Search results

1 – 10 of over 1000
Article
Publication date: 8 October 2019

Yan Watequlis Syaifudin, Nobuo Funabiki, Minoru Kuribayashi and Wen-Chung Kao

With rapid increase of Android devices and application systems, there is a strong demand for Android application programmers. A lot of schools are offering Android programming…

Abstract

Purpose

With rapid increase of Android devices and application systems, there is a strong demand for Android application programmers. A lot of schools are offering Android programming courses to meet this demand. However, Android programming can be different from the conventional one because it needs interactive functions through interfaces with users, which makes the study more difficult. This paper aims to propose an Android Programming Learning Assistance System, namely, APLAS, to assist the Java-based Android programming study and education.

Design/methodology/approach

By adopting the test-driven development method, APLAS is designed to achieve independent learning without the presence of teachers. Using JUnit and Robolectric, the answers from the students are automatically marked in APLAS. To cover extensive materials in Android programming, APLAS offers four stages where each stage involves several topics.

Findings

To evaluate the effectiveness of APLAS, we implemented the Unit Converter assignment that covers the first two topics, namely, Basic user interface in the first stage and basic activity in the second stage. Through solving the assignment, it is expected to learn basic application development. Forty novice students of an IT department in Indonesia were asked to solve both topics separately.

Originality/value

The results show that APLAS is useful and helpful for the self-study of Android programming, as they could complete codes with good execution performances.

Details

International Journal of Web Information Systems, vol. 16 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 9 November 2015

Himanshu Srivastava and Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

1457

Abstract

Purpose

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.

Design/methodology/approach

Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.

Findings

Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.

Research limitations/implications

The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.

Practical implications

The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.

Originality/value

This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 June 2013

Kuo‐Lun Hsiao

The research goal of this study is to explore the factors influencing the adoption of Android smartphones and the intention to pay for mobile internet services.

6600

Abstract

Purpose

The research goal of this study is to explore the factors influencing the adoption of Android smartphones and the intention to pay for mobile internet services.

Design/methodology/approach

The present study proposes a framework based on theory of reasoned action (TRA) from the perspectives of software (interface convenience and perceived content), hardware (perceived infrastructure), design (design aesthetics) and perceived value (emotional value, price/value for money, performance/quality value, and social value). A web survey was conducted, and data were collected from a total of 881 users of Android smartphones in Taiwan. The casual model was validated using partial least squares (PLS) techniques.

Findings

The results indicated that the influence of the factors on the intention of the mobile internet users and non‐users were different. Surprisingly, the effect of design aesthetics was not significant in all of the groups. Male users were found to be more likely to read e‐books on their smartphones, as are people with higher personal incomes.

Practical implications

This study contributes to a theoretical understanding of the factors that promote mobile internet users' and non‐users' intention to adopt Android smartphones and pay for mobile internet services. The proposed framework can be used by mobile internet service providers and smartphone manufacturers to design the products and marketing strategies.

Originality/value

The primary value of this paper lies in providing a better understanding of users' and non‐users' concerns about Android smartphone adoption and subscription of mobile internet services.

Article
Publication date: 1 February 2018

Adele Parmentola, Michele Simoni and Ilaria Tutore

The purpose of this paper is to propose a comprehensive theoretical framework to explain the different diffusion dynamics of a technology realized under an open source (OS) regime…

Abstract

Purpose

The purpose of this paper is to propose a comprehensive theoretical framework to explain the different diffusion dynamics of a technology realized under an open source (OS) regime vs a technology realized under a closed-proprietary (CP) regime.

Design/methodology/approach

Following a systematic combining approach, theoretical predictions derived from literature on diffusion of innovation and on open innovation were matched with empirical observations derived from a case study of two mobile operation systems, which were released under different technological regimes.

Findings

This paper proposes a theoretical framework and a set of original theoretical propositions that can help to explain the differences in the diffusion dynamics of technologies that are released under different regimes (i.e. CP vs OS).

Research limitations/implications

This paper provides managers a better understanding of the diffusion dynamics of technologies released according to an open innovation strategy. In addition, the empirical case study improves the understanding of an important industry (the MOS industry) that has not been fully investigated from the innovation diffusion perspective. Nevertheless, the efficacy and generalizability of the theoretical framework proposed in this paper require future empirical tests.

