Current Search: android (x)
-
-
Title
-
Providing Context to the Clues: Recovery and Reliability of Location Data from Android Devices.
-
Creator
-
Bell, Connie, Lang, Sheau-Dong, Guha, Ratan, Zou, Changchun, University of Central Florida
-
Abstract / Description
-
Mobile device data continues to increase in significance in both civil and criminal investigations. Location data is often of particular interest. To date, research has established that the devices are location aware, incorporate a variety of resources to obtain location information, and cache the information in various ways. However, a review of the existing research suggests varying degrees of reliability of any such recovered location data. In an effort to clarify the issue, this project...
Show moreMobile device data continues to increase in significance in both civil and criminal investigations. Location data is often of particular interest. To date, research has established that the devices are location aware, incorporate a variety of resources to obtain location information, and cache the information in various ways. However, a review of the existing research suggests varying degrees of reliability of any such recovered location data. In an effort to clarify the issue, this project offers case studies of multiple Android mobile devices utilized in controlled conditions with known settings and applications in documented locations. The study uses data recovered from test devices to corroborate previously identified accuracy trends noted in research involving live-tracked devices, and it further offers detailed analysis strategies for the recovery of location data from devices themselves. A methodology for reviewing device data for possible artifacts that may allow an examiner to evaluate location data reliability is also presented. This paper also addresses emerging trends in device security and cloud storage, which may have significant implications for future mobile device location data recovery and analysis. Discussion of recovered cloud data introduces a distinct and potentially significant resource for investigators, and the paper addresses the cloud resources' advantages and limitations.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005924, ucf:50837
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005924
-
-
Title
-
Examining Users' Application Permissions On Android Mobile Devices.
-
Creator
-
Safi, Muhammad, Wisniewski, Pamela, Leavens, Gary, Hughes, Charles, University of Central Florida
-
Abstract / Description
-
Mobile devices have become one of the most important computing platforms. The platform's portability and highly customized nature raises several privacy concerns. Therefore, understanding and predicting user privacy behavior has become very important if one is to design software which respects the privacy concerns of users. Various studies have been carried out to quantify user perceptions and concerns [23,36] and user characteristics which may predict privacy behavior [21,22,25]. Even though...
Show moreMobile devices have become one of the most important computing platforms. The platform's portability and highly customized nature raises several privacy concerns. Therefore, understanding and predicting user privacy behavior has become very important if one is to design software which respects the privacy concerns of users. Various studies have been carried out to quantify user perceptions and concerns [23,36] and user characteristics which may predict privacy behavior [21,22,25]. Even though significant research exists regarding factors which affect user privacy behavior, there is gap in the literature when it comes to correlating these factors to objectively collected data from user devices. We designed an Android application which administered surveys to collect various perceived measures, and to scrape past behavioral data from the phone. Our goal was to discover variables which help in predicting user location sharing decisions by correlating what we collected from surveys with the user's decision to share their location with our study application. We carried out logistic regression analysis with multiple measured variables and found that perceived measures and past behavioral data alone were poor predictors of user location sharing decisions. Instead, we discovered that perceived measures in the context of past behavior helped strengthen prediction models. Asking users to reflect on whether they were comfortable sharing their location with apps that were already installed on their mobile device was a stronger predictor of location sharing behavior than general measures regarding privacy concern or past behavioral data scraped from their phones. This work contributes to the field by correlating existing privacy measures with objective data, and uncovering a new predictor of location sharing decisions.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007363, ucf:52085
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007363
-
-
Title
-
Learning Opportunities and Challenges of Sensor-enabled Intelligent Tutoring Systems on Mobile Platforms: Benchmarking the Reliability of Mobile Sensors to Track Human Physiological Signals and Behaviors to Enhance Tablet-Based Intelligent Tutoring Systems.
-
Creator
-
Vazquez, Luis, Proctor, Michael, Jentsch, Florian, Gonzalez, Avelino, Sottilare, Robert, University of Central Florida
-
Abstract / Description
-
Desktop-based intelligent tutoring systems have existed for many decades, but the advancement of mobile computing technologies has sparked interest in developing mobile intelligent tutoring systems (mITS). Personalized mITS are applicable to not only stand-alone and client-server systems but also cloud systems possibly leveraging big data. Device-based sensors enable even greater personalization through capture of physiological signals during periods of student study. However, personalizing...
