Downloaded From

Total Page:16

File Type:pdf, Size:1020Kb

Downloaded From Mobile communication and the protection of children Ong, R.Y.C. Citation Ong, R. Y. C. (2010, April 22). Mobile communication and the protection of children. Meijers-reeks. Retrieved from https://hdl.handle.net/1887/15349 Version: Not Applicable (or Unknown) Licence agreement concerning inclusion of doctoral thesis in the License: Institutional Repository of the University of Leiden Downloaded from: https://hdl.handle.net/1887/15349 Note: To cite this publication please use the final published version (if applicable). Mobile Communication and the Protection of Children dissertation series no 2010-10 The research reported in this thesis has been carried out under the auspicies of SIKS, the Dutch Research School for Information and Knowledge Systems. Lay-out: Anne-Marie Krens – Tekstbeeld – Oegstgeest © R.Y.C. Ong / Leiden University Press, 2010 ISBN 978 90 8728 080 2 Behoudens de in of krachtens de Auteurswet van 1912 gestelde uitzonderingen mag niets uit deze uitgave worden verveelvoudigd, opgeslagen in een geautomatiseerd gegevensbestand, of openbaar gemaakt, in enige vorm of op enige wijze, hetzij elektronisch, mechanisch, door fotokopieën, opnamen of enige andere manier, zonder voorafgaande schriftelijke toestemming van de uitgever. Voorzover het maken van reprografische verveelvoudigingen uit deze uitgave is toegestaan op grond van artikel 16h Auteurswet 1912 dient men de daarvoor wettelijk verschuldigde vergoedingen te voldoen aan de Stichting Reprorecht (Postbus 3051, 2130 KB Hoofddorp, www.reprorecht.nl). Voor het overnemen van (een) gedeelte(n) uit deze uitgave in bloemlezingen, readers en andere compilatiewerken (art. 16 Auteurswet 1912) kan men zich wenden tot de Stichting PRO (Stichting Publicatie- en Reproductierechten Organisatie, Postbus 3060, 2130 KB Hoofddorp, www.cedar.nl/pro). No part of this book may be reproduced in any form, by print, photoprint, microfilm or any other means without written permission from the publisher. Mobile Communication and the Protection of Children PROEFSCHRIFT ter verkrijging van de graad van Doctor aan de Universiteit Leiden, op gezag van de Rector Magnificus prof. mr. P.F. van der Heijden, volgens besluit van het College voor Promoties te verdedigen op donderdag 22 april 2010 klokke 11.15 uur door Rebecca Ong Yoke Chan geboren te Maleisië in 1961 Promotiecommissie: Promotor: prof. dr. H.J. van den Herik Co-promoter: mr. dr. B.W. Schermer Overige leden: prof. mr. A.W. Hins prof. mr. A.H.J. Schmidt prof. dr. F.M.T. Brazier (Technische Universiteit Delft) prof. mr. drs. C. Stuurman (Universiteit van Tilburg) prof. dr. P.M. Valkenburg (Universiteit van Amsterdam) mr. dr. G.J. Zwenne Preface “How is your Phd going?” and “When do you finish?” are two stressful questions a PhD student faces and dreads. There are times when I am sure a PhD student will ask himself why he1 is putting himself through such an ‘ordeal’. For me, the primary objective for writing a thesis arose from the observa- tion of the transformative trends in communicative practices amongst the younger generation. This is due in no small part to the development of new communication technology and its accompanying devices and applications. In recent years there has been a rise in the up-take of mobile phones. Amongst the younger generation, a contributing factor to the rise and rapid diffusion is the mobile phone’s personal and liberating qualities in addition to its varied communicative expressive applications. While this has breathed fresh dimensions to the social structure and independence of these youngsters, we are well aware that the technology can be used for purposes that are different from those purposes that were originally intended. Thus, it