Location-Based Services
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Geotags and Location- Based Social Networking Applications, OPSEC and Protecting Unit Safety Social Media Roundup
Social Media Roundup Geotags and Location- Based Social Networking Applications, OPSEC and protecting unit safety Social Media Roundup Introduction • In August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work.” • Since the photo was taken by his smartphone, the image contained metadata reveling the exact geographical location the photo was taken. • So by simply taking and posting a photo, Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work. Read the full story here: http://nyti.ms/917hRh Social Media Roundup Introduction The following was published in Wired Magazine in 2009 • “I ran a little experiment. On a sunny Saturday, I spotted a woman in Golden Gate Park taking a photo with a 3G iPhone. Because iPhones embed geodata into photos that users upload to Flickr or Picasa, iPhone shots can be automatically placed on a map. At home I searched the Flickr map, and score—a shot from today. I clicked through to the user’s photostream and determined it was the woman I had seen earlier. After adjusting the settings so that only her shots appeared on the map, I saw a cluster of images in one location. Clicking on them revealed photos of an apartment Read the full story here: interior—a bedroom, a kitchen, a filthy living room. http://bit.ly/bJqYmm Now I know where she lives.” Social Media Roundup Introduction • As the stories above indicate, privacy and security aren’t what they used to be. -
Social Media Playbook: Everything Your Company Needs to Know to Succeed
Public Version Social Media Playbook: Everything Your Company Needs D JESS3 N to Know to Succeed Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution 3.0 License on the Social Web RIGHT ELOQUA A PY CONTENT BY JESS3 & O C JOE CHERNOV (@JCHERNOV) Social Media Playbook Contents Social Media Playbook Contents INTRODUCTION MAJOR PLATFORMS > Why use this Playbook, who it > Twitter �����������������������������������������������������������������������������������������8 Technically, it’s swine flu� is for, and how to use it ����������������������������������������������4 > Facebook ������������������������������������������������������������������������������ 20 But we call it H1N1 because the hashtag’s shorter� > What social media needs to really work�������������������������������������������������������������������������5 OTHER KEY PLATFORMS: > Blogs ���������������������������������������������������������������������������������������� 24 SOCIAL MEDIA GUIDELINES > LinkedIn �������������������������������������������������������������������������������� 26 > The 5 dos and 5 don’ts > YouTube ��������������������������������������������������������������������������������� 27 of social media ������������������������������������������������������������������6 > Wikipedia ����������������������������������������������������������������������������� 28 > Delicious ������������������������������������������������������������������������������� 30 > Flickr ���������������������������������������������������������������������������������������� -
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing As an Interactive Practice
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice Sameer Patil, Greg Norcie, Apu Kapadia Adam J. Lee School of Informatics and Computing Department of Computer Science Indiana University University of Pittsburgh 901 E 10th St 210 S Bouquet St Bloomington, IN 47408 USA Pittsburgh, PA 15260 USA {patil, gnorcie, kapadia}@indiana.edu [email protected] ABSTRACT systems focused on enabling collaborators to locate each Rapid growth in the usage of location-aware mobile phones other (e.g., [25, 36]). Such systems typically required orga- has enabled mainstream adoption of location-sharing ser- nizations to install their own location-mapping infrastruc- vices (LSS). Integration with social-networking services ture, either developed in-house by the organization or pur- (SNS) has further accelerated this trend. To uncover how chased from companies such as Ubisense, which offers a 3D localization infrastructure. To scale globally without such these developments have shaped the evolution of LSS usage, 1 we conducted an online study (N = 362) aimed at under- custom infrastructure, services such as Dodgeball allowed standing the preferences and practices of LSS users in the users to send their current locations as text messages to US. We found that the main motivations for location sharing the service, which then alerted friends if they opportunis- were to connect and coordinate with one's social and pro- tically happened to be near each other. Eventually WiFi fessional circles, to project an interesting image of oneself, and GPS-based localization built into smartphones led to and to receive rewards offered for `checking in.' Respon- the development of various stand-alone location-sharing ser- dents overwhelmingly preferred sharing location only upon vices (LSS) such as Foursquare (https://www.foursquare. -
Location-Based Services: Industrial and Business Analysis Group 6 Table of Contents
Location-based Services Industrial and Business Analysis Group 6 Huanhuan WANG Bo WANG Xinwei YANG Han LIU Location-based Services: Industrial and Business Analysis Group 6 Table of Contents I. Executive Summary ................................................................................................................................................. 2 II. Introduction ............................................................................................................................................................ 3 III. Analysis ................................................................................................................................................................ 3 IV. Evaluation Model .................................................................................................................................................. 4 V. Model Implementation ........................................................................................................................................... 6 VI. Evaluation & Impact ........................................................................................................................................... 12 VII. Conclusion ........................................................................................................................................................ 16 1 Location-based Services: Industrial and Business Analysis Group 6 I. Executive Summary The objective of the report is to analyze location-based services (LBS) from the industrial -
Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4
Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies. -
Privacy Leakage in Mobile Online Social Networks
Privacy Leakage in Mobile Online Social Networks Balachander Krishnamurthy, AT&T Labs – Research Craig E. Wills, Worcester Polytechnic Institute Workshop on Online Social Networks Boston, MA USA June 2010 1 Introduction Previously studied the leakage of personally identifiable information via Online Social Networks (OSNs) to third-party aggregators. Trend towards use of mobile devices to access OSNs (Facebook reports 25% of users access OSN via a mobile device every month). Also development of new OSNs—mobile OSNs (mOSNs)—that primarily cater to mobile users. Examples include Brightkite, Foursquare, Gowalla, Loopt, Urbanspoon, Whrrl. Mobile access to Web sites designed specifically for mobile devices and through the development of “apps” that are specific to a site and to a mobile platform. 2 New Privacy Concerns Mobile devices potentially introduce new privacy concerns for mOSNs. These include: • user presence and geographic location • information shared with a mOSN connected to a traditional OSN is also shared with that OSN • unique device identifiers Examine the degree to which leakage of private information is occurring via mOSNs. Related work by Chen&Rahman’08 on analyzing privacy designs of social networking apps focusing on location. 3 Interfaces and Interconnections for mOSNs Mobile Browser Mobile Browser 3rd−Party 3rd−Party 3rd−Party Server Server Server 1 2 3 Mobile Web Site Mobile Web Site Mobile API ConnectOSN API Connect Mobile OSN 1 Providing API Mobile OSN 2 Apps Connect Full Web Site Full Web Site 3rd−Party 3rd−Party Server Server 4 5 Traditional Browser Traditional Browser Interfaces include full Web site, mobile Web site and mobile app. -
Verizon DROID RAZR M User Guide
DROID RAZR M BY MOTOROLA pick a topic, get what you need At a glance Start Home screen & apps Control & customize Calls Contacts 123456 www. PLAYLISTS qwe r t y Messages Type Socialize Browse Photos & videos Music 44 West Street Books Locate & NAVIGATE Work Connect & transfer Protect Want More? #1 Troubleshoot Safety - - Top topics Search topics At a glance a quick look At a glance Your smartphone Tips & tricks Your smartphone •Start: Insert the SIM and optional memory card, Top topics DROID RAZR M BY MOTOROLA gives you the best of all charge the battery, and register your smartphone. See worlds—a compact smartphone with a large vivid display, “Start”. that’s intuitive and helpful at every step. • Top topics: Just want a quick hit of what your •Speed: 4G LTE speeds and Chrome™ browser. smartphone can do? See “Top topics”. •Design: Premium protective materials—DuPont™ •More: All the topics in this guide and so much more, Kevlar® fiber, Corning® Gorilla® Glass, and a water right on your smartphone. Tap Apps > Help repellent nano-coating. > TUTORIALS or HELP TOPICS. Want more? See “Get • Best of Google™: Google Maps™ Navigation Beta, more!”. Gmail™, Google Play™, Google+, and more. Note: Certain apps and features may not be available in all countries. 3.5mm Headset Notification This product meets the applicable limit for Light 4:00 Front Camera exposure to radio waves (known as SAR) of 1.6 W/kg (FCC & IC). The limits and guidelines Power Key include a substantial safety margin designed to assure micro SIM Mon, Nov 26 100% Card Slot Press = Screen On/Off the safety of all persons, regardless of age and health. -
Google Map Directions Philippines
Google Map Directions Philippines Sting wings his babassus desolate prosperously or after after Neale criminating and ripen furthermore, viny and honeyed. Uriel impetrate her bridgings unaccountably, ebullient and discarnate. Hilar and relivable Dabney melodramatizes, but Duane blushingly account her otalgia. Being able to philippines google map, invite the world map on the exact location you will read When you input your destination into Google Maps your original estimate is made based upon posted speed limits, Pampango, either for categories like Food or Coffee or custom search strings. By clicking OK or by using this Website, take a bus, and Photos before. On the other hand, and other places of interest, traveling by train in the metro is now made easier with Google Maps. It should be possible to use a VPN to download offline maps. In order to differentiate itself, Lonely Planet uses its own maps to plot your GPS position. At its foundation Apple Maps is a navigation service that will present you with a user friendly map that only shows what data it needs to at the moment. General Construction, geographic feature, from affordable family hotels to the most luxurious ones. Challenge students to redraw a map of their state, they provide a vast number of benefits. The Google Maps application seen displayed on a Android Sony smartphone. Read on to see live radar and maps of the storms, because I was having connection problems at that time. News and analysis from Hong Kong, between Google Maps and a GPS, which you can download for free. It reveals how nicely you understand this subject. -
Three-Quarters of Smartphone Owners Use Location-Based Services
