to be periodically updated woman might enact the role of mother, wife, daughter, because of changes in relationships [25]. sister, neighbor, supervisor, colleague, teammate, Our goal is to develop methods for systems to infer social subordinate, chairperson, coach, and music patron all within role at a level of granularity that allows significantly a single day. Social roles provide a sort of invisible improved service offerings by mining logs of electronic structure, guiding people in their choice of actions in communications and sensor data from smartphones and various social situations. Computational systems, social media. Data from email and online SNSs provide rich interestingly, often have little or no understanding of the details on the communications between groups of people. many roles a person might play, of the behavioral Data from smartphones provide a person’s locations as well expectations associated with these roles, or of the specific as proximity to and co-location with others. For example, role a person is enacting when interacting with a system. previous work demonstrated how information on co- location patterns could be used to predict if two people are Permission to make digital or hard copies of all or part of this work for friends [10]. In addition, phones provide call and text personal or classroom use is granted without fee provided that copies are message (SMS) logs, capturing the: who, when, not made or distributed for profit or commercial advantage and that copies initiator/receiver, and the duration/length of many bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior communication events. The integration of all of this data specific permission and/or a fee. offers the opportunity to model human behavior and social CSCW ’13, February 23–27, 2013, San Antonio, Texas, USA. interactions at a scale and fidelity not previously possible. Copyright 2013 ACM 978-1-4503-1331-5/13/02...$15.00. This paper documents our investigation of one part of this Our work is an effort to help address these concerns by bigger picture, namely using smartphone communication providing a mechanism for systems to gain more detailed data (contact list, call logs, and SMS data) to classify the information about the specific relationship between people. life facet of a user’s contact as family, work, or social. Life Social Network Analysis and Group Mining facets are distinct domains within which people enact Researchers have addressed social network (SN) analysis different roles. We chose these facets based on previous on smartphones and SNS using both supervised and social networking research by Ozenc and Farnham [36]. unsupervised approaches [3,6,32]. Many of them have While these facets are broad and coarse-grained, they focused on tie strength, defining its properties as four provide initial evidence that concepts such as social role dimensions: amount of time, intimacy, intensity, and can be learned. Based on communication log data from 40 reciprocal services [19]. Studies have shown that the vast participants, we used machine-learning techniques to majority of interaction on SNS is with small numbers of classify life facets with 90% accuracy for contacts users had strong ties. For example, recent work by Burke suggested communicated with. that the average number of friends on Facebook is around This paper provides two contributions. First, it provides a 180 [5] (though many users have many more), while most set of extracted smartphones features that help to mine life people on Facebook only interact regularly with 4 to 6 facets. Second, it provides details of models built to classify people [42]. A different study examined people who posted life facets and an evaluation of these models based on a and tagged pictures of each other on Facebook, and found data set of 16,940 calls and 63,900 SMS messages. that on average people had 6.6 such “friends” [8]. BACKGROUND Based on network information like tie strength, researchers Kinds of Relationships have tried to analyze distinction of groups within a SN. Both social identity theory (from social psych) and identity Skeels and Grudin [38] found that people faced many theory (from sociology) agree that social role is a critical tensions when they tried to manage the co-presence of component in understanding human relationships multiple groups within their network. Lampinen et al. [26] [17,39,40]. People enact many different social roles and showed that people address group co-presence based on form relationships/affiliations with groups based on these behavioral strategies such as dividing the platform into roles. The degree that social role structure and granularity separate spaces, using suitable channels of communication, vary depends on individuals; however, social constructs like and performing self-censorship. In addition, several studies the life facets of family, work, and social are much more have demonstrated users’ desire to create groups of contacts universal [33,36]. In exploring her work/family border for practical applications like multi-level access control theory, Clark suggested that the greater the differences when sharing content [12,25,38]. Olson et al. [34] found across role domains, the less people engage in across-the- that people decide with whom to share information based border communication [9]. Similarly, Farnham and on the type of relationship, such as family and coworker. Churchill found that one approach people use to manage For example, Gilbert and Karahalios suggested that privacy roles and facets is to match them to specific communication controls based on tie strength might help to segment a mediums, such as only using the phone to communicate user’s SN into meaningful groups, and achieved 85% with your mom [17]. accuracy on binary classification of people’s strong or weak tie [18]. With their study on people’s privacy concern, Relative to offline social contexts (such as face-to-face Jones and OʼNeill found six criteria of grouping that people interaction), people experience new challenges in online commonly considered: social circles and cliques, tie contexts, which tend to be more broadcast oriented. This strength, temporal
Recommended publications
  • Ten Steps to Smartphone Security
    Ten Steps to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer as mobile cybersecurity threats are growing. These mobile security tips can help you reduce the risk of exposure to mobile security threats: 1. Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones. 2. Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack. 3. Backup and secure your data. You should backup all of the data stored on your phone – such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased. 4. Only install apps from trusted sources.