is neces- sary to appreciate and understand the impact of mobile communication techno- logy on children and young people. There is also an urgent need for the regulators, civic society and the relevant stakeholders to respond responsibly to the challenges that arise as a result of the use and abuse of mobile communi- cation technology. I wish to record my sincere appreciation to the following people persons who supported me throughout. My supervisor, Professor H. Jaap van den Herik has patiently and meticulously read, questioned, commented, the text many times. He ensured that the text is continuously improved. I am grateful for his support, guidance, and advice. Moreover, I acknowledge Dr. Bart Schermer, my co-supervisor, for his invaluable comments. A special mention also goes out to Bni. Yung-ven, Shanthi Sabapathy, Tasha and Ashton for their continuing love, patience, and support. Finally, I would like to show my deepest gratitude and love to my mentor and Guru, Paramahansa Yogananda without whom this project would have never been remotely possible. Rebecca Ong Hong Kong/Leiden, February 2010 1 For brevity, I use ‘he’ and ‘his’ whenever ‘he’ or ‘she’ and ‘his’ and ‘her’ are meant. Table of contents LIST OF ABBREVIATIONS XV LIST OF FIGURES XIX 1MOBILE COMMUNICATION AND THE PROTECTION OF CHILDREN 1 1.1 Two challenges of new generation mobile devices 2 1.2 The Internet as a modern form of communication 3 1.2.1 The first network 4 1.2.2 The Internet 4 Open-network architecture 5 The protocols and the World Wide Web 7 A collection of communities 9 1.2.3 Expanded communities 9 1.3 The mobile Internet 11 1.3.1 The benefits of mobile Internet 12 1.3.2 The risks of mobile Internet 12 1.3.3 Controlling the Internet 13 1.4 A broad range of beneficial activities 14 1.4.1 Unfavourable activities 15 1.4.2 The World Summit on Information Society (WSIS) 15 1.4.3 Internet Corporation for Assigned Names and Numbers (ICANN) (and four other organisations) 17 1.4.4 The undefined rules of the Internet 18 1.4.5 Limitations of direct state intervention 19 1.5 Problem statement 19 1.5.1 The Internet: the apex of modern day communication 19 1.5.2 The continuous transformation 20 1.5.3 The protection of children on-line 21 1.5.4 Economic issues versus moral issues 22 1.5.5 Possible regulatory issues 23 1.5.6 A two-folded problem statement 24 1.6 Research questions 24 1.7 Research methodology 25 1.8 The structure of the thesis 25 VIII Table of contents 2MOBILE TELEPHONY 27 2.1 The development of mobile technology 28 Three major generations 28 Emphasis in on applications 29 Experience of new technologies 29 2.2 Telecommunication infrastructure in Hong Kong 30 2.2.1 The infrastructure: mobile phone services 30 2.2.2 The players 31 A: Mobile network operators (MNOs) 31 B: Mobile virtual network operators (MVNOs) 31 2.2.3 Open access strategy 33 2.3 Mobile content as new revenue 34 2.4 Platforms for delivery of content 34 2.4.1 Content produced by MNO 35 2.4.2 Content produced by third party in partnership with MNO 35 2.5 Chapter conclusion 36 3CONVERGENCE OF TECHNOLOGIES 37 3.1 What is convergence? 37 3.2 Five factors that fuel convergence 39 3.3 Objectives of government policies in the communication sector 41 3.4 Convergence: its benefits and concerns 42 3.4.1 Benefits 42 3.4.2 Concerns 43 3.5 Regulatory challenges to convergence 44 3.6 A regulator’s responsibilities and the position of Hong Kong 45 3.6.1 Three-fold responsibilities 45 3.6.2 Telecommunication in Hong Kong 46 3.7 Regulatory convergence in Hong Kong 47 3.7.1 A unified regulator of other jurisdictions 47 A: The United Kingdom 48 B: Australia 48 C: Malaysia 49 3.7.2 Hong Kong’s proposed Communication Authority 49 3.8 Responding to the challenges 51 3.8.1 The general position 51 3.8.2 The position in Hong Kong 52 3.8.3 Our position 53 3.8.4 Society’s moral watchdog 56 3.8.5 The Green Dam Youth Escort 56 3.9 Chapter conclusion 57 Table of contents IX 4MOBILE COMMUNICATION AND POTENTIAL HAZARDS 59 4.1 Diffusion of mobile telephony 62 4.1.1 Anytime, anywhere 63 4.1.2 Staying in perpetual contact 64 4.1.3 Safety and security 65 4.1.4 Section conclusion 66 4.2 The younger generation and mobile telephony 66 4.2.1 Personal expression 68 4.2.2 Independence 70 4.2.3 Social networking and relationships 70 4.2.4 Common youth traits 71 4.3 New communication technology – the potential hazards 72 4.3.1 The positive effects 72 4.3.2 A multitude of hazards 72 4.3.3 Two main hazards for end users 74 4.3.4 The greatest hazard is not quantifiable 75 4.4 Child protection concerns 76 4.5 Content 77 4.5.1 Two expressions of content 78 A: Illegal content 78 B: Harmful material 79 4.5.2 A matter of grave concern 80 4.5.3 Inappropriate materials 80 4.5.4 Appetite for adult material 80 4.5.5 Pornography 81 4.5.6 Incidence of exposure to pornography 82 A: Involuntary and accidental visits 82 B: Unwanted exposure 83 C: Significance of studies 84 4.5.7 Mobile gaming 85 4.6 Contact 86 4.6.1 Sourcing children and grooming 87 A: Anonymity 87 B: Interactivity 88 4.6.2 Unwanted sexual solicitation 88 4.6.3 Purpose of paedophiles’ activities 89 4.6.4 Cyber-bullying 90 4.7 Commercialism 92 4.7.1 Spam 93 4.7.2 Premium-rate services 94 4.7.3 Younger generations as target market 95 4.8 Chapter conclusion 97 X Table of contents 5MOBILE COMMUNICATION: ITS IMPACT ON CHILDREN AND YOUNG PEOPLE 99 5.1 Impact of the use of mobile technology 99 5.1.1 The lack of research and publications 100 5.1.2 Three definitions 101 5.2 Exposure to pornography 101 5.2.1 The consequences 103 5.2.2 A comparison with old observations 105 5.2.3 Conclusions for the on-line world 106 5.3 Violence in mobile gaming 107 5.4 The power of cyber-bullying and unwanted sexual solicitation 110 5.4.1 The seven effects of bullying 111 5.4.2 On-line bullying 112 5.4.3 Tragic incidents and suicide 113 5.4.4
Recommended publications
  • 3S Ägare Hutchison Presenterar INQ1 - Facebookmobil Till Lågt Pris
    2008-11-13 11:04 CET 3s ägare Hutchison presenterar INQ1 - facebookmobil till lågt pris 3s ägare Hutchison Whampoa tar nu upp konkurrensen med Sony Ericsson och Nokia och börjar tillverka egna mobiler under namnet INQ. Den första modellen, som presenteras idag, kombinerar Facebook med ett lågt pris. I början av nästa år kommer den att finnas i Sverige. INQ ska inte konkurrera med avancerade smartphones som Apple iPhone, Sony Ericsson X1 eller Nokia N96. I ställer har Hutchison Whampoa valt att rikta in sig på resten av marknaden, de 90 % som vill kunna använda Internet i mobilen precis som på datorn men som inte vill betala en förmögenhet för mobilen för att göra detta. Därför ska INQ tillverka mobiler där det är lätt att använda Internettjänster och som samtidigt är billiga. - INQ erbjuder en helt ny användareupplevelse på mobilen. Vi vill ta de tjänster som människor lärt sig älska på nätet och bygga in dem rakt in i hjärtat på våra mobiler. Borta är alla besvärliga inställningar. Vi gör det lika enkelt att följa dina vänner via Facebook som det är att ringa ett vanligt telefonsamtal, säger Frank Meehan, VD för INQ. - Vi är lyckliga över samarbetet med INQ och väldigt imponerade över vilken bra facebookupplevelse det blir i INQ1. Just nu har vi omkring 15 miljoner mobila facebookanvändare. Antalet har fördubblats de senaste 6 månaderna och vi hoppas att det kommer att öka ändå snabbare tack vare INQ, säger Mark Zuckerberg, koncernchef på Facebook. Förutom Facebook har INQ1 Skype med fria skypesamtal till 360 miljoner människor världen över, Windows Live Messenger och musiktjänsten Last.fm inbyggda.
