• Title/Summary/Keyword: Smartphone Operating System

Search Result 55, Processing Time 0.023 seconds

Quantitative Risk Assessment in Major Smartphone Operating Systems in Asian Countries

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1494-1502
    • /
    • 2014
  • Since smartphones are utilized in the ranges from personal usages to governmental data exchanges, known but not patched vulnerabilities in smartphone operating systems are considered as major threats to the public. To minimize potential security breaches on smartphones, it is necessary to estimate possible security threats. So far, there have been numerous studies conducted to evaluate the security risks caused by mobile devices qualitatively, but there are few quantitative manners. For a large scale risk evaluation, a qualitative assessment is a never ending task. In this paper, we try to calculate relative risk levels triggered by software vulnerabilities from unsecured smartphone operating systems (Android and iOS) among 51 Asian countries. The proposed method combines widely accepted risk representation in both theory and industrial fields. When policy makers need to make a strategic decision on mobile security related agendas, they might find the presented approach useful.

Smartphone Users Characteristics According to Differences between Operating Systems (운영체제 차이에 따른 스마트폰 사용자 성향)

  • Um, Myoung-Yong
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.93-99
    • /
    • 2014
  • This study aims to explore and analyze smartphone users' characteristics from the two perspectives (purchase vs. use characteristics) on the two operating systems (iOS and Android). The results of the study on purchase characteristics show that smartphones choice priority and the gender ratio are found to be significantly different between the two operating system users. However, the replacement cycle is not statistically different from iOS and Android users. The results of study on use characteristics show that the number of the applications and the registered SNS(social network service), the average monthly smartphone bill, and satisfaction are significantly different between iOS and Android users. However, the average Internet usage time is not different between the two operating system users. The findings provide useful implications for operating developers, smartphone manufacturers, and application developers.

The Study on Forensic Methodology of Firefox OS (Firefox OS 포렌식 기법에 관한 연구)

  • Kim, Do-Su;Choi, Jong-hyun;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1167-1174
    • /
    • 2015
  • As the market share of smartphone exponentially increases in mobile market, a number of manufacturers have developed their own operating system. Firefox OS is an open source operating system for the smartphone and tablet which is being developed by the Mozilla Foundation. This OS is designed using JavaScript and operated based on HTML5. Even though the number of manufacturers which release the Firefox OS smartphone is consistently increasing, However it is difficult to analyze artifacts in a smartphone in terms of investigation since existing researches on Firefox OS focused on imaging velocity according to abstract forensic process and block size. In this paper, we propose how to collect data in Firefox OS while minimizing data loss and forensic analysis framework based on analysis results on system and user data leaving in a smartphone.

Study on factors affecting acceptance intention of smartphone - Focused on TAM Model - (스마트폰의 수용의도에 영향을 미치는 요인에 관한 연구)

  • Noh, Young;Lee, Kyung Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.273-288
    • /
    • 2012
  • In recent years, smartphone is the most widely used ubiquitous functionality. People do not want to just call other people any more by using a cellular phone; they want to connect to the Internet and use various applications. Hence, cellular phones need to become smart. A smartphone has an operating system and many applications. Specifically the goals of this research are; (1) to suggest theory framework of acceptance about smartphone based on TAM, (2) to examine relationships between exogenous variables. