scispace - formally typeset
Search or ask a question

Showing papers on "Mobile technology published in 2011"


Proceedings ArticleDOI
10 Apr 2011
TL;DR: The design and implementation of CloneCloud is presented, a system that automatically transforms mobile applications to benefit from the cloud that enables unmodified mobile applications running in an application-level virtual machine to seamlessly off-load part of their execution from mobile devices onto device clones operating in a computational cloud.
Abstract: Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity with more powerful machines ranging from laptops and desktops to commercial clouds. This paper presents the design and implementation of CloneCloud, a system that automatically transforms mobile applications to benefit from the cloud. The system is a flexible application partitioner and execution runtime that enables unmodified mobile applications running in an application-level virtual machine to seamlessly off-load part of their execution from mobile devices onto device clones operating in a computational cloud. CloneCloud uses a combination of static analysis and dynamic profiling to partition applications automatically at a fine granularity while optimizing execution time and energy use for a target computation and communication environment. At runtime, the application partitioning is effected by migrating a thread from the mobile device at a chosen point to the clone in the cloud, executing there for the remainder of the partition, and re-integrating the migrated thread back to the mobile device. Our evaluation shows that CloneCloud can adapt application partitioning to different environments, and can help some applications achieve as much as a 20x execution speed-up and a 20-fold decrease of energy spent on the mobile device.

2,054 citations


Journal ArticleDOI
TL;DR: Current theories appear inadequate to inform mobile intervention development as these interventions become more interactive and adaptive, and Dynamic feedback system theories of health behavior can be developed utilizing longitudinal data from mobile devices and control systems engineering models.
Abstract: Mobile technologies are being used to deliver health behavior interventions. The study aims to determine how health behavior theories are applied to mobile interventions. This is a review of the theoretical basis and interactivity of mobile health behavior interventions. Many of the mobile health behavior interventions reviewed were predominately one way (i.e., mostly data input or informational output), but some have leveraged mobile technologies to provide just-in-time, interactive, and adaptive interventions. Most smoking and weight loss studies reported a theoretical basis for the mobile intervention, but most of the adherence and disease management studies did not. Mobile health behavior intervention development could benefit from greater application of health behavior theories. Current theories, however, appear inadequate to inform mobile intervention development as these interventions become more interactive and adaptive. Dynamic feedback system theories of health behavior can be developed utilizing longitudinal data from mobile devices and control systems engineering models.

929 citations


Journal ArticleDOI
TL;DR: An overview of smartphone use in behavioral health care is provided and options for integrating mobile technology into clinical practice are discussed and limitations, practical issues, and recommendations are discussed.
Abstract: The rapid growth in the use of smartphones has opened a new world of opportunities for use in behavioral health care. Mobile phone software applications (apps) are available for a variety of useful tasks to include symptom assessment, psychoeducation, resource location, and tracking of treatment progress. The latest two-way communication functionality of smartphones also brings new capabilities for telemental health. There is very little information available, however, regarding the integration of smartphone and other mobile technology into care. In this paper, we provide an overview of smartphone use in behavioral health care and discuss options for integrating mobile technology into clinical practice. We also discuss limitations, practical issues, and recommendations.

749 citations


Journal ArticleDOI
TL;DR: The results indicate that perceived relative advantage, ease of use, compatibility, competence and integrity significantly influence attitude, which in turn lead to behavioral intention to adopt (or continue-to-use) mobile banking.

740 citations


Proceedings ArticleDOI
15 May 2011
TL;DR: In this survey, the energy consuming entities of a mobile device such as wireless air interfaces, display, mp3 player and others are measured and compared and allow the reader to understand what the energy hungry parts of aMobile device are and use those findings for the design of future mobile protocols and applications.
Abstract: The full degree of freedom in mobile systems heavily depends on the energy provided by the mobile phone's batteries. Their capacity is in general limited and for sure not keeping pace as the mobile devices are crammed up with new functionalities. The discrepancy of Moore's law, offering twice the processing power at least each second year, and the development in batteries, which did not even double over the last decade, makes a shift in researchers' way of designing networks, protocols, and the mobile device itself. The bottleneck to take care of in the design process of mobile systems is not only the wireless data rate, but even more the energy limitation as the customers ask for new energy-hungry services, e.g., requiring faster connections or even multiple air interfaces, and longer standby or operational times of their mobile devices at the same time. In this survey, the energy consuming entities of a mobile device such as wireless air interfaces, display, mp3 player and others are measured and compared. The presented measurement results allow the reader to understand what the energy hungry parts of a mobile device are and use those findings for the design of future mobile protocols and applications. All results presented in this work and further results are made public on our web page [2].