    [Show full text]
  • 12 October 2009 the Latest Social Mobile INQ Mini 3G with Twitter
    12 October 2009 The Latest Social Mobile INQ Mini 3G with Twitter Coloring Customers’ Social Networking Experience Exclusively Available at 3 Hong Kong Hong Kong, 12 October 2009 - 3 Hong Kong, the mobile operation of Hutchison Telecommunications Hong Kong Limited ( “Hutchison Telecom Hong Kong”), today announced that INQ Mini 3G, the second social mobile developed by INQ Mobile, a Hutchison Whampoa Limited’s company, will be launched tomorrow ( 13 October) . Following the success of the award-winning INQ1, the new INQ Mini 3G is pre-installed with the Twitter function on top of its existing social networking applications like Facebook and Skype. With this new colourful and affordable social mobile, customers can network with friends and update their status anytime anywhere, making their lives more colourful. Integrating the most popular social networking services 3 Hong Kong’s initiatives in bringing the first social mobile INQ to Hong Kong early this year has already spearheaded the wave of mobile social networking. The exclusive launch of INQ Mini 3G, which allows customers to post their personal tweets or update the status of their following and followers via Twitter, brings the experience of mobile social networking to the next level. With the integrated phonebook on one interface and a switcher key, users can instantly switch across different social networking accounts like Twitter, Facebook, Window Live Messenger and Skype, upload photos, update status, post new messages or chat with friends anytime, anywhere. 3 Hong Kong customers can also use Facebook and Twitter, watch YouTube via 3Xplorer under the mobile portal of Planet 3, and also access Windows Live Messenger, Yahoo! Messenger and 3 Community via 3messenger.
    [Show full text]
  • Half a Dozen Consumer Trends for 2009
    trendwatching.com is an independent and opinionated consumer trends firm, relying on a global network of hundreds of spotters, working hard to deliver inspiration and pangs of anxiety to business professionals in 120+ countries worldwide. More information at www.trendwatching.com January 2008 | Yup, it’s time for endless predictions. And while most of them are rather dark and gloomy, with economies around the world going downhill, there are still plenty of trends out there that are begging to be applied profitably, both now and long-term. Enjoy! Half a dozen consumer trends for 2009 Overview: You are reading a PDF version of one of our free monthly Trend Briefings. More at: www.trendwatching.com !!!!! 1 / 7 1. For consumers, anything practical and useful will go down well in more austere times, while anything that speaks their language (and thus ultimately shows that a brand cares about its customers' interests) will be recip- rocated with appreciation and goodwill. Which in today's harsh business climate is like, well, gold dust. 2. For businesses, NICHETRIBUTES can often be imagined and introduced at very low costs (which doesn’t hurt when budgets are tight); the only resources needed are creativity and a good feel for the consumer trends that matter most over the next 12 months. 3. Most important of all: ultimately this is not about gim- micky fingerless gloves: it’s about integrating the 'now' into your activities this year, achieving relevance for and goodwill from your customers, in an environment that has never been more about the 'now' than, well, now ;-) * NICHETRIBUTES is decidedly not about advertising, i.e.
