Data Mining Mobile Devices Defines the Collection of Machine-Sensed Mobile Mining Data Devices Mobile Devices Environmental Data Pertaining to Human Social Behavior

Total Page:16

File Type:pdf, Size:1020Kb

Data Mining Mobile Devices Defines the Collection of Machine-Sensed Mobile Mining Data Devices Mobile Devices Environmental Data Pertaining to Human Social Behavior Marketing / Data Mining and Knowledge Discovery Mena With today’s consumers spending more time on their mobiles than on their PCs, Data Mining new methods of empirical stochastic modeling have emerged that can provide marketers with detailed information about the products, content, and services their customers desire. Data Mining Mobile Devices defines the collection of machine-sensed Devices Data Mining Mobile Mobile Devices environmental data pertaining to human social behavior. It explains how the integration of data mining and machine learning can enable the modeling of conversation context, proximity sensing, and geospatial location throughout large communities of mobile users. Jesus Mena • Examines the construction and leveraging of mobile sites • Describes how to use mobile apps to gather key data about consumers’ behavior and preferences • Discusses mobile mobs, which can be differentiated as distinct marketplaces—including Apple®, Google®, Facebook®, Amazon®, and Twitter ® • Provides detailed coverage of mobile analytics via clustering, text, and classification AI software and techniques Mobile devices serve as detailed diaries of a person, continuously and intimately broadcasting where, how, when, and what products, services, and content your consumers desire. The future is mobile—data mining starts and stops in consumers’ pockets. Describing how to analyze Wi-Fi and GPS data from websites and apps, the book explains how to model mined data through the use of artificial intelligence software. It also discusses the monetization of mobile devices’ desires and preferences that can lead to the triangulated marketing of content, products, or services to billions of consumers—in a relevant, anonymous, and personal manner. K15401 ISBN: 978-1-4665-5595-2 90000 www.crcpress.com 9 781466 555952 www.auerbach-publications.com K15401 cvr mech.indd 1 5/15/13 10:57 AM Data Mining Mobile Devices OTHER TITLES FROM AUERBACH PUBLICATIONS AND CRC PRESS Ad Hoc Mobile Wireless Networks: Principles, Guide to the De-Identification of Protocols, and Applications, Second Edition Personal Health Information Subir Kumar Sarkar, T.G. Basavaraju, Khaled El Emam and C. Puttamadappa ISBN 978-1-4665-7906-4 ISBN 978-1-4665-1446-1 Identification and Management of Android Security: Attacks and Defenses Distributed Data: NGN, Content-Centric Anmol Misra and Abhishek Dubey Networks and the Web ISBN 978-1-4398-9646-4 Giovanni Bartolomeo and Tatiana Kovacikova Applying Guiding Principles of Effective ISBN 978-1-4398-7907-8 Program Delivery Kerry R. Wills Information Security Policy Development ISBN 978-1-4665-8789-2 for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, Automatic Defense Against Zero-day PCI DSS V2.0, and AUP V5.0 Polymorphic Worms in Communication Barry L. Williams Networks ISBN 978-1-4665-8058-9 Mohssen Mohammed and Al-Sakib Khan Pathan ISBN 978-1-4665-5727-7 Iris Biometric Model for Secured Network Access Big Data and Business Analytics Jay Liebowitz (Editor) Franjieh El Khoury ISBN 978-1-4665-6578-4 ISBN 978-1-4665-0213-0 Bring Your Own Devices (BYOD) Next Generation Mobile Broadcasting Survival Guide David Gómez-Barquero Jessica Keyes ISBN 978-1-4398-9866-6 ISBN 978-1-4665-6503-6 Optimal Resource Allocation for Distributed The Complete Book of Data Anonymization: Video and Multimedia Communications From Planning to Implementation Yifeng He, Ling Guan, and Wenwu Zhu Balaji Raghunathan ISBN 978-1-4398-7514-8 ISBN 978-1-4398-7730-2 PRAGMATIC Security Metrics: Data Governance: Creating Value from Applying Metametrics to Information Information Assets Security Neera Bhansali (Editor) ISBN 978-1-4398-7913-9 W. Krag Brotby and Gary Hinson ISBN 978-1-4398-8152-1 Data Mining Mobile Devices Jesus Mena Return On Process (ROP): Getting ISBN 978-1-4665-5595-2 Real Performance Results from Process Improvement Driving Business Value with Technology Michael West and Big Data ISBN 978-1-4398-8639-7 Benjamin Woo ISBN 978-1-4665-8054-1 Securing Cloud and Mobility: A Practitioner’s Guide Effective Surveillance for Homeland Security: Ian Lim, E. Coleen Coolidge, and Paul Hourani Balancing Technology and Social Issues Francesco Flammini, Roberto Setola, and ISBN 978-1-4398-5055-8 Giorgio Franceschetti (Editors) ISBN 978-1-4398-8324-2 Security and Privacy in Smart Grids Yang Xiao (Editor) Enterprise Dynamics Sourcebook ISBN 978-1-4398-7783-8 Kenneth C. Hoffman, Christopher G. Glazner, William J. Bunting, Leonard A. Wojcik, Unit and Ubiquitous Internet of Things and Anne Cady Huansheng Ning ISBN 978-1-4200-8256-2 ISBN 978-1-4665-6166-3 Data Mining Mobile Devices Jesus Mena CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20130220 International Standard Book Number-13: 978-1-4665-5596-9 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com To Sergio “El Juez” Armijo, Jorge “El