Current Search: Smartphone (x)
View All Items
- Title
- DENIAL OF CONVENIENCE ATTACK TO SMARTPHONES USING A FAKE WI-FI ACCESS POINT.
- Creator
-
Dondyk, Erich, Zou, Cliff, University of Central Florida
- Abstract / Description
-
In this thesis, we consider a novel denial of service attack targeted at popular smartphone operating systems. This type of attack, which we call a Denial of Convenience (DoC) attack, prevents non-technical savvy victims from utilizing data services by exploiting the connectivity management protocol of smartphones' operating systems when encountered with a Wi-Fi access point. By setting up a fake Wi-Fi access point without Internet access (using simple devices such as a laptop), an adversary...
Show moreIn this thesis, we consider a novel denial of service attack targeted at popular smartphone operating systems. This type of attack, which we call a Denial of Convenience (DoC) attack, prevents non-technical savvy victims from utilizing data services by exploiting the connectivity management protocol of smartphones' operating systems when encountered with a Wi-Fi access point. By setting up a fake Wi-Fi access point without Internet access (using simple devices such as a laptop), an adversary can prompt a smartphone with enabled Wi-Fi features to automatically terminate a valid mobile broadband connection and connect to this fake Wi-Fi access point. This, as a result, prevents the targeted smartphone from having any type of Internet connection unless the victim is capable of diagnosing the problem and disabling the Wi-Fi features manually. For the majority of smartphone users that have little networking knowledge, this can be a challenging task. We demonstrate that most current smartphones, including iPhone and Android phones, are vulnerable to this DoC attack. To address this attack, we propose implementing a novel Internet-access validation protocol to validate a Wi-Fi access point by taking advantage of the cellular network channel. It first uses the cellular network to send a secret to an Internet validation server, and tries to retrieve this secret via the newly established Wi-Fi channel to validate the connection of the Wi-Fi channel.
Show less - Date Issued
- 2012
- Identifier
- CFH0004159, ucf:44838
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004159
- Title
- SPS: an SMS-based Push Service for Energy Saving in Smartphone's Idle State.
- Creator
-
Dondyk, Erich, Zou, Changchun, Chatterjee, Mainak, Hua, Kien, University of Central Florida
- Abstract / Description
-
Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in the smartphone, the cellular data and Wi-Fi interfaces often continue to be used even while the phone is in the idle state to accommodate unnecessary data traffic produced by some applications. In addition, bad reception has been proven to greatly increase energy consumed by the radio, which happens quite often when smartphone...
Show moreDespite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in the smartphone, the cellular data and Wi-Fi interfaces often continue to be used even while the phone is in the idle state to accommodate unnecessary data traffic produced by some applications. In addition, bad reception has been proven to greatly increase energy consumed by the radio, which happens quite often when smartphone users are inside buildings. In this paper, we present a Short message service Push based Service (SPS) to save unnecessary power consumption when smartphones are in idle state, especially in bad reception areas. First, SPS disables a smartphone's data interfaces whenever the phone is in idle state. Second, to preserve the real-time notification functionality required by some apps, such as new email arrivals and social media updates, when a notification is needed, a wakeup text message will be received by the phone, and then SPS enables the phone's data interfaces to connect to the corresponding server to retrieve notification data via the normal data network. Once the notification data has been retrieved, SPS will disable the data interfaces again if the phone is still in idle state. We have developed a complete prototype for Android smartphones. Our experiments show that SPS consumes less energy than the current approach. In areas with bad reception, the SPS prototype can double the battery life of a smartphone.
Show less - Date Issued
- 2014
- Identifier
- CFE0005157, ucf:50718
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005157
- Title
- THE CONSTITUTIONALITY OF WARRANTLESS CELL PHONE SEARCHES INCIDENT TO ARREST.