    [Show full text]
  • Christine Perey's Slides
    The Future Welcome of Social Networking W3C Workshop January 15-16, 2009 Barcelona, Spain 1 PEREY Research & Consulting Thank you! All of us 2 PEREY Research & Consulting Agenda • Lay of the social networking “land” today • What can we accomplish? • How we will work? • What does the W3C system do (offer)? • Introductions – Your networking kit 3 PEREY Research & Consulting Orientation and Navigation A few terms, concepts and frameworks to guide our thoughts and our work PEREY Research & Consulting Social Networking • All of the activities and enabling elements necessary for the contribution and consumption of social media regardless of the network 5 PEREY Research & Consulting Social Networking is NOT • the form factor or manufacturer of the device (terminal) chosen • the type of media (text, images, video, music, animations) • the existence or lack of a prior relationship • the distance or proximity Think people 6 PEREY Research & Consulting Social Networking 2007 • Everyone is playing nice • Lines of demarcation • Money was not a problem Circa 2007 7 PEREY Research & Consulting Regional differences are emerging 8 PEREY Research & Consulting Figure 1.7 Global total mobile community revenues in three scenarios, 2007-2012 Magnitude Does anyone want to debate the absolute size? 9 PEREY Research & Consulting Momentum of 2008 • More • More • More • More 10 PEREY Research & Consulting Changing mobile All drivers Changing network handset capacities Accelerated features Changing Internet technology (Web 2.0) Changing and social networks content
    [Show full text]
  • Menu Back Home Next
    INQMOBILE.COM READ ME SHORTCUTS HOME MENU BACK NEXT MENU The world’s first social mobile. GET SET UP YOUR MOBILE EXPLAINED This is beyond a web phone. This is a social networking INQMOBILE.COM mobile designed to keep you in touch and online wherever INTERNET: you are. Web essentials like Facebook, Skype, eBay SKYPE and Windows Live Messenger are always on, always connected, ensuring you’re never out of touch. FACEBOOK WINDOWS LIVE MESSENGER We believe your phone should do the hard work for you and that you shouldn’t need a degree in nuclear physics EBAY to work it. Now here’s the Switcher. It runs along the bottom LAST.FM of your Home screen with all your favourite applications, FEEDS so they’re easy to get to and quick to open. WIDGETS Your Contacts used to be just a static list. Not now. PLANET 3 We’ve brought it to life, integrating your Facebook, Skype and Windows Live contacts so when your friends’ status HANDSET: (or even their profile pictures) change, you’ll see it live CALLS in your Contacts. TEXT, MULTIMEDIA AND EMAIL It’s never been quicker or easier to get online and MESSAGES AND SKYPE CHAT keep connected with the things that matter to you. CONTACTS MEDIA AND GAME CENTRE To get straight to a section, just click on the titles opposite. EXTRA FEATURES AND SECURITY CONNECTIVITY SETTINGS HELP 2 HOME MENU BACK NEXT GET SET UP INSERT YOUR USIM, BATTERY AND MEMORY CARD, AND CHARGE YOUR MOBILE INQMOBILE.COM First things first. WIZARD TURN YOUR PHONE ON AND OFF SET TIME AND DATE There are a few things you need to do to get your mobile working.
