Smartphone Bookkeeping Agency Service and User Behaviors

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Service Platform for Logging and Analyzing Mobile User Behaviors

Quantitative analysis of user behavior calls for automated collection of large amount of log data over time. In this paper, we present a service platform for logging and analyzing mobile user behaviors. We have implemented a log collection service which records all user operations on the mobile unit. The collected data are transmitted to a remote server based on an energy-aware schedule. By pro...

متن کامل

Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors

In addition to storing a plethora of sensitive personal and work information, smartphones also store sensor data about users and their daily activities. In order to understand users’ behaviors and attitudes towards the security of their smartphone data, we conducted 28 qualitative interviews. We examined why users choose (or choose not) to employ locking mechanisms (e.g., PINs) and their percep...

متن کامل

User clustering in smartphone applications.

In the context of mobile health applications usability is a crucial factor to achieve user acceptance. The successful user interface (UI) design requires a deep understanding of the needs and requirements of the targeted audience. This paper explores the application of the K-Means algorithm on smartphone usage data in order to offer Human Computer Interaction (HCI) specialists a better insight ...

متن کامل

Delegate the smartphone user? Security awareness in smartphone platforms

Smartphone users increasingly download and install third-party applications from official application repositories. Attackers may use this centralized application delivery architecture as a security and privacy attack vector. This risk increases since application vetting mechanisms are often not in place and the user is delegated to authorize which functionality and protected resources are acce...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Korean Association Of Computers And Accounting

سال: 2018

ISSN: 1598-6896

DOI: 10.32956/kaoca.2018.16.2.45