Mustachon” Bustamante, Antonio “El Ochotres” Diaz, Eusebio “El Marcos” Gutierrez, and Victor “El Romano” Munoz © 2010 Taylor & Francis Group, LLC Contents Preface ............................................................................................................xi 1 Mobile Sites ............................................................................................1 1.1 Why Mobile Sites? .............................................................................1 1.2 Developing a Mobile Site ...................................................................2 1.3 Mobile Biz .........................................................................................5 1.4 Put Your Brand in Their Pocket .........................................................7 1.5 Mobile Search Engine Optimization (SEO) ......................................9 1.6 Mobile Site Requirements ................................................................10 1.7 A Mobile Site Checklist ...................................................................15 1.8 Constructing a Mobile Site ..............................................................18 1.9 When to Build a Mobile Site ...........................................................25 1.10 The Mobile Site Experience .............................................................27 1.11 Getting Mobile Googled .................................................................29 1.12 Mobile Is about Now! ......................................................................31 1.13 Mobile Payments .............................................................................32 1.14 Adobe Shadow™ Mobile Site Tester .................................................33 1.15 Mobile Cookies .............................................................................. 34 1.16 The ConnectMe QR™ Network .......................................................36 1.17 Mobile Ad Networks .......................................................................38 1.18 Mobile Site Developers ................................................................... 40 1.19 Mobile Site Development Case Studies ........................................... 44 1.19.1 OneIMS ............................................................................ 44 1.19.2 YoMobi .............................................................................. 44 1.19.3 MobiTily.com .....................................................................45 1.20 Tracking via Unique Device ID .......................................................45 1.21 Mobile Site versus Apps ...................................................................47 1.22 Social Mobile Site ............................................................................49 1.23 Web and Wireless Sites ....................................................................50
Recommended publications
  • Ten Steps to Smartphone Security
    Ten Steps to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer as mobile cybersecurity threats are growing. These mobile security tips can help you reduce the risk of exposure to mobile security threats: 1. Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones. 2. Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack. 3. Backup and secure your data. You should backup all of the data stored on your phone – such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased. 4. Only install apps from trusted sources.
    [Show full text]
  • July Meeting Rick Matteson June Meeting Scott Randell
    A not-for-profit, volunteer, member-supported organization The Forum is pub lished monthly by LlMac. NEWSLETTER OF THE LONG ISLAND MACINTOSH USER GROUP All contents, except where noted, are copyright © 2012 by LIMac. Opinions ex- pressed are the views of the authors and do not neces sarily reflect those of LIMac. Contents may be reprinted for non-commercial use, with due acknowl- edgment to LIMac. The LIMac Forum is an independent publication and has not been authorized, sponsored or otherwise approved by Apple, Inc. July 2012 www.limac.org LIMac Inc. LIMac was estab­­lished in 1984, Scott Randell Rick Matteson P.O. Box 2048 when the Mac was introduced. June Meeting July Meeting Seaford, NY , 11783-0180 Annual dues June always brings our annual visit from Dave Marra. For those Were you ever curious about what it takes to President for member ship are $36. of you who are new to LIMac, Dave is a Senior Systems Engineer design an app for iOS? Wonder no more, be- Bill Medlow (The first meeting is free.) for Apple. He always does an incredible presentation, and this year cause this month Justin Esgar, CEO/Pres- [email protected] For information,contact any JULY of the following: was no exception. Dave started by showing a video called “Class- ident of Autriv Software Development will Vice President room Rock” (you can view it here: http://www.youtube.com/Pro- enlighten us. (A footnote: Justin was a LI- George Canellis Membership jectRnL. It showed several musicians, and a vocalist making a re- Mac member in 1996, when he was a teen- [email protected] Donald Hennessy [email protected] cording using the iPad, and the GarageBand iPad app.