    [Show full text]
  • Dispositivos Compatibles Con La Base De Carga Quad Dock
    Dispositivos compatibles con la Base de Carga Quad Dock Micro USB Acer: beTouch E120, beTouch E130, Stream Amazon: Kindle DX, Kindle International BlackBerry: 8520 Curve, 8900 Curve, Bold 9700, Curve 3G 9300, Pearl 3G, Storm, Storm2, Torch 9800 Google: Nexus One HTC: Desire, Google Nexus One, HD mini, HD2, Legend, Wildfire Huawei: G7002 LG: BL20 Chocolate, BL40 Chocolate, Cookie Fresh GS290 , Cookie Gig KM570, Cookie Plus GS500, GD510 Pop, GD880 Mini, GM205, GM750, GT350, GT400 Viewty Smile, GT540 Optimus, GW620, GW910, InTouch Max, Town GT350, Viewty Snap GM360, Wink, Wink 3G Motorola: Backflip, DEXT, Flipout, Milestone, Q9, Quench, RAZR2 V8, RAZR2 V9, ROKR E8, XT720 Nokia: 5630 Xpress Music, 6500 Classic, 7900 Prism, 8600 Luna, 8800 Arte, 8800 Diamond Arte, C1 01, C1 02, C2, C3, E5, E52, E55, N8, N85, N86 8MP, N900, N97, N97 mini, X2, X3 02 Touch And Type, X5 01 Orange: Amsterdam, Boston, Lisbon, Rio Samsung: B3310, B3410, B5310 Corby PRO, B5722, B7620 Giorgio Armani, B7722, Beam I8520, Beat DISC, Blade, Blue Earth, C3300 Libre, C5510, C6112, Chat B3410W, E2100, E2370, Galaxy, Galaxy 3 I5800, Galaxy Apollo i5801, Galaxy Europa I5500, Galaxy Lite, Galaxy Portal, Galaxy S I9000, Genio PRO, Genio Qwerty, Glamour S5150, Glamour S7070, H1, i5500 Corby, i5700 Galaxy Spica, I8520 Halo, Jet S8000, Jet Ultra Edition, Knox, Lindy M5650, Lucido, M2310, M2510, M3310, M7500 Emporio Armani, M7600 Beat DJ, Miss Player, Monte Bar C3200, Monte S5620, Monte Slider E2550, Omnia HD, Omnia II I8000, Omnia Lite, Omnia PRO 4 B7350, Omnia Pro B7330, Omnia Pro
    [Show full text]
  • Devices for Which We Currently Recommend Opera Mini 7.0 Number of Device Models
    Devices for which we currently recommend Opera Mini 7.0 Number of device models: 625 Platforms included: JME, BlackBerry, Android, S60 and iOS List generated date: 2012-05-30 -------------------------------------------------------------------------------------------------------------------------------------- au by KDDI IS03 by Sharp BlackBerry 9900 Bold Acer beTouch E110 au by KDDI REGZA Phone BlackBerry Curve 3G 9300 IS04 by Fujitsu-Toshiba Acer beTouch E130 Dell Aero au by KDDI Sirius IS06 by Acer Iconia Tab A500 Pantech Dell Streak Acer Liquid E Ezze S1 Beyond B818 Acer Liquid mt Fly MC160 BlackBerry 8520 Curve Acer Liquid S100 Garmin-Asus nüvifone A10 BlackBerry 8530 Curve Acer Stream Google Android Dev Phone BlackBerry 8800 1 G1 Alcatel One Touch OT-890D BlackBerry 8820 Google Nexus One Alfatel H200 BlackBerry 8830 Google Nexus S i9023 Amoi WP-S1 Skypephone BlackBerry 8900 Curve HTC A6277 Apple iPad BlackBerry 9000 Bold HTC Aria A6366 Apple iPhone BlackBerry 9105 Pearl HTC ChaCha / Status / Apple iPhone 3G BlackBerry 9300 Curve A810e Apple iPhone 3GS BlackBerry 9500 Storm HTC Desire Apple iPhone 4 BlackBerry 9530 Storm HTC Desire HD Apple iPod Touch BlackBerry 9550 Storm2 HTC Desire S Archos 101 Internet Tablet BlackBerry 9630 Tour HTC Desire Z Archos 32 Internet Tablet BlackBerry 9700 Bold HTC Dream Archos 70 Internet Tablet BlackBerry 9800 Torch HTC Droid Eris Asus EeePad Transformer BlackBerry 9860 Torch HTC Droid Incredible TF101 ADR6300 HTC EVO 3D X515 INQ INQ1 LG GU230 HTC EVO 4G Karbonn K25 LG GW300 Etna 2 / Gossip HTC Explorer
    [Show full text]
  • The Most Common Mobile Operating Systems Are: Android from Google Inc. (Open Source, Apache) Blackberry OS from RIM
    The most common mobile operating systems are: Android from Google Inc. (open source, Apache) BlackBerry OS from RIM (closed source, proprietary) iOS from Apple Inc. (closed source, proprietary) Symbian OS from the Symbian Foundation (open public license) Windows Phone from Microsoft (closed source, proprietary) webOS from HP (certain parts open sourced) Android from Google Inc. (open source, Apache) Android was developed by a small startup company that was purchased by Google Inc. Released on November 5th 2007 Android is an open source, Linux-derived OS backed by Google, along with major hardware and software developers (such as Intel, HTC, ARM, Samsung, Motorola and eBay, to name a few) Android releases prior to 2.0 (1.0, 1.5, 1.6) were used exclusively on mobile phones. Android 3.0 was a tablet-oriented release and does not officially run on mobile phones. Android releases are nicknamed after sweets or dessert items like Cupcake (1.5), Frozen Yogurt (2.2), Honeycomb (3.0) and Ice Cream Sandwich (4.0). Most major mobile service providers carry an Android device. 