337 citations


Journal ArticleDOI
TL;DR: In this paper, three groups participated in a study on the added value of mobile technology for learning English as a second language for primary school students, and the results indicated that students are motivated to use the application in their spare time and that this benefits their learning.
Abstract: Three groups participated in a study on the added value of mobile technology for learning English as a second language for primary school students. The first group had classroom lessons in English about zoo animals and their characteristics. The second group took classroom lessons and worked with a mobile application on location in a public zoo. The third group received the same treatment as the second but, as an extension, was allowed to take the mobile application home for a fortnight. A pre- and a posttest were conducted to measure the individual change in mastery of a set of targeted English words. The results showed that the group which took the mobile phone home improved the most. However, when the additional learning time, spent apart from school, of this third group was controlled for, the superior performance of the group disappeared. The results indicate that students are motivated to use the application in their spare time and that this benefits their learning. The conclusion is that formal school learning can be augmented by learning in an informal context, away from school.

307 citations


Patent
18 Nov 2011
TL;DR: In particular, a mobile device management system allows network administrators to control the distribution and publication of applications to mobile device users in an enterprise network as mentioned in this paper, which is similar to our approach.
Abstract: In particular implementations, a mobile device management system allows network administrators to control the distribution and publication of applications to mobile device users in an enterprise network.

305 citations


Book
02 Dec 2011
TL;DR: This book discusses the pathways of Locative Media, the ethics of Immersion in Locative Games, and the politics of Mobility in the age of smartphones.
Abstract: In this updated second edition, Jason Farman offers a groundbreaking look at how location-aware mobile technologies are radically shifting our sense of identity, community, and place-making practices. Mobile Interface Theory is a foundational book in mobile media studies, with the first edition winning the Book of the Year Award from the Association of Internet Researchers. It explores a range of mobile media practices from interface design to maps, AR/VR, mobile games, performances that use mobile devices, and mobile storytelling projects. Throughout, Farman provides readers with a rich theoretical framework to understand the ever-transforming landscape of mobile media and how they shape our bodily practices in the spaces we move through. This fully updated second edition features updated examples throughout, reflecting the shifts in mobile technology. This is the ideal text for those studying mobile media, social media, digital media, and mobile storytelling.

284 citations


Journal ArticleDOI
TL;DR: The basic elements and characteristic of mobile learning according to new trends in developing technology are described to better understand the underlying motivations that lead academics to adopting mobile learning elements and characteristics.

260 citations


Journal ArticleDOI
TL;DR: Technological devices used in mobile learning and communication technologies are studied, and the relation and differences between m-learning and e-learning are put forth with their details.

227 citations


Patent
18 Mar 2011
TL;DR: In this paper, the authors present a method, a mobile device, and a distributed security system that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet).
Abstract: The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.

Proceedings ArticleDOI
22 May 2011
TL;DR: This survey paper provides a concise overview of mobile network security, attack vectors using the back end system and the web browser, but also the hardware layer and the user as attack enabler.
Abstract: We are currently moving from the Internet society to a mobile society where more and more access to information is done by previously dumb phones. For example, the number of mobile phones using a full blown OS has risen to nearly200% from Q3/2009 to Q3/2010. As a result, mobile security is no longer immanent, but imperative. This survey paper provides a concise overview of mobile network security, attack vectors using the back end system and the web browser, but also the hardware layer and the user as attack enabler. We show differences and similarities between "normal" security and mobile security, and draw conclusions for further research opportunities in this area.