    [Show full text]
  • Sophos Mobile Security
    Sophos Mobile Security Protect your Android devices against malware and other threats The market dominance of Android devices and the inherent openness of Android led to the proliferation of malware and Potentially Unwanted Applications (PUA). SophosLabs detected over a million new pieces of malware in 2014 alone, and the growth rate is accelerating. Malware can lead to data loss, reputation loss, additional costs, and reduced performance. Highlights Protection and performance The Sophos Mobile Security antivirus app protects your Android devices without compromising Ì Privacy Advisor warns performance or battery life. The app uses up-to-the-minute intelligence from SophosLabs and the Sophos of potential privacy core antivirus engine. This means your apps are automatically scanned for malware as you install them. breaches Sophos Mobile Security’s consistent performance has earned recognition from independent testing agencies including AV-Test. Ì Security Advisor gives tips to improve device Malware protection security Our Sophos Mobile Security antivirus app protects your Android devices with proactive identification of malware. Your apps are automatically scanned for malware as you install them. Sophos includes protection Ì Loss and Theft for PUAs and low-reputation apps—new apps that have no known history and may pose a threat. PUAs Protection include adware, rootkits, diallers, and any association the app may have to previous malicious behaviour such as a certificate that has been compromised. Ì App Protection with additional passwords for Web protection sensitive apps Surf securely on the internet from your Android device. Sophos Mobile Security checks all websites against a Ì Spam Filter SophosLabs database for known malicious sites and prevents users from accessing them.
    [Show full text]
  • Research Article Advanced Heat Map and Clustering Analysis Using Heatmap3
    Hindawi Publishing Corporation BioMed Research International Volume 2014, Article ID 986048, 6 pages http://dx.doi.org/10.1155/2014/986048 Research Article Advanced Heat Map and Clustering Analysis Using Heatmap3 Shilin Zhao, Yan Guo, Quanhu Sheng, and Yu Shyr Center for Quantitative Sciences, Vanderbilt University, Nashville, TN 37232, USA Correspondence should be addressed to Yu Shyr; [email protected] Received 6 June 2014; Accepted 2 July 2014; Published 16 July 2014 Academic Editor: Leng Han Copyright © 2014 Shilin Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Heat maps and clustering are used frequently in expression analysis studies for data visualization and quality control. Simple clustering and heat maps can be produced from the “heatmap” function in R. However, the “heatmap” function lacks certain functionalities and customizability, preventing it from generating advanced heat maps and dendrograms. To tackle the limitations of the “heatmap” function, we have developed an R package “heatmap3” which significantly improves the original “heatmap” function by adding several more powerful and convenient features. The “heatmap3” package allows users to produce highly customizable state of the art heat maps and dendrograms. The “heatmap3” package is developed based on the “heatmap” function in R, and itis completely compatible with it. The new features of “heatmap3” include highly customizable legends and side annotation, a wider range of color selections, new labeling features which allow users to define multiple layers of phenotype variables, and automatically conducted association tests based on the phenotypes provided.
    [Show full text]
  • Total Defense Mobile Security
    USER'S GUIDE Total Defense Mobile Security Total Defense Mobile Security User's Guide Publication date 2015.04.09 Copyright© 2015 Total Defense Mobile Security Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of Total Defense. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way. Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work. This book contains links to third-party Websites that are not under the control of Total Defense, therefore Total Defense is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. Total Defense provides these links only as a convenience, and the inclusion of the link does not imply that Total Defense endorses or accepts any responsibility for the content of the third-party site. Trademarks. Trademark names may appear in this book.
    [Show full text]
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Android 4.4 home screen Company / developer Google Open Handset Alliance Android Open Source Project (AOSP) Programmed in C (core), C++, Java (UI) OS family Unix-like Working state Current Source model Open source with proprietary components Initial release September 23, 2008 Latest stable release 4.4.2 KitKat / December 9, 2013 Marketing target Smartphones Tablet computers Available language(s) Multi-lingual (46 languages) Package manager Google Play, APK Supported platforms 32-bit ARM, MIPS, x86 Kernel type Monolithic (modified Linux kernel) [1] [2] [3] Userland Bionic libc, shell from NetBSD, native core utilities with a few from NetBSD Default user interface Graphical (Multi-touch) License Apache License 2.0 Linux kernel patches under GNU GPL v2 [4] Official website www.android.com Android is an operating system based on the Linux kernel, and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. Initially developed by Android, Inc., which Google backed financially Android (operating system) 2 and later bought in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance: a consortium of hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. The first publicly available smartphone running Android, the HTC Dream, was released on October 22, 2008. The user interface of Android is based on direct manipulation, using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects. Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some applications to respond to additional user actions, for example adjusting the screen from portrait to landscape depending on how the device is oriented.