1. What is Android? Android is a software platform and an operating system for mobile devices, The first device running Android is T-Mobile G1 officially released on October 22nd 2008. 2. I want to develop for Android. What are the basics I need to know? Android requires knowledge of Java programming language although it allows other programming languages (C C++for example) to be compiled in the native code. This however is not officially supported by Google. You can download SDK and get all the relevant info at http://code.google.com/android/index.html Make sure to checkout Android Developers forum for more tips at http://androidforums.com/a/ and/or share your experience with us.
    [Show full text]
  • Consumers' Choice
    THE INTERNATIONAL JOURNAL OF THE HUTCHISON WHAMPOA GROUP SPHERE 24 Consumers’ Choice VALU ER E P U S Y G T ✔ I RE L AT QUA Why own brands and private labels offer shoppers the best deal S PHERE Contents NUMBER 24 MARCH 2 0 0 9 A Few Words from the Editor ELCOME to the latest issue of Sphere. 2 UPDATES 24 FOCUS Our cover story looks at how NEWSBITES DESTINATION SWEDEN retailers are focusing consumer What’s happening in the world of A country with something Hutchison Whampoa Limited for everyone Wattention on value for money products like own brands and private labels, particularly from trusted stores such as Watsons and PARKnSHOP. 10 3 G H O T S P O T 28 THEN . A N D N O W Then, we introduce you to the INQ1, an amazing WELCOME TO THE CASE HISTORY SOCIAL MOBILE From hand-written medicine new handset that has just won the most coveted INQ1 is simple to use, catalogues to online brochures prize in the mobile industry. It’s being called the affordable and more importantly Social Mobile as it is inexpensive, simple to use and – it is the best takes social networking to a completely new level. It is then time for a change of pace and we explore 14 CO V E R S T O R Y the wonderful work being done by Project New Life, CONSUMERS’ CHOICE a charity that offers free treatment to children in Own brands and private labels China unfortunate enough to be born with cleft lips offer shoppers the best deal and palates.
    [Show full text]
  • Chapter 1: Introduction
    Chapter 1: Introduction People have started using smart phones, since various companies provide various utility features in devices. According to Garter studies, market of cellular devices grew 10% in last few months of the year 2011 whereas the market of cell phones/smart devices has risen up by 39%. With much interest, Android Operating System itself accounts for more than 55 percent of smart phones sales since its origin. Current day mobile devices have four capabilities –, computing, communication, sensing and high utility. Besides being at a high sale rate and such capabilities, these devices have also made the malicious attackers ready to attack and steal data. This idea is complemented by Lookout Threat report which has done great effort with respect to malware. As the sale has increased exponentially the malicious coders have also increased. Mobile malware performs malicious activities like stealing private information, sending sms, reading contacts and can even harm by exploiting data. Malware authors can cause much damage to device users as so many users use capabilities of devices such as money transfer, online bank payment etc. Recent news and survey states that android platform is the mostly attacked platform for malwares. Since the malware can enter from the network, so its users responsibility to install malware free application. Even a malicious author can even repackage a famous application. So the first right is with user to check the permissions which an application asks during its installation. Once the user allows the application, he grants the application to use the permissions mentioned completely. Otherwise the user can deny installing the application.