Patent
19 Jul 2011
TL;DR: In this article, a method and system for mobile commerce, communication, and transaction processing to real-world POS, web, e-commerce, virtual terminal, mobile personal digital assistant, mobile phone, mobile device, or other computer based transactions involving either one or both financial and non-financial such as loyalty based transactions as a mobile payment system is described.
Abstract: A method and system for mobile commerce, communication, and transaction processing to real-world POS, web, e-commerce, virtual terminal, mobile personal digital assistant, mobile phone, mobile device, or other computer based transactions involving either one or both financial and non-financial such as loyalty based transactions as a mobile payment system is described. One embodiment comprises using a mobile phone via a consumer mobile software application (CMA) in lieu of a consumer card (examples include physical, virtual, or chips) to conduct payment transactions in the Real or Virtual World of commerce. An embodiment is related to making payments to real-world stores via having the CMA on a mobile device on behalf of the consumer present to conduct transactions and no physical card required.

Journal ArticleDOI
TL;DR: The results show that use context is the strongest predictor of mobile game adoption, and the formation of people's perceptions about mobile gaming is conditional and based on the special consideration of certain use contexts.

Patent
22 Dec 2011
TL;DR: In this article, a three-way trust relationship between a mobile device, Internet-connected vehicle system, and a cloud-based service is established between the mobile device and the vehicle.
Abstract: A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle system, such that the mobile device can securely connect to, and obtain status information and/or control the Internet-connected vehicle system, through the cloud-based service.

Journal Article
TL;DR: This study is a review of m-learning literature for understanding and discussion of current perspectives and theories in mobile learning.
Abstract: Mobile learning (m-learning) is a highly popular multidisciplinary study field around the world. It has attracted a great deal of attention from researchers in different disciplines who have realized the potential to apply mobile technologies to enchance learning. Thus, mobile learning has been defined differently by different people. This study is a review of m-learning literature for understanding and discussion of current perspectives and theories in mobile learning. Additionally, some m-learning practices that are implemented in different sectors such as corporate, university and military have been mentioned.

Journal ArticleDOI
TL;DR: The large gap between availability of mobile apps and their use in alcohol treatment programs indicates several important future directions for research.
Abstract: Background Interactive and mobile technologies (i.e., smartphones such as Blackberries, iPhones, and palm-top computers) show promise as an efficacious and cost-effective means of communicating health-behavior risks, improving public health outcomes, and accelerating behavior change (Abroms and Maibach, 2008). The present study was conducted as a “needs assessment” to examine the current available mobile smartphone applications (e.g., apps) that utilize principles of ecological momentary assessment (EMA) -- daily self-monitoring or near real-time self-assessment of alcohol use behavior -- to promote positive behavior change, alcohol harm reduction, psycho-education about alcohol use, or abstinence from alcohol.

Patent
James Kai Yu Lau1, John Bruno1
19 Jul 2011
TL;DR: In this paper, a method for selecting one or more mobile device applications using context data describing the current environment of a mobile device and application metadata describing environment conditions where applications are more likely to be relevant, in order to improve the experience of discovering, downloading, and installing mobile devices applications is described.
Abstract: Apparatus and methods are disclosed for selecting one or more mobile device applications using context data describing the current environment of a mobile device and application metadata describing environment conditions where applications are more likely to be relevant, in order to improve the experience of discovering, downloading, and installing mobile device applications. According to one embodiment, a method comprises associating metadata with mobile device applications automatically receiving context data representing a current geographical location from a mobile phone, searching the metadata to determine which applications are likely of interest based on the current geographical location, and transmitting notification data to the mobile phone indicating the determined applications.

Journal ArticleDOI
01 Apr 2011
TL;DR: This paper draws on the experiences with Mentira the first place-based, augmented reality mobile game for learning Spanish in a local neighborhood in the Southwestern United States to explore both the complexities and benefits of integrating mobile games in second and foreign language learning contexts.
Abstract: This paper builds on the emerging body of research aimed at exploring the educational potential of mobile technologies, specifically, how to leverage place-based, augmented reality mobile games for language learning. We draw on our experiences with Mentira the first place-based, augmented reality mobile game for learning Spanish in a local neighborhood in the Southwestern United States to explore both the complexities and benefits of integrating mobile games in second and foreign language learning contexts. We first discuss relevant background issues and then describe the Mentira project, including an exploration of the setting, narrative, gameplay, and curriculum. This is followed by a discussion of initial findings and future goals. We address gameplay, the importance of 'place' for language learning, and the role of student buy-in. The paper concludes with future considerations for the continued use of mobile games projects for language learning as well as other disciplines.