    [Show full text]
  • Mobile Security Companion to the CIS Critical Security Controls (Version 6)
    Mobile Security Companion to the CIS Critical Security Controls (Version 6) 1 Mobile Security Companion to the CIS Critical Security Controls (Version 6) Introduction ................................................................................................................................................................................................................................................................. 3 Description ................................................................................................................................................................................................................................................................... 5 CIS Critical Security Controls (Version 6): Mobile Security .................................................................................................................................................................... 5 2 Introduction Mobile devices are starting to replace laptops for regular business use. Organizations are building or porting their applications to mobile platforms, so users are increasingly accessing the same data with mobile as with their laptops. Also, organizations have increasingly implemented Bring Your Own Device (BYOD) policies to manage this trend. However, many organizations have been struggling with the increase of personal mobile devices, and don’t fully understand the security risks they may bring. There are concerns that their compact size makes them easy to lose, that they run newer operating systems that don’t
    [Show full text]
  • Securing and Managing Wearables in the Enterprise
    White Paper: Securing and Managing Wearables in the Enterprise Streamline deployment and protect smartwatch data with Samsung Knox Configure White Paper: Securing and Managing Wearables in the Enterprise 2 Introduction: Smartwatches in the Enterprise As the wearable device market heats up, wrist-worn devices Industries as varied as healthcare, such as smartwatches are leading the pack. According to CCS Insight, forecasts for global sales of smart wearable devices finance, energy, transportation, will grow strongly over the next five years, with the global public safety, retail and hospitality market reaching nearly $30 billion by 2023.1 are deploying smartwatches for While smartwatches for fitness and activity tracking are popular, consumer demand is only part of the equation. added business value. Enterprises are also seeing business value in wearable devices. In a report by Robert Half Technology, 81 percent of CIOs surveyed expect wearable devices like smartwatches to Samsung has been working to address these concerns and become common tools in the workplace.2 has developed the tools to make its Galaxy and Galaxy Active smartwatches customizable, easily manageable and highly secure for enterprise users. This white paper will look at how these tools address key wearable security and manageability challenges, as well as considerations for smartwatch 81% deployments. of CIOs surveyed expect wearable devices like smartwatches to become common tools in the workplace. Industries as varied as healthcare, finance, energy, transportation, public safety, retail and hospitality are deploying smartwatches for added business value, such as hands-free communication for maintenance workers, task management, as well as physical monitoring of field workers in dangerous or remote locations.
    [Show full text]
  • Threat Modeling Framework for Mobile Communication Systems
    Threat modeling framework for mobile communication systems Siddharth Prakash Rao Silke Holtmanns Tuomas Aura Aalto University Nokia-Bell Labs Aalto University Espoo, Finland Espoo, Finland Espoo, Finland siddharth:rao@aalto: silke:holtmanns@nokia-bell- tuomas:aura@aalto: labs:com ABSTRACT protocols, which evolved in a more open setup, security tools avail- Due to the complex nature of mobile communication systems, most able in the public domain for the laer are now used by hackers to of the security eorts in its domain are isolated and scaered across exploit the mobile networks [9]. underlying technologies. is has resulted in an obscure view of Despite the odds, mobile communication systems have under- the overall security. In this work, we aempt to x this problem gone a fair amount of scrutiny from the security research com- by proposing a domain-specic threat modeling framework. By munity. For example, internal components of a mobile device [71, gleaning from a diverse and large body of security literature, we 74, 101], radio communication between the phone and the cell systematically organize the aacks on mobile communications into towers[37, 162], and mobile core network protocols [55, 80, 122] various tactics and techniques. Our framework is designed to model have been tested for security-critical issues. All these isolated adversarial behavior in terms of its aack phases and to be used as research eorts are scaered across underlying protocols and tech- a common taxonomy matrix. We also provide concrete examples nologies, and, it has resulted in an obscure and complex view of mo- of using the framework for modeling the aacks individually and bile communication security.