Originality/value

This paper makes an original contribution to the open innovation and innovation diffusion literature by linking, in a conceptual model, three antecedents of the diffusion of a new technology that previous literature has considered only separately: the regime under which the technology is released (OS vs CP), the contingencies related to the characteristics of the technology and to the network of its adopters, and the resulting barriers to adoption.

Details

Management Decision, vol. 56 no. 4
Type: Research Article
ISSN: 0025-1747

Keywords

Article
Publication date: 13 November 2009

Endre Grøtnes

The purpose of the paper is to introduce standardization as a neutral arena for open innovation. The aim is to show that different policies towards open membership in…

5557

Abstract

Purpose

The purpose of the paper is to introduce standardization as a neutral arena for open innovation. The aim is to show that different policies towards open membership in standardization initiatives lead to different open innovation processes.

Design/methodology/approach

Two cases are used to illustrate the differences in open innovation processes. The cases are the Android mobile operating system and the service platform developed by the Open Mobile Alliance. The core process types introduced by Gassmann and Enkel are used to show the different open innovation approaches.

Findings

Both cases use open innovation to create standards. Open membership leads to a coupled process, while a more restricted membership gives separate inside‐out and outside‐in processes. The case lead by established firms in the industry has a process where radical innovations are introduced early in the process, while the case lead by newcomers has a process where radical innovations are introduced late in the process. The two cases have different approaches towards commercialization of the products. Android relies on third‐party developers, while the Open Mobile Alliance relies on their own members.

Research limitations/implications

The cases are from the telecommunication sector and based on standardization of large technical platforms. The findings might not be the same for other sectors.

Originality/value

The paper establishes open innovation as a neutral arena for open innovation outside the domain of any single firm. It shows how the openness towards membership influences the choice of open innovation processes.

Details

Information Technology & People, vol. 22 no. 4
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 19 August 2021

Oussama BenRhouma, Ali AlZahrani, Ahmad AlKhodre, Abdallah Namoun and Wasim Ahmad Bhat

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android…

Abstract

Purpose

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android devices.

Design/methodology/approach

This study uses a black-box testing-principles based methodology to develop use-cases that simulate real-world case-scenarios of the activities performed by the users on the social media application. The authors executed these use-cases in a controlled experiment and examined the Android smartphone to recover the private-data pertaining to these use-cases.

Findings

The results suggest that the social media data recovered from Android devices can reveal a complete timeline of activities performed by the user, identify all the videos watched, uploaded, shared and deleted by the user, disclose the username and user-id of the user, unveil the email addresses used by the user to download the application and share the videos with other users and expose the social network of the user on the platform. Forensic investigators may find this data helpful in investigating crimes such as cyber bullying, racism, blasphemy, vehicle thefts, road accidents and so on. However, this data-breach in Android devices is a threat to user's privacy, identity and profiling in second-hand market.

Practical implications

Perceived notion of data sanitisation as a result of application removal and factory-reset can have serious implications. Though being helpful to forensic investigators, it leaves the user vulnerable to privacy breach, identity theft, profiling and social network revealing in second-hand market. At the same time, users' sensitivity towards data-breach might compel users to refrain from selling their Android devices in second-hand market and hamper device recycling.

Originality/value

This study attempts to bridge the literature gap in social media data-breach in second-hand Android devices by experimentally determining the extent of the breach. The findings of this study can help digital forensic investigators in solving crimes such as vehicle theft, road accidents, cybercrimes and so on. It can assist smartphone users to decide whether to sell their smartphones in a second-hand market, and at the same time encourage developers and researchers to design methods of social media data sanitisation.

Details

Information & Computer Security, vol. 30 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 11 February 2019

Vinayak Agrawal and Shashikala Tapaswi

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this…

Abstract

Purpose

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.

Design/methodology/approach

Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.

Findings

Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.

Research limitations/implications

As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.

Practical implications

Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.