- Creator
-
Brown, Kylie, Bast, Carol, University of Central Florida
- Abstract / Description
-
As technology has developed, Americans have come to carry their most private information around with them in their pockets in digital form on their cell phones. A cell phone has immense storage capacity and can contain a wide variety of communicative information about its owner. In the past, there had been a disagreement among the lower courts as to whether police officers could search the contents of an arrestee's cell phone when making an arrest. The United States Supreme Court settled this...
Show moreAs technology has developed, Americans have come to carry their most private information around with them in their pockets in digital form on their cell phones. A cell phone has immense storage capacity and can contain a wide variety of communicative information about its owner. In the past, there had been a disagreement among the lower courts as to whether police officers could search the contents of an arrestee's cell phone when making an arrest. The United States Supreme Court settled this disagreement in Riley v. California; in that case, the Court held that the warrantless search of a cell phone incident to arrest violated the Fourth Amendment to the United States Constitution. This thesis discusses case law that preceded the United States Supreme Court case Riley v. California, that decision, and possible ramifications of that decision.
Show less - Date Issued
- 2014
- Identifier
- CFH0004698, ucf:45237
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004698
- Title
- THE USE OF MOBILE APPLICATIONS IN PREVENTIVE CARE AND HEALTH-RELATED CONDITIONS: A REVIEW OF THE LITERATURE.
- Creator
-
Ringer, Naomi, D'Amato-Kubiet, Leslee, University of Central Florida
- Abstract / Description
-
The purpose of this review of literature was to understand the role of mobile device applications in health related conditions and to analyze their effects on health outcomes related to the management of chronic illnesses. Implications for future use of applications in client-centered care and interpretation of the data by health care providers was also explored. Peer-reviewed, English-language research articles published from 2008 to present were included for synthesis. Study results...
Show moreThe purpose of this review of literature was to understand the role of mobile device applications in health related conditions and to analyze their effects on health outcomes related to the management of chronic illnesses. Implications for future use of applications in client-centered care and interpretation of the data by health care providers was also explored. Peer-reviewed, English-language research articles published from 2008 to present were included for synthesis. Study results revealed positive outcomes when health-related mobile applications were used in practice and support clinicians' use of mobile applications as a tool for monitoring symptoms and communicating with individuals. The literature indicated nurses play a significant role in providing feedback, which reinforces self-care strategies and adherence, with the potential for improving outcomes. Additional research is needed to evaluate the long-term effects of applications on patient outcomes, nurses' perspectives, and feasibility of implementation into practice.
Show less - Date Issued
- 2014
- Identifier
- CFH0004660, ucf:45280
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004660
- Title
- EDUCATIONAL HANDHELD VIDEO: EXAMINING SHOT COMPOSITION, GRAPHIC DESIGN, AND THEIR IMPACT ON LEARNING.
- Creator
-
Hutchens, Jason, Taylor, Rosemarye, University of Central Florida
- Abstract / Description
-
Formal features of video such as shot composition and graphic design can weigh heavily on the success or failure of educational videos. Many studies have assessed the proper use of these techniques given the psychological expectations that viewers have for video programming (Hawkins et al., 2002; Kenny, 2002; Lang, Zhou, Schwardtz, Bolls, & Potter, 2000; McCain, Chilberg, & Wakshlag, 1977; McCain & Repensky, 1972; Miller, 2005; Morris, 1984; Roe, 1998; Schmitt, Anderson, & Collins, 1999;...
Show moreFormal features of video such as shot composition and graphic design can weigh heavily on the success or failure of educational videos. Many studies have assessed the proper use of these techniques given the psychological expectations that viewers have for video programming (Hawkins et al., 2002; Kenny, 2002; Lang, Zhou, Schwardtz, Bolls, & Potter, 2000; McCain, Chilberg, & Wakshlag, 1977; McCain & Repensky, 1972; Miller, 2005; Morris, 1984; Roe, 1998; Schmitt, Anderson, & Collins, 1999; Sherman & Etling, 1991; Tannenbaum & Fosdick, 1960; Wagner, 1953). This study examined formal features within the context of the newly emerging distribution method of viewing video productions on mobile handheld devices. Shot composition and graphic design were examined in the context of an educational video to measure whether or not they had any influence on user perceptions of learning and learning outcomes. The two formal features were modified for display on 24 inch screens and on 3.5 inch or smaller screens. Participants were shown one of the four modified treatments, then presented with a test to measure whether or not the modified formal features had any impact or influence on learning outcomes from a sample of 132 undergraduate college students. No significant differences were found to occur as a result of manipulation of formal features between the treatment groups.