    [Show full text]
  • Walgreens Photo Studio Software
    Walgreens photo studio software W Photo Studio (). W Photo Studio is both a simple photo editor and a tool to order prints, albums, and photo gifts online from the. This application's clear interface makes it very simple for any user to organize and enhance their photo collections. | eBay! Free Download and information on W Photo Studio - W Photo Studio is both a simple photo editor and a tool to order prints, albums, and photo gifts online from. Entertainment Software Rating Board The Walgreens Windows 8 App featuring Refill from Account and QuickPrints, makes your life easier. to refill your prescriptions PHOTO FEATURES • QuickPrints – Choose pictures from your .. Microsoft Visual Studio · Windows Dev Center · Microsoft Developer Network · TechNet. To copy the images from your Walgreens Photo CD to your computer, Drag and drop your images from the "Pictures" folder on the photo CD. W Photo Studio is a software program developed by Walgreens. The most common release is , with over 98% of all installations currently using this. Order online and pick up the same day at Walgreens. Print photos and create personalized photo books, photo cards, invitations and custom. - America's online pharmacy serving your needs for prescriptions, health & wellness products, health information and photo services. We offer several editing options on our photo site. Below is a list of the editing functions that we offer, as well as a description of each function, Missing: studio. If you need your photos printed pronto, Walgreens offers a viable option, but it's not the cheapest service and the print quality isn't the best.
    [Show full text]
  • Visualization and Exploration of Transcriptomics Data Nils Gehlenborg
    Visualization and Exploration of Transcriptomics Data 05 The identifier 800 year identifier Nils Gehlenborg Sidney Sussex College To celebrate our 800 year history an adaptation of the core identifier has been commissioned. This should be used on communications in the time period up to and including 2009. The 800 year identifier consists of three elements: the shield, the University of Cambridge logotype and the 800 years wording. It should not be redrawn, digitally manipulated or altered. The elements should not be A dissertation submitted to the University of Cambridge used independently and their relationship should for the degree of Doctor of Philosophy remain consistent. The 800 year identifier must always be reproduced from a digital master reference. This is available in eps, jpeg and gif format. Please ensure the appropriate artwork format is used. File formats European Molecular Biology Laboratory, eps: all professionally printed applications European Bioinformatics Institute, jpeg: Microsoft programmes Wellcome Trust Genome Campus, gif: online usage Hinxton, Cambridge, CB10 1SD, Colour United Kingdom. The 800 year identifier only appears in the five colour variants shown on this page. Email: [email protected] Black, Red Pantone 032, Yellow Pantone 109 and white October 12, 2010 shield with black (or white name). Single colour black or white. Please try to avoid any other colour combinations. Pantone 032 R237 G41 B57 Pantone 109 R254 G209 B0 To Maureen. This dissertation is my own work and contains nothing which is the outcome of work done in collaboration with others, except as specified in the text and acknowledgements. This dissertation is not substantially the same as any I have submit- ted for a degree, diploma or other qualification at any other university, and no part has already been, or is currently being submitted for any degree, diploma or other qualification.
    [Show full text]
  • Bringing 'Bee-Cological' Data to Life Through a Relational Database and an Interactive Visualization Tool By
    Bringing 'Bee-cological' Data to Life through a Relational Database and an Interactive Visualization Tool by Xiaojun Wang A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Master of Science in Bioinformatics and Computational Biology Aug 2018 APPROVED BY: Dr. Carolina Ruiz Dr. Robert J. Gegear Dr. Elizabeth F. Ryder 1 Abstract Over the past decade, bumblebees have rapidly declined in abundance and geographic distribution at an alarming rate, raising major social, economic and ecological concern worldwide. However, we presently lack effective bumblebee conservation strategies due to a lack of information on the specific ecological needs of each species. The ‘Beecology Project’ was created to fill this knowledge gap by utilizing citizen scientists to collect data on floral resource use patterns of foraging bees in naturally occurring mixed species communities across Massachusetts. In addition to its research goals, the Beecology Project also has the educational goal of providing a modular, integrated biology - computer science framework (a BIO-CS bridge) to assist teachers in developing curricula to meet the next generation biology and computer science standards at the high school level. The Beecology team has developed Android and Web mobile apps to assist citizen scientists to collect and submit field data on bumblebee and plant species interactions. Other Beecology team members also collected a substantial amount of bumblebee data through field research and online digital museum collections. However, there was no central location dedicated to the storage of such data. There was also no way for users such as researchers, educators, and the general public to access all of the collected data in an ecologically-meaningful way.
    [Show full text]