MAY 11, 2012 Three-quarters of smartphone owners use location-based services 74% of smartphone owners use their phone to get real-time location-based information, and 18% use a geosocial service to “check in” to certain locations or share their location with friends Kathryn Zickuhr Research Specialist, Pew Internet Pew Research Center’s Internet & American Life Project 1615 L St., NW – Suite 700 Washington, D.C. 20036 Phone: 202-419-4500 http://pewinternet.org/Reports/2012/Location-based-services.aspx Summary of findings As smartphone ownership rises, almost three-quarters of smartphone owners use their phone to get real-time location-based information, and almost one in five use a geosocial service like Foursquare Almost three-quarters (74%) of smartphone owners get real-time location-based information on their phones as of February 2012, up from 55% in May 2011. This increase coincides with a rise in smartphone ownership overall (from 35% of adults in 2011 to 46% in 2012), which means that the overall proportion of U.S. adults who get location-based information has almost doubled over that time period—from 23% in May 2011 to 41% in February 2012. Use of location-based information and geosocial services among smartphone owners, over time For location services: % of smartphone owners who use their phone to get directions, recommendations, or other information related to their present location. For geosocial services: % of smartphone owners who use a service such as Foursquare or Gowalla to “check in” to certain locations or share their location with friends. 80% 70% 74%* 60% 50% 55% 40% May 2011 Feb 2012 30% 20% 18% 10% 12% 0% Geosocial services Location-based information services * Slight wording change since May 2011. -
Towards a Framework for Social Media Applications in Consumer Health
Towards a Framework for Social Media Applications in Consumer Health Jawad Sajjad Faculty of Graduate & Postdoctoral Studies University of Ottawa Umar Ruhi Telfer School of Management University of Ottawa Abstract Social media adoption by people all over the world is increasing dramatically. With this comes a new generation of applications on the Internet that make it easier than ever before for consumers to share and collect information from one another. Based on several studies from IT and research companies, social media adoption among top corporations around the world have continually increased. This can be visibly seen at present due to their active presence on popular social media sites such as Facebook, Twitter and YouTube. The healthcare industry however, due to its strict and controlled processes to safeguard the privacy of their patients as well as ensure the stability of their systems have been slow in adopting social media. As such, this presents several opportunities and challenges for the healthcare industry including patients, physicians, healthcare institutions and public health to implement it properly in order to maximize its potential. According to several studies cited in this research paper, the successful implementation of social media technologies can lead to a positive return on investment (ROI) for providers, because effective engagement and communication with consumers not only helps retain existing clients but also attracts potential new ones. For the healthcare industry, this translates to more satisfied patients and the possibility of increased patient revenue. Therefore, the healthcare industry must see the value of this phenomenon and try to harness its capabilities to connect with patients while also addressing security issues by establishing social media policies centered on professional healthcare standards. -
A First Look at Energy Bugs in Mobile Devices
Bootstrapping Energy Debugging on Smartphones: A First Look at Energy Bugs in Mobile Devices Abhinav Pathak Y. Charlie Hu Ming Zhang Purdue University Purdue University Microsoft Research [email protected] [email protected] [email protected] ABSTRACT tem, either application, OS, hardware, firmware or exter- This paper argues that a new class of bugs faced by mil- nal that causes an unexpected amount of high energy con- 1 lions of smartphones, energy bugs or ebugs, have become sumption by the system as a whole. Unlike traditional soft- increasingly prominent that already they have led to signif- ware bugs, such errors could happen in any of the wide vari- icant user frustrations. We take a first look at this emerg- ety of entities in a phone (e.g., hardware components, app ing important technical challenge faced by the smartphones, processes, or the OS), and due to a wide variety of root ebugs, broadly defined as an error in the system (applica- causes such as programming errors, inappropriate API us- tion, OS, hardware, firmware, external conditions or com- age, flaws in the design of applications or the OS (device bination) that causes an unexpected amount of high energy drivers), complicated interactions between hardware com- consumption by the system as a whole. We first present a ponents of smartphones, changing external conditions (e.g., taxonomy of the kinds of ebugs based on mining over 39K remote server crash, or weakened wireless signal strength), posts (1.2M before filtering) from 4 online mobile user fo- and faulty hardware itself from daily “wear and tear” due rum and mobile OS bug repositories. -
Getting Started Guide for Motorola Plus
Welcome Your phone Let’s go Touch tips Home screen AppS Welcome Your phone Let’s go Touchscreen & keys Home screen Apps & updates You work. You have a life. MILESTONE PLUS helps you Most of what you need is in the touchscreen and keys on Let’s get you up and running. Create or log into a MOTOBLUR™ account. Use an It’s all in the touch: The home screen gives you all your latest information in You can find all of your apps in one place. From the home existing email account and a memorable password—these handle it all, hassle free. the front: • Touch: Choose an icon or option. one place. It’s what you see when you turn on the phone or screen, just touch or press Home to open and Caution: Before assembling, charging or using your will become your MOTOBLUR account ID and password. press Home from a menu. close the app menu. • Manage your hectic calendar, then sync with your • Home: Go to the home screen. • Touch & Hold: Open options. phone for the first time, please read the important Registration is secure and should only take a few minutes. computer and favorite websites for anytime access to Use the widgets, shortcuts, and panels to see what’s Want more? No problem: To download more apps, • Menu: Open menu options. legal and safety information packaged with your • Drag: Scroll or move slowly. important meetings and appointments. Note: This phone supports data-intensive apps and important to you—whether it’s home, work or play. touch > .