Patent
01 Jul 2011
TL;DR: In this article, the authors described a method of access control for a mobile computing device having a touch-screen, the method comprising: receiving a signal indicating an input applied to the touch screen; matching the signal against a library of signal characteristics to identify a user of the mobile computing devices from a group of users of the device; receiving an additional input to the mobile devices; using both the signal and the additional input in order to authenticate the user; and if authenticated, allowing access to the device in accordance with configuration data for the authenticated user.
Abstract: This is described a method of access control for a mobile computing device having a touch-screen, the method comprising: receiving a signal indicating an input applied to the touch-screen; matching the signal against a library of signal characteristics to identify a user of the mobile computing device from a group of users of the mobile computing device; receiving an additional input to the mobile computing device; using both the signal and the additional input to authenticate the user; and if authenticated, allowing access to the mobile computing device in accordance with configuration data for the authenticated user.

Proceedings ArticleDOI
16 May 2011
TL;DR: This paper survey's recent Mobile Cloud Computing architecture, application partition & offloading, and context-aware service, and a concept model has been proposed to analyze related research work.
Abstract: The rapid development of mobile computing and cloud computing trigger novel computing paradigm-----Mobile Cloud Computing. This paper review current research effort towards Mobile Computing. First, we present several challenges for the design of Mobile Cloud Computing service. Second, a concept model has been proposed to analyze related research work. Third, we survey recent Mobile Cloud Computing architecture, application partition & offloading, and context-aware service.

Journal ArticleDOI
TL;DR: It is argued that common assumptions made about location-aware mobile media, namely their ability to increase one’s spatial awareness and to encourage one to meet more people in public spaces, might be fallacious due to pre-existing practices of sociability in the city.
Abstract: Location-aware mobile media allow users to see their locations on a map on their mobile phone screens. These applications either disclose the physical positions of known friends, or represent the locations of groups of unknown people. We call these interfaces eponymous and anonymous, respectively. This article presents our classification of eponymous and anonymous location-aware interfaces by investigating how these applications may require us to rethink our understanding of urban sociability, particularly how we coordinate and communicate in public spaces. We argue that common assumptions made about location-aware mobile media, namely their ability to increase one’s spatial awareness and to encourage one to meet more people in public spaces, might be fallacious due to pre-existing practices of sociability in the city. We explore these issues in the light of three bodies of theory: Goffman’s presentation of self in everyday life, Simmel’s ideas on sociability, and Lehtonen and Maenpaa’s concept of street ...

Journal ArticleDOI
TL;DR: With mobilized lessons, students were found to learn science in personal, deep and engaging ways as well as developed positive attitudes towards mobile learning.
Abstract: This paper presents the findings of a research project in which we transformed a primary (grade) 3 science curriculum for delivery via mobile technologies, and a teacher enacted the lessons over the 2009 academic year in a class in a primary school in Singapore. The students had a total of 21 weeks of the mobilized lessons in science, which were co-designed by teachers and researchers by tapping into the affordances of mobile technologies for supporting inquiry learning in and outside of class. We examine the learning effectiveness of the enacted mobilized science curriculum. The results show that among the six mixed-ability classes in primary (grade) 3 in the school, the experimental class performed better than other classes as measured by traditional assessments in the science subject. With mobilized lessons, students were found to learn science in personal, deep and engaging ways as well as developed positive attitudes towards mobile learning.

Patent
30 Sep 2011
TL;DR: In this paper, the authors describe techniques for unlocking certain functionality of a mobile computing device upon wirelessly detecting that an external device is in relatively close proximity to the mobile computing devices.
Abstract: In general, this disclosure describes techniques for unlocking certain functionality of a mobile computing device upon wirelessly detecting that an external device is in relatively close proximity to the mobile computing device. One example method comprises: providing a phone application and a second, different application; initiating a first mode of operation when the mobile computing device becomes locked; prohibiting user access to the second application during the first mode of operation when the mobile computing device fails to wirelessly detect a presence of an external device; and initiating a second mode of operation when the mobile computing device wirelessly detects the presence of the external device and when the mobile computing device has received user input specifying an access password, wherein the mobile computing device allows complete user access to both the phone application and the second application during the second mode of operation.

