• Title/Summary/Keyword: Mobile App Security

Search Result 83, Processing Time 0.021 seconds

A Client-Side App Model for Classifying and Storing Documents

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif;Khalifa, Mahmoud;Alsharani, Mohammed Mujib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.225-233
    • /
    • 2022
  • Due to the large number of documents that are important to people and many of their requests from time to time to perform an essential official procedure, this requires a practical arrangement and organization for them. When necessary, many people struggle with effectively arranging official documents that enable display, which takes a lot of time and effort. Also, no mobile apps specialize in professionally preserving essential electronic records and displaying them when needed. Dataset consisting of 10,841 rows and 13 columns was analyzed using Anaconda, Python, and Mito Data Science new tool obtained from Google Play. The research was conducted using the quantitative descriptive approach. The presented solution is a model specialized in saving essential documents, categorizing according to the user's desire, and displaying them when needed. It is possible to send in an image or a pdf file. Aside from identifying file kinds like PDFs and pictures, the model also looks for and verifies specific file extensions. The file extension and its properties are checked before sharing or saving it by applying the similarity algorithm (Levenshtein). Our method effectively and efficiently facilitated the search process, saving the user time and effort. In conclusion, such an application is not available, which facilitates the process of classifying documents effectively and displaying them quickly and easily for people for printing or sending to some official procedures, and it is considered one of the applications that greatly help in preserving time, effort, and money for people.

Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments (u-병원 환경 기반에서 상황인식 인증 보안 서비스 설계 및 구현)

  • Jeong, Chang-Won;Choi, Jae-Hyeong;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.51-57
    • /
    • 2012
  • The warming up of the recent competition in the smart phone industry followed by rapid increase of open platforms and app stores have led the mobile terminals to adopt the general purpose operating system. The mobile device utilizing this OS is vulnerable to mobile malignant code which is highly transferable. As a result, the scale of mobile attack and harm increase. However, compared to the malicious code and virus which keep increasing, the elements for security to prevent are insufficient. Therefore, this paper describe about the Context Aware Service that eliminates the potentially risky elements on the smart phone service, which could threaten the usability of the service including invasion of personal information. The proposed system prevents from disclosure of personal information by giving the procedure of information, and realizes the service that is able to change the sequence of identifying the users' information to prepare for emergency.

A Study on the User's Sustainable Intention of Mobile Tourism : Focused on Chinese Tourists Visiting Korea (모바일 관광 애플리케이션 사용자의 지속적 사용의도에 미치는 영향 : 방한 중국관광을 중심으로)

  • Long, Shang Guan-Jin;Park, Uk-Yeol;Lee, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.5
    • /
    • pp.47-62
    • /
    • 2018
  • Purpose - Based on preceding studies, this thesis focuses on the finding of the definition and category of mobile tourism application and deriving out its characteristics. And after looking for how they make influences on continuous intention to use, we make empirical study with TAM model. Research design, data, and methodology - There are many Chinese tourist who visit Korea with user's constant intention to use of tourism application. This study is to find out the definition and category of mobile tourism application through research of preceding study and to fomulate the research model and hypothesis that how tourism application attributes (convenience, interaction, accessibility, local basis, security) affect constant intention to use of mobile tourism application. In order to verify a hypothesis, we conducted a survey for Chinese users of tourism application. In empirical study, we analyzed a structure model for frequency analysis, reliability analysis, exploratory factor analysis, validity analysis through IBM SPSS Statistics 21.0 and IBM SPSS AMOS 21.0 Results - Among tourism applications, convenience, interaction, accessibility and local basis have positive effects on both perceived usefulness and perceived easiness respectively. But security does not. Also perceived easiness has a positive effect on perceived usefulness. Finally, perceived usefulness and perceived easiness have positive effect on constant intent to use. Conclusions - Tourism application enterprises should put emphasis on design such as menu or function in order to simplify the operation of new services for new customers. Therefore, comfortable user interface and development of useful function can improve tourism application. Consequently, it leads to the promotion of tourism application. Also, when users perceive tourism application as a useful media which is easy, comfortable and useful content, the degree of constant intention to use becomes increased. It is important to provide plentiful and useful contents for customers and to develop user interface such as easy operation because these factors have positive effects on constant demand and use of tourism application.

A Static Analysis Technique for Android Apps Written with Xamarin (자마린으로 개발된 안드로이드 앱의 정적 분석 연구)

  • Lim, Kyeong-hwan;Kim, Gyu-sik;Shim, Jae-woo;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.643-653
    • /
    • 2018
  • Xamarin is a representative cross-platform development framework that allows developers to write mobile apps in C# for multiple mobile platforms, such as Android, iOS, or Windows Phone. Using Xamarin, mobile app developers can reuse existing C# code and share significant code across multiple platforms, reducing development time and maintenance costs. Meanwhile, malware authors can also use Xamarin to spread malicious apps on more platforms, minimizing the time and cost of malicious app creation. In order to cope with this problem, it is necessary to analyze and detect malware written with Xamarin. However, little studies have been conducted on static analysis methods of the apps written in Xamarin. In this paper, we examine the structure of Android apps written with Xamarin and propose a static analysis technique for the apps. We also demonstrate how to statically reverse-engineer apps that have been transformed using code obfuscation. Because the Android apps written with Xamarin consists of Java bytecode, C# based DLL libraries, and C/C++ based native libraries, we have studied static reverse engineering techniques for these different types of code.