Show less - Date Issued
- 2008
- Identifier
- CFE0002371, ucf:47797
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002371
- Title
- INTERVENTIONS FOR CHILDHOOD OBESITY: EVALUATING TECHNOLOGICAL APPLICATIONS TARGETING PHYSICAL ACTIVITY LEVEL AND DIET.
- Creator
-
DiPietro, Jessica, Norris, Anne, University of Central Florida
- Abstract / Description
-
Overweight and obese children have increased risks for multiple preventable diseases and conditions which can impair their physiological health and significantly increases the overall cost of their healthcare. Free mobile applications and technology for weight loss, dietary tracking, and physical activity may be quite useful for monitoring nutritional intake and exercise to facilitate weight loss. If so, nurses are well positioned to recommend such tools as part of their efforts to prevent...
Show moreOverweight and obese children have increased risks for multiple preventable diseases and conditions which can impair their physiological health and significantly increases the overall cost of their healthcare. Free mobile applications and technology for weight loss, dietary tracking, and physical activity may be quite useful for monitoring nutritional intake and exercise to facilitate weight loss. If so, nurses are well positioned to recommend such tools as part of their efforts to prevent childhood obesity and help children and parents better manage childhood obesity when it is present. However, there are no guidelines that nurses can use to determine what applications or technologies are most beneficial to children and their parents. The purpose of this project is to develop such guidelines based on a review of the scientific literature published in the last 5 years. Articles regarding healthy-lifestyle promoting mobile applications and technological approaches to health and fitness interventions were identified by searching articles indexed by CINAHL, Psychinfo, Medline, ERIC, IEEE Xplore, and Academic Search Premier. Identified articles were assessed using Melnyk's hierarchy of evidence and organized into tables so that implications for research and suggestions for practice could be made.
Show less - Date Issued
- 2014
- Identifier
- CFH0004616, ucf:45255
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004616
- Title
- Designing Calorie Counter Smartphone Applications for Effective Weight Loss.
- Creator
-
Milliard, Sharlin, Fanfarelli, Joseph, Bockelman, Patricia, Hartshorne, Richard, University of Central Florida
- Abstract / Description
-
Poor dietary choices and lack of physical activity are two main contributing factors for the increasing prevalence of overweight and obesity in the United States. Overweight and obese individuals are at risk for developing major life-threatening diseases. Weight loss is an effective means for reversing these adverse health effects, and smartphone applications (apps) may be an effective means for supporting weight loss outside of formal clinical settings. This study involved identifying...
Show morePoor dietary choices and lack of physical activity are two main contributing factors for the increasing prevalence of overweight and obesity in the United States. Overweight and obese individuals are at risk for developing major life-threatening diseases. Weight loss is an effective means for reversing these adverse health effects, and smartphone applications (apps) may be an effective means for supporting weight loss outside of formal clinical settings. This study involved identifying factors that contribute to effective weight loss to compare with functionality commonly found in a sample of calorie counter apps. A content analysis was performed using a design framework that included a conceptual model describing the interaction of behaviors for effective weight loss and functional design requirements based upon behavior change and motivation to achieve weight loss. The requirements were used to analyze the presence of features in a sample of popular calorie counting apps, to infer their capability in supporting users' motivation to achieve weight loss. Results indicated that app features might not provide sufficient support to facilitate effective weight loss. Lack of supportive features affects perceived autonomy, relatedness, and competence, reducing motivation. This study provided guidelines to improve the design of calorie counter apps to include more features that support users as they engage in weight loss behaviors. The guidelines may become practical for use in mHealth apps used as part of formal and informal weight management strategies. Implications for future research involving wearable technologies and the use of gamified design strategies are discussed.