    [Show full text]
  • LTE-M Deployment Guide to Basic Feature Set Requirements
    LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS JUNE 2019 LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS Table of Contents 1 EXECUTIVE SUMMARY 4 2 INTRODUCTION 5 2.1 Overview 5 2.2 Scope 5 2.3 Definitions 6 2.4 Abbreviations 6 2.5 References 9 3 GSMA MINIMUM BAseLINE FOR LTE-M INTEROPERABILITY - PROBLEM STATEMENT 10 3.1 Problem Statement 10 3.2 Minimum Baseline for LTE-M Interoperability: Risks and Benefits 10 4 LTE-M DATA ARCHITECTURE 11 5 LTE-M DePLOYMENT BANDS 13 6 LTE-M FeATURE DePLOYMENT GUIDE 14 7 LTE-M ReLEAse 13 FeATURes 15 7.1 PSM Standalone Timers 15 7.2 eDRX Standalone 18 7.3 PSM and eDRX Combined Implementation 19 7.4 High Latency Communication 19 7.5 GTP-IDLE Timer on IPX Firewall 20 7.6 Long Periodic TAU 20 7.7 Support of category M1 20 7.7.1 Support of Half Duplex Mode in LTE-M 21 7.7.2 Extension of coverage features (CE Mode A / B) 21 7.8 SCEF 22 7.9 VoLTE 22 7.10 Connected Mode Mobility 23 7.11 SMS Support 23 7.12 Non-IP Data Delivery (NIDD) 24 7.13 Connected-Mode (Extended) DRX Support 24 7.14 Control Plane CIoT Optimisations 25 7.15 User Plane CIoT Optimisations 25 7.16 UICC Deactivation During eDRX 25 7.17 Power Class 26 LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS 8 LTE-M ReLEAse 14 FeATURes 27 8.1 Positioning: E-CID and OTDOA 27 8.2 Higher data rate support 28 8.3 Improvements of VoLTE and other real-time services 29 8.4 Mobility enhancement in Connected Mode 29 8.5 Multicast transmission/Group messaging 29 8.6 Relaxed monitoring for cell reselection 30 8.7 Release Assistance Indication
    [Show full text]
  • SMS “Virtual Collection Center” Smartphone
    Feed the Future Innovation Lab for Livestock Systems INNOVATION SUMMARY: SMS “VIRTUAL COLLECTION CENTER” SMARTPHONE APP The Virtual Collection Center (VCC) is an innovative short message service (SMS) mobile application (app) for improved goat marketing. Through the use of the VCC app, inventory updates flow from cooperative members to leaders, while cooperative leaders use the VCC app to share price information with members and fill orders from traders by inviting members to sales events. The VCC app improves the goat value chain by reducing transaction costs, which should strengthen cooperatives and benefit small livestock producers by increasing trade volumes. Lead Implementing Institution: University of Florida Category: Marketing & Distribution Applied in: Nepal The VCC app is implemented by Heifer International Nepal whose Innovation Type: Technology New/Adapted: New field personnel assist cooperative members in downloading the app while providing training and Created for: Mainly Women Nutrition Linkage: Dietary Quality monitoring in the initial stages. The app is designed to be intuitive, eliminating the need for intensive training. Within cooperatives, the In Nepal, goats are an essential source of income and nearly every rural Nepali household app is accessed by “VCC owns at least a few goats. To buy goats, traders often travel over large areas characterized managers”, who are members of cooperative self-help groups by rugged terrain and poor infrastructure, making multiple visits to individual households necessary to complete sales. The resulting high transaction costs can stifle the value chain. (subgroups within the Cooperatives can reduce transaction costs by allowing for bulk purchases of animals. But cooperatives), and cooperative cooperatives may struggle to coordinate sales by members spread out over large areas of leaders.