Show moreDesktop-based intelligent tutoring systems have existed for many decades, but the advancement of mobile computing technologies has sparked interest in developing mobile intelligent tutoring systems (mITS). Personalized mITS are applicable to not only stand-alone and client-server systems but also cloud systems possibly leveraging big data. Device-based sensors enable even greater personalization through capture of physiological signals during periods of student study. However, personalizing mITS to individual students faces challenges. The Achilles heel of personalization is the feasibility and reliability of these sensors to accurately capture physiological signals and behavior measures.This research reviews feasibility and benchmarks reliability of basic mobile platform sensors in various student postures. The research software and methodology are generalizable to a range of platforms and sensors. Incorporating the tile-based puzzle game 2048 as a substitute for a knowledge domain also enables a broad spectrum of test populations. Baseline sensors include the on-board camera to detect eyes/faces and the Bluetooth Empatica E4 wristband to capture heart rate, electrodermal activity (EDA), and skin temperature. The test population involved 100 collegiate students randomly assigned to one of three different ergonomic positions in a classroom: sitting at a table, standing at a counter, or reclining on a sofa. Well received by the students, EDA proved to be more reliable than heart rate or face detection in the three different ergonomic positions. Additional insights are provided on advancing learning personalization through future sensor feasibility and reliability studies.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007260, ucf:52177
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007260
-
-
Title
-
Physiological Reactions to Uncanny Stimuli: Substantiation of Self-Assessment and Individual Perception in User Enjoyment and Comfort.
-
Creator
-
Ballion, Tatiana, Sims, Valerie, Chin, Matthew, Jones, Donald, University of Central Florida
-
Abstract / Description
-
There is abundant anecdotal evidence substantiating Mori's initial observation of the "uncanny valley", a point at which human response to non-human entities drops sharply with respect to comfort (Mori, 1970), and the construct itself has a long-standing history in both Robotics and Psychology. Currently, many fields such as design, training, entertainment, and education make use of heuristic approaches to accommodate the anticipated needs of the user/consumer/audience in certain important...
Show moreThere is abundant anecdotal evidence substantiating Mori's initial observation of the "uncanny valley", a point at which human response to non-human entities drops sharply with respect to comfort (Mori, 1970), and the construct itself has a long-standing history in both Robotics and Psychology. Currently, many fields such as design, training, entertainment, and education make use of heuristic approaches to accommodate the anticipated needs of the user/consumer/audience in certain important aspects. This is due to the lack of empirical substantiation or, in some cases, the impossibility of rigorous quantification; one such area is with respect to the user's experience of uncanniness, a feeling of "eeriness" or "wrongness" when interacting with artefacts or environments. Uncanniness, however, continues to be defined and measured in a largely subjective way, and often after the fact; an experience or product's uncanny features are pointed out after the item has been markedly avoided or complained about by the general public. These studies are among the first seeking to determine a constellation of personality traits and physiological responses that incline the user to have a more frequent or profound (")uncanny" reaction when presented with stimuli meeting the criteria for a level of "eeriness". In study 1, 395 adults were asked to categorize 200 images as uncanny, neutral, pleasant, or other. In Study 2, physiological and eye-tracking data was collected from twenty two adults as they viewed uncanny, neutral and pleasant images culled from study 1. This research identifies components of the uncanny valley related to subjective assessment, personality factors (using the HEXACO and Anthropomorphic Tendencies Scale), and biophysical measures, and found that traits unique to Emotionality on the HEXACO inventory, compounded with a form of anthropomorphism demonstrates a level of relationship to the subjective experience of uncanny stimuli. There is evidence that HEXACO type and forms of anthropomorphic perception mediates the biophysical expression and the subjective perception of the stimuli. In keeping with psychological hypotheses, stimuli to which the participants had greatest response centered on death, the threat of death, or mismatched/absent facial features.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004354, ucf:49454
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004354
-
-
Title
-
BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES.
-
Creator
-
Berrios-Ayala, Mark, Milon, Abby, University of Central Florida
-
Abstract / Description
-
Imagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM...
Show moreImagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters' (GCHQ) mass shadowing sharing plan to America's Russian inspiration, SORM. Some countries are following the United States' poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation's strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today's blurred privacy expectations.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFH0004537, ucf:45187
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004537