Show less - Date Issued
- 2019
- Identifier
- CFE0007838, ucf:52824
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007838
- Title
- Data-Driven Simulation Modeling of Construction and Infrastructure Operations Using Process Knowledge Discovery.
- Creator
-
Akhavian, Reza, Behzadan, Amir, Oloufa, Amr, Yun, Hae-Bum, Sukthankar, Gita, Zheng, Qipeng, University of Central Florida
- Abstract / Description
-
Within the architecture, engineering, and construction (AEC) domain, simulation modeling is mainly used to facilitate decision-making by enabling the assessment of different operational plans and resource arrangements, that are otherwise difficult (if not impossible), expensive, or time consuming to be evaluated in real world settings. The accuracy of such models directly affects their reliability to serve as a basis for important decisions such as project completion time estimation and...
Show moreWithin the architecture, engineering, and construction (AEC) domain, simulation modeling is mainly used to facilitate decision-making by enabling the assessment of different operational plans and resource arrangements, that are otherwise difficult (if not impossible), expensive, or time consuming to be evaluated in real world settings. The accuracy of such models directly affects their reliability to serve as a basis for important decisions such as project completion time estimation and resource allocation. Compared to other industries, this is particularly important in construction and infrastructure projects due to the high resource costs and the societal impacts of these projects. Discrete event simulation (DES) is a decision making tool that can benefit the process of design, control, and management of construction operations. Despite recent advancements, most DES models used in construction are created during the early planning and design stage when the lack of factual information from the project prohibits the use of realistic data in simulation modeling. The resulting models, therefore, are often built using rigid (subjective) assumptions and design parameters (e.g. precedence logic, activity durations). In all such cases and in the absence of an inclusive methodology to incorporate real field data as the project evolves, modelers rely on information from previous projects (a.k.a. secondary data), expert judgments, and subjective assumptions to generate simulations to predict future performance. These and similar shortcomings have to a large extent limited the use of traditional DES tools to preliminary studies and long-term planning of construction projects.In the realm of the business process management, process mining as a relatively new research domain seeks to automatically discover a process model by observing activity records and extracting information about processes. The research presented in this Ph.D. Dissertation was in part inspired by the prospect of construction process mining using sensory data collected from field agents. This enabled the extraction of operational knowledge necessary to generate and maintain the fidelity of simulation models. A preliminary study was conducted to demonstrate the feasibility and applicability of data-driven knowledge-based simulation modeling with focus on data collection using wireless sensor network (WSN) and rule-based taxonomy of activities. The resulting knowledge-based simulation models performed very well in properly predicting key performance measures of real construction systems. Next, a pervasive mobile data collection and mining technique was adopted and an activity recognition framework for construction equipment and worker tasks was developed. Data was collected using smartphone accelerometers and gyroscopes from construction entities to generate significant statistical time- and frequency-domain features. The extracted features served as the input of different types of machine learning algorithms that were applied to various construction activities. The trained predictive algorithms were then used to extract activity durations and calculate probability distributions to be fused into corresponding DES models. Results indicated that the generated data-driven knowledge-based simulation models outperform static models created based upon engineering assumptions and estimations with regard to compatibility of performance measure outputs to reality.
Show less - Date Issued
- 2015
- Identifier
- CFE0006023, ucf:51014
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006023
- Title
- BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES.
- Creator
-
Berrios-Ayala, Mark, Milon, Abby, University of Central Florida
- Abstract / Description
-
Imagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM...
Show moreImagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters' (GCHQ) mass shadowing sharing plan to America's Russian inspiration, SORM. Some countries are following the United States' poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation's strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today's blurred privacy expectations.
Show less - Date Issued
- 2014
- Identifier
- CFH0004537, ucf:45187
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004537