    [Show full text]
  • Location Provider E-Mail to SMS Address Format
    To create an e-mail address for your cell phone number, simply locate your cell phone carrier in the list below and replace the word number with your cell phone number. US and North American Carriers Location Provider E-mail to SMS address format United States Alaska Communications number @msg.acsalaska.com Bluegrass Cellular number @sms.bluecell.com Cincinnati Bell Wireless number @gocbw.com Cricket number @sms.mycricket.com C Spire Wireless number @cspire1.com Edge Wireless number @sms.edgewireless.com General Communications Inc. number @msg.gci.net Qwest Wireless number @qwestmp.com Southern LINC number @page.southernlinc.com Teleflip number @teleflip.com Telus number @msg.telus.com Unicel number @utext.com West Central Wireless number @sms.wcc.net XIT Communications number @sms.xit.net Aruba Setar Mobile number @mas.aw Bermuda Mobility number @ml.bm Canada Aliant number @wirefree.informe.ca Bell Mobility number @txt.bellmobility.ca Fido number @fido.ca MTS Mobility number @text.mtsmobility.com President’s Choice number @mobiletxt.ca Rogers Wireless number @pcs.rogers.com Sasktel Mobility number @pcs.sasktelmobility.com Telus number @msg.telus.com Virgin Mobile Canada number @vmobile.ca Puerto Rico Claro number @vtexto.com International Carriers Location Provider E-mail to SMS address format Argentina Claro number @sms.ctimovil.com.ar Movistar number @sms.movistar.net.ar Nextel TwoWay.11number @nextel.net.ar Australia Telstra number @sms.tim.telstra.com T-Mobile/Optus Zoo number @optusmobile.com.au Austria T-Mobile number @sms.t-mobile.at
    [Show full text]
  • SMS Text Messaging Faqs
    Parents and Guardians You can take advantage of our Text Messaging Service Our schools and district utilizes the SchoolMessenger system to deliver text messages, straight to your mobile phone with important information about events, school closings, safety alerts and more.* You can participate in this free service* just by sending a text message of “Y” or “Yes” to our school’s short code number, 67587. You can also opt out of these messages at any time by simply replying to one of our messages with “Stop”. Opt-In from Just send your mobile “Y” or “Yes” phone now to 67587 SchoolMessenger is compliant with the Student Privacy PledgeTM, so you can rest assured that your information is safe and will never be given or sold to anyone. www.KPBSD.org Information about SMS text messaging and Short Codes: SMS stands for Short Message Service and is commonly referred to as a "text message". Most cell phones support this type of text messaging. Our notification provider, SchoolMessenger, uses a true SMS protocol developed by the telecommunications industry specifically for mass text messaging, referred to as “short code” texting. This method is fast, secure and highly reliable because it is strictly regulated by the wireless carriers and only allows access to approved providers. If you’ve ever sent a text vote for a TV show to a number like 46999, you have used short code texting. *Terms and Conditions – Message frequency varies. Standard message and data rates may apply. Reply HELP for help. Text STOP to cancel. Mobile carriers are not liable for delayed or undelivered messages.
    [Show full text]
  • The Classic Blackberry – Supercharged
    COMING SOON! The classic BlackBerry – supercharged. BlackBerry® Curve™ 3G smartphone The new BlackBerry Curve 3G smartphone from AT&T is BlackBerry Curve 3G powerful yet affordable. This BlackBerry classic now gives smartphone you 3G speed and everything you expect from the popular The first 3G Curve BlackBerry Curve family, with a QWERTY keyboard, work and from AT&T. personal email, powerful personal management capabilities and much more. A superior connection. • Be at the forefront. With simultaneous voice and data when using the 3G or Wi-Fi network, you can check the facts on email or the web while talking on the phone with clients or colleagues. • Work with speed and confidence. The BlackBerry Curve 3G • Speed with flexibility. The BlackBerry Curve 3G smartphone has a powerful 624 MHz processor, 256 MB flash smartphone allows you to quickly download and upload memory/256 MB SDRAM and an included 2 GB microSD™ card content and surf the web faster on the nation’s fastest for storage, expandable up to 32 GB. broadband mobile network.* And with built-in Wi-Fi® • Focused applications. Keep up-to-date and informed of your (802.11 b/g/n), access the information and download the work and life – explore BlackBerry® App World™ and pre-loaded large files you need at Wi-Fi speeds. applications including LinkedIn™, My-Cast® Weather, Bloomberg® • Automatically unlimited. The new BlackBerry Curve 3G Mobile, AllSport GPS™, WHERE®, City ID®, Facebook®, MySpace™, smartphone automatically connects to AT&T Wi-Fi Hot Twitter™ and more. Spots in the U.S.** for unlimited usage on the AT&T Wi-Fi • Capture the moment.