    [Show full text]
  • Onetab XST2 • PAD7 • A101 • A200 • A210 • A500/Picasso
    • Onetab XST2 • D09 • PAD7 • D13 • A101 • D15 • A200 • D17 • A210 • D23 • A500/Picasso • S1160 • A501 • Aurora II • A510 • Novo 7 Advanced2 • A701 • Novo 7 Aurora • Allegro • Novo 7 Elf • beTouch E100 • Novo 7 Elf II • beTouch E120 • Novo 7 Paladin • beTouch E140 • Novo 8 Advanced • beTouch E400 • Novo8 • DX650 • Kira N10040 • E101/beTouch E101 • OnePAD 720 • E110 • OnePad 970 • E130 • T480 • E200/beTouch E200 • Air99 • E210/beTouch E210 • MK99 • E310/Liquid Mini • SLIDE99 • E320 • 991D • F900 • 993D • G100W/G100W • C60 • Iconia Tab A100/Vangogh • C750 • Iconia Tab A700 • Crystal • Liquid • DB@ • Liquid Metal • E5 • neoTouch P400 • Elle-N1 • Pro80 • ELLE-N3 • S100 • GLAMPHONE ELLE • S110/Stream • Mandarina Duck • S200/newTouch S200 • Miss Sixty 2009 • S300 • MOVE/MOVE • TPA60W/TPA60W • OH1C • X960 • OH5 • Z110 • One Touch 156 • T2V • One Touch 301 • Vega • One Touch 311 • M70 • One Touch 331/525/526/531 • S9 • One Touch 500 • 16-a10y • One Touch 556 • D08 • One Touch 665 • One Touch 720D • OT-300 • one touch 890 • OT-305 • one touch 890D/one touch 890D • OT-305A • one touch 906/one touch 906 • OT-306X • one touch 908 • OT-315M • ONE TOUCH 916A • OT-332 • One Touch 985N • OT-355 • One Touch C550 • OT-355A • One Touch C551 • OT-355D • One Touch C552a • OT-360 • One Touch S218 • OT-380 • One-Touch 501 • OT-383A • One-Touch 511 • OT-385 • One-Touch 512 • OT-501/701 • One-Touch 525 • OT-505 • One-Touch 535 • OT-506a • One-Touch 715 • OT-517D • one_touch_803A • OT-517Z • OneTouch Sport • OT-531 • OT 153/One Touch • OT-585 • OT 303A • OT-600
    [Show full text]
  • Embedded Systems
    Downloaded from orbit.dtu.dk on: Oct 01, 2021 Analysis of Security Protocols in Embedded Systems Bruni, Alessandro Publication date: 2016 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Bruni, A. (2016). Analysis of Security Protocols in Embedded Systems. Technical University of Denmark. DTU Compute PHD-2016 No. 389 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Analysis of Security Protocols in Embedded Systems Alessandro Bruni Kongens Lyngby 2015 Technical University of Denmark Department of Applied Mathematics and Computer Science Richard Petersens Plads, building 324, 2800 Kongens Lyngby, Denmark Phone +45 4525 3031 [email protected] www.compute.dtu.dk Summary (English) Embedded real-time systems have been adopted in a wide range of safety-critical applications — including automotive, avionics, and train control systems — where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.e., protecting the system from the external world).
    [Show full text]