Design and Implementation of Internal Network and VPN-based NVR System (내부망 및 VPN 기반 NVR 시스템 설계 및 구현)

  • Byeong-Seon Park;Hee-Kwon Lee;Dong-Hwan Hwang;Yong-Kab Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.1-6
    • /
    • 2024
  • In this paper, we designed and implemented the security network NVR system that can flexibly use the internal network and VPN network. In general, the NVR systems that only use internal networks cannot be access from the outside, which has the disadvantage of unnecessary inspections and inability to access from the outside. External access has made possible using the VPN security network, and a NVR system software was designed and implemented so that the existing internal network could be used. We compared with the NVR system usage environment in the internal network through the client and the NVR system. It also has implemented usage environment with the VPN network through the mobile APP, and confirmed that the same NVR was operating normally with the same functions. We also studied on IP based NVR for flexible access with closed loop network based on VPN system.

Autonomous Mobile-Based Model for Tawaf / Sa'ay Rounds Counting with Supported Supplications from the Quran and Sunna'a

  • Nashwan, Alromema
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.205-211
    • /
    • 2022
  • Performing the rituals of Hajj and Umrah is an obligation of Allah Almighty to all Muslims from all over the world. Millions of Muslims visit the holy mosques in Makkah every year to perform Hajj and Umrah. One of the most important pillars in Performing Hajj/Umrah is Tawaf and Sa'ay. Tawaf finished by seven rounds around the holy house (Al-Kabaa) and Sa'ay is also seven runs between As-Safa and Al-Marwa. Counting/knowing the number of runs during Tawaf/Sa'ay is one of the difficulties that many pilgrims face. The pilgrim's confusing for counting (Tawaf/Sa'ay) rounds finished at a specific time leads pilgrims to stay more time in Mataff bowl or Masa'a run causing stampedes and more crowded as well as losing the desired time for prayers to get closer to Almighty Allah in this holy place. These issues can be solved using effective crowd management systems for Tawaf/Sa'ay pillars, which is the topic of this research paper. While smart devices and their applications are gaining popularity in helping pilgrims for performing Hajj/Umrah activities efficiently, little has been dedicated for solving these issues. We present an autonomous Mobile-based framework for guiding pilgrims during Tawaf/Sa'ay pillars with the aid of GPS for points tracking and rounds counting. This framework is specially designed to prevent and manage stampedes during Tawaf/Sa'ay pillars, by helping pilgrims automatically counting the rounds during Tawaf/Sa'ay with supported Supplications (in written/audio form with different languages) from the Quran and Sunna'a.

A Study on the Determinants of Attitude toward and Intention to Use Mobile Shopping through Fashion Apps -Comparisons of Gender and Age Group Differences- (패션 앱을 이용한 모바일 쇼핑 태도 및 사용의도 영향요인 연구 -성별과 연령집단별 차이 비교-)

  • Sung, Heewon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.7
    • /
    • pp.1000-1014
    • /
    • 2013
  • This study identifies the determinants that influence attitude toward and the intention to use mobile shopping services through fashion applications (apps) based on the technology acceptance model. In addition, gender and age group differences were examined. Data were collected from subjects who have used smartphone fashion related apps; subsequently, a total of 327 data were analyzed. About 46% of respondents were males, with a mean age of 34.4 years that ranged from 20 to 49 years old. Multiple regression models were developed based on the research model. Perceived usefulness, perceived ease of use, perceived enjoyment, perceived risks (security risk and quality risk), fashion involvement, and fashion app attributes (product attributes and service attributes) were employed as predictors of attitudes towards mobile shopping. Attitudes towards mobile shopping and subjective norms with the aforementioned variables measured the intention to use. Attitudes towards mobile shopping were predicted by perceived enjoyment, perceived usefulness, and service attributes. Attitudes toward mobile shopping and subjective norms were the most important predictors of the intention to use. Gender differences were found in that service attributes were significant for attitudes towards mobile shopping only in the male model. Age differences were also found and perceived usefulness was the most important predictor of attitudes toward mobile shopping among those in their 20's; however, perceived enjoyment was the most important among those in their 30's and 40's. Quality risk was only significant to explain intention to use among those in their 40's. The findings of this study are useful to understand the possibility of the adoption of mobile shopping though fashion apps and provide basic insight into market segmentation.

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

A Study on Service Quality Satisfaction of Delivery Food App. of Korean and Chinese Customer (배달음식 앱의 서비스 품질 만족에 관한 연구 - 한국과 중국 소비자를 대상으로 -)

  • Hwang, Yuns-Sung;Park, Jae-kei;Wang, Yan;Seo, Yong-Mo;Rhee, Byungchae
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.239-250
    • /
    • 2018
  • This study focus on analyzing the factors which influence the customer satisfaction of food delivery application and its degree of the influence on the quality satisfaction both with Korean and Chinese customers. For this purpose, the model of hypothetical structure was established through the mobile internet service quality measurement was called as MOBISQUAL. As a result, the Korean customers was confirmed that the fulfillment and playfulness as the subdimension of outcome quality both have a positive effect on customer satisfaction. And the Chinese customer was confirmed that the playfulness of outcome quality, personalization of contextual interaction, design, ease of use and security of servicescape quality affected customer satisfaction positively.