    [Show full text]
  • Mobile Phone from Wikipedia, the Free Encyclopedia
    Mobile phone From Wikipedia, the free encyclopedia Siemens AX72. Galaxy Nexus, an example of a smartphone A mobile phone (also known as a wireless phone, cell phone, or cellular telephone[1]) is a very small portable radio telephone. The mobile phone can be used to communicate over long distances without wires. It works by communicating with a nearby base station (also called a "cell site") which connects it to the main phone network. As the mobile phone moves around, if the mobile phone gets too far away from the cell it is connected to, that cell sends a message to another cell to tell the new cell to take over the call. This is called a "hand off," and the call continues with the new cell the phone is connected to. The hand-off is done so well and carefully that the user will usually never even know that the call was transferred to another cell. As mobile phones became more popular, they began to cost less money, and more people could afford them. Monthly plans became available for rates as low as US$30 or US$40 a month. Cell phones have become so cheap to own that they have mostly replaced pay phones and phone booths except for urban areas with many people. Many mobile phones are "smartphones". As well as making voice calls, they can be used as computers. Contents [hide] 1 History 2 Technology 3 Shapes 4 How mobile phones work 5 Networks and payment 6 Smartphones 7 References History[change | change source] Mobile phones in the 1950s through 1970s were large and heavy, and most were built into cars.
    [Show full text]
  • Worldwide Texting Statistics
    Worldwide Texting Statistics 1. The number of monthly texts sent increased more than 7,700% over the last decade. (Statistic Brain) (Tweet this!) 2. Over 560 billion texts are sent every month worldwide. (Statistic Brain) (Tweet this!) 3. 18.7 billion texts are sent worldwide every day, not including app-to-app messaging. (Statistic Brain) (Tweet this!) 4. (2017 Update) 15,220,700 texts are sent every minute of every day worldwide, not including app-to-app messaging. (Domo) (Tweet this!) 5. (2017 Update) 913,242,000 texts are sent every hour of every day worldwide, not including app-to-app messaging. (Domo) (Tweet this!) 6. (2017 Update) 22 billion texts are sent every day worldwide, not including app-to-app messaging. (Domo) (Tweet this!) 7. (2017 Update) 8 trillion texts are sent worldwide every year, not including app-to-app messaging. (Domo) (Tweet this!) 8. WhatsApp and Facebook Messenger combine for more than 60 billion messages sent every day. (The Verge) (Tweet this!) 9. 4.2 billion+ people text worldwide. (MBA Online) (Tweet this!) 10. Text messaging is the most used data service in the world. (Nielsen) (Tweet this!) U.S. Texting Statistics 11. 81% of Americans text regularly. (Pew Research Center) (Tweet this!) 12. Over 6 billion texts are sent every day. (CTIA) (Tweet this!) 13. Over 180 billion texts are sent every month. (CTIA) (Tweet this!) 14. 2.27 trillion texts are sent every year. (CTIA) (Tweet this!) 15. 97% of American adults text weekly. (Pew Research Center) (Tweet this!) 16. America is responsible for approximately 45% of the world's text volume.
    [Show full text]
  • Your SMS Interconnection
    Our single Your SMS gateway interconnection Vodafone Messaging Hub A2P – a single point of contact for all your SMS interworking requirements Application-to-Person (A2P) SMS message volumes are experiencing double- digit annual growth. These volumes are expected to reach 1.3 trillion in 2018 and predicted to stabilise at that level until 20211. Reliable, quality and cost-effective delivery to mobile end users is vital to this market. The A2P messaging market will be challenges by providing a single point of Vodafone Messaging Hub customers get worth $58.75m in 20202. With over 950 convergence for the proliferation of Mobile consolidated access to Vodafone’s more operator members of the GSMA3 and an Network Operator (MNO) agreements. than 500 million mobile customers as well as increasing number of access technologies, The Vodafone Messaging Hub provides Vodafone’s rapidly growing reach-list of other the traditional peering model for SMS global connectivity and access to global MNOs, through a single interconnect and interconnection has become increasingly A2P messaging markets and delivers the commercial agreement. complex, onerous and resource intensive. same premium service levels that Vodafone Vodafone Messaging Hub solves these provides to its own retail customers. Vodafone’s global organisation manages the complexities for you through a single interconnection to Vodafone Messaging Hub. • Hub connection management – one • Security and protection – advanced Significantly improves connection, offering direct access to fraud, spam and faking protection. operational and financial Vodafone’s own customer base and global • Near real-time business intelligence reach-list. – key reports via Vodafone’s online portal, efficiency by eliminating • 24x7 operational support and such as volume, settlements and delivery complex bilateral interworking assurance – with world-class technical tracking, on a daily, weekly and monthly support from the team that cares for basis.