Originality/value

This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 5 March 2018

Irwanto Widyatri, Afan Galih Salman and Bayu Kanigoro

The purpose of this study is to build the Android-based applications for parent to supervise, control and restrict the children’s usage of the smartphone and tablet.

Abstract

Purpose

The purpose of this study is to build the Android-based applications for parent to supervise, control and restrict the children’s usage of the smartphone and tablet.

Design/methodology/approach

The method used is the method of analysis, i.e. collection of necessary data. The data are collected from journals, articles, books, questionnaires and the similar application analysis.

Findings

The GPS tracking feature of the parental control application facilitates searching the children’s location by indicating the location where they used their Android device. The history feature of the parental control facilitates finding out what application was accessed by their children through their Android-based application, and the time limit feature of the parental control application facilitates restriction on time that the children spend on their Android-based gadgets, so that they will not be addicted to the gadget.

Originality/value

The parental control application for the Android platform provides users or parents a means for managing the young generation’s usage of an Android-based mobile device.

Details

Library Hi Tech News, vol. 35 no. 1
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 27 July 2018

Marcos Barata, Afan Galih Salman, Ikhtiar Faahakhododo and Bayu Kanigoro

The purpose of this study is to discuss the development of Android-based Intelligent Software Assistant application for visually challenged or blind people. The application is…

Abstract

Purpose

The purpose of this study is to discuss the development of Android-based Intelligent Software Assistant application for visually challenged or blind people. The application is intended to help people with visual limitations or blind people to access Android-based devices so that they can use library resources by using android devices.

Design/methodology/approach

The necessary data are collected from journals, articles, books and questionnaires, and similar applications are analyzed. The application design method used is the Scrum method, which consists of Backlog, Sprint and Scrum Meeting. From the operational side of the application, the method used is speech-to-text and text-to-speech.

Findings

This application has been tried with some users who have total blindness and low vision, and all provided a good response to this application. From the performance side, the user gives a very satisfied response to this application. While the ease of using the application, the user also provides a satisfactory response to the ease of using this application.

Research limitations/implications

The application still has limitations in penetration to the user, and the application is only built using Android as its platform. In addition, the dependence on libraries from Google has caused difficulties in implementing this application with local dialect, which is only understood by the local community.

Social implication

This application has implications for the society, especially those with limitations in eyesight can be so much more productive and independent. This can reduce the social burden in society.

Originality/value

This application provides an easy access of an android device to blind people and people with low vision, as well as access to library resources with devices that have been installed with this application. This facility can improve the library accessibility to the blind and visually challenged community.

Details

Library Hi Tech News, vol. 35 no. 6
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 26 August 2014

Michael Roland, Josef Langer and Rene Mayrhofer

The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and…

Abstract

Purpose

The purpose of this paper is to address the design, implementation, performance and limitations of an environment that emulates a secure element for rapid prototyping and debugging. Today, it is difficult for developers to get access to a near field communication (NFC)-secure element in current smartphones. Moreover, the security constraints of smartcards make in-circuit emulation and debugging of applications impractical. Therefore, an environment that emulates a secure element brings significant advantages for developers.

Design/methodology/approach

The authors' approach to such an environment is the emulation of Java Card applets on top of non-Java Card virtual machines (e.g. Android Dalvik VM), as this would facilitate the use of existing debugging tools. As the operation principle of the Java Card VM is based on persistent memory technology, the VM and applications running on top of it have a significantly different life cycle compared to other Java VMs. The authors evaluate these differences and their impact on Java VM-based Java Card emulation. They compare possible strategies to overcome the problems caused by these differences, propose a possible solution and create a prototypical implementation to verify the practical feasibility of such an emulation environment.

Findings

While the authors found that the Java Card inbuilt persistent memory management is not available on other Java VMs, they present a strategy to model this persistence mechanism on other VMs to build a complete Java Card run-time environment on top of a non-Java Card VM. Their analysis of the performance degradation in a prototypical implementation caused by additional effort put into maintaining persistent application state revealed that the implementation of such an emulation environment is practically feasible.

Originality/value

This paper addresses the problem of emulating a complete Java Card run-time environment on top of non-Java Card virtual machines which could open and significantly ease the development of NFC secure element applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 1000