Journal ArticleDOI
TL;DR: This paper begins by considering some imaginary mobile computing scenarios from the future, and extracts the deep assumptions implicit in these scenarios, and uses them to speculate on the future trajectory of mobile computing.
Abstract: In the inaugural issue of MC2R in April 1997 [24], I highlighted the seminal influence of mobility in computing. At that time, the goal of "information at your fingertips anywhere, anytime" was only a dream. Today, through relentless pursuit of innovations in wireless technology, energy-efficient portable hardware and adaptive software, we have largely attained this goal. Ubiquitous email and Web access is a reality that is experienced by millions of users worldwide through their Blackberries, iPhones, iPads, Windows Phone devices, and Android-based devices. Mobile Web-based services and location-aware advertising opportunities have emerged, triggering large commercial investments. Mobile computing has arrived as a lucrative business proposition.Looking ahead, what are the dreams that will inspire our future efforts in mobile computing? We begin this paper by considering some imaginary mobile computing scenarios from the future. We then extract the deep assumptions implicit in these scenarios, and use them to speculate on the future trajectory of mobile computing.

Journal ArticleDOI
TL;DR: In this paper, the capabilities and limitations of mobile learning are discussed, which generally fall into three categories: psychological, pedagogical, and technical limitations, according to which most people prefer to listen to music, the radio news, or sports programs.

Proceedings ArticleDOI
30 Aug 2011
TL;DR: A two-level security model for mobile phones is proposed, which provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.
Abstract: Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.

Journal ArticleDOI
TL;DR: The study found that the higher education environment now has the necessary mobile technology infrastructure to utilize m-learning, and shows that students have adequate knowledge and good awareness to use such technology in their education environment.
Abstract: Problem statement: M-learning is considered as the next generation of e-learning using mobile technologies. Students’ awareness of such technology is one of the most focuses for success adoption. This study aims to investigate students’ awareness and requirements of mobile learning services among Malaysian students in the higher education environment. Approach: The study found that the higher education environment now has the necessary mobile technology infrastructure to utilize m-learning. Results: Moreover, the results show that students have adequate knowledge and good awareness to use such technology in their education environment. Regarding the university mobile applications that students would like to use individually through mobile technologies, the exam result and course registration were the highest in rank, followed by calendar and schedule services. The highest limitations were the cost of transaction and slow data exchange with networks, followed by concerns over confidentiality of personal information. Conclusion: Future research should be conducted with a big number of respondents to ensure the representative and conclusive finding.

Proceedings Article
18 Nov 2011
TL;DR: Web 2.0 tools, including blogs, wikis, and photo sharing and social networking sites, have made possible a more participatory Internet experience and how this increasingly open, collaborative, and personalizable technology is shaping not just the authors' social interactions but new kinds of civic engagement with cities, communities, and spaces is examined.
Abstract: Web 2.0 tools, including blogs, wikis, and photo sharing and social networking sites, have made possible a more participatory Internet experience. Much of this technology is available for mobile phones, where it can be integrated with such device-specific features as sensors and GPS. From Social Butterfly to Engaged Citizen examines how this increasingly open, collaborative, and personalizable technology is shaping not just our social interactions but new kinds of civic engagement with cities, communities, and spaces. It offers analyses and studies from around the world that explore how the power of social technologies can be harnessed for social engagement in urban areas. Chapters by leading researchers in the emerging field of urban informatics outline the theoretical context of their inquiries, describing a new view of the city as a hybrid that merges digital and physical worlds; examine technology-aided engagement involving issues of food, the environment, and sustainability; explore the creative use of location-based mobile technology in cities from Melbourne, Australia, to Dhaka, Bangladesh; study technological innovations for improving civic engagement; and discuss design research approaches for understanding the development of sentient real-time cities, including interaction portals and robots.

Journal ArticleDOI
TL;DR: The phone is an invaluable tool for the modern day surgeon and its uses, functions and medical applications are Educated about.
Abstract: Mobile technology is continuously improving and it is important that all physicians are aware of its new advances. Smartphones have the potential to improve diagnostic skills and education of a surgeon. The iPhone is a popular type of smartphone in the market. This article intends to educate surgeons about its uses, functions and medical applications. The phone is an invaluable tool for the modern day surgeon.