    [Show full text]
  • Your Simplified SMS Management
    Our single Your simplified gateway SMS management Vodafone Messaging Hub P2P – a single point of contact Vodafone Messaging Hub consolidates access to Vodafone’s more than 500m mobile customers and our rapidly growing reach-list of Mobile Network Operators (MNOs), through a single interconnect and commercial agreement. SMS industry Vodafone Messaging Hub SMS remains one of the most popular Vodafone Messaging Hub (VMH) simplifies By utilising the same capability that methods of communicating with any device SMS management using a centralised hub. Vodafone uses to support its customers, on any mobile network. Ubiquity of reach is It allows MNOs to maintain their control on you can be assured that you are getting a a unique feature not available via any other SMS monetisation and to reduce their effort, network capable of supporting best-in-class messaging application. cost and risk from managing hundreds of services covering the entire communications The SMS Person-to-Person (P2P) industry is individual network connections. value chain. facing many challenges. We are witnessing an annual decline in market size of 5% Over 80% of respondents say they open triggered by the popularity of instant messaging apps such as WhatsApp, Facebook every SMS they receive. Messenger and Snapchat. Source: Shift Communications Historically, a major portion of international Consumer Survey, September 2015 P2P SMS traffic has been exchanged between MNOs on a mutual forgiveness basis. This arrangement minimised billing and M B M B operational complexity and was successful M A M C M A M C when most sent messages resulted in a reply, which led to a balance between MNOs receipts and payments.
    [Show full text]
  • A Comparative Analysis of Mobile Operating Systems Rina
    International Journal of Computer Sciences and Engineering Open Access Research Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693 A Comparative Analysis of mobile Operating Systems Rina Dept of IT, GGDSD College, Chandigarh ,India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 09/Dec/2018, Published: 31/Dec/2018 Abstract: The paper is based on the review of several research studies carried out on different mobile operating systems. A mobile operating system (or mobile OS) is an operating system for phones, tablets, smart watches, or other mobile devices which acts as an interface between users and mobiles. The use of mobile devices in our life is ever increasing. Nowadays everyone is using mobile phones from a lay man to businessmen to fulfill their basic requirements of life. We cannot even imagine our life without mobile phones. Therefore, it becomes very difficult for the mobile industries to provide best features and easy to use interface to its customer. Due to rapid advancement of the technology, the mobile industry is also continuously growing. The paper attempts to give a comparative study of operating systems used in mobile phones on the basis of their features, user interface and many more factors. Keywords: Mobile Operating system, iOS, Android, Smartphone, Windows. I. INTRUDUCTION concludes research work with future use of mobile technology. Mobile operating system is the interface between user and mobile phones to communicate and it provides many more II. HISTORY features which is essential to run mobile devices. It manages all the resources to be used in an efficient way and provides The term smart phone was first described by the company a user friendly interface to the users.
    [Show full text]
  • Maxphone—Multi-Access Extension for Smartphones Fact Sheet
    Completed DHS Science and Technology Directorate MaXphone—Multi-Access Extension for Smartphones Providing devices that embrace Land Mobile P25, cellular/Public Switched Telephone Network voice, Radio (LMR) and broadband cellular networks and Voice-over-IP. It also allows for enhanced security by The First Responder Network Authority (FirstNet) is providing end-to-end P25 encryption across LMR and charged with creating a nationwide public safety broadband broadband networks. network that provides the public safety community with a Enabling customizable, affordable applications boost in network capacity and capability. Still, commercial MaXphone leverages rapid development in commercial cellular broadband networks (e.g., 4G LTE and 3G) will broadband networks and smartphone capability. Open likely remain the dominant option to support first responder application development environments (e.g., Android) broadband applications for the immediate future. enable novel, innovative, customizable and affordable first Broadband networks do not provide first responders with responder applications. An open source, fully functioning mission critical voice capabilities (i.e., radio-to-radio or P25 software package will be available on the Android one-to-many communications) that are available on LMR environment. MaxJacket will be based on COTS networks. However, application and service development in components and contain the necessary functions for the P25 the LMR domain stand in stark contrast to the explosive solution. growth in the commercial broadband sector. Therefore, a reasonable, cost effective approach to creating more capable first responder devices embraces existing LMR networks Legacy P25 handset and commercial broadband cellular networks by using open P25 platforms to encourage application development. IP25 P25 Network Gateway Access The Department of Homeland Security Science and Technology Directorate and U.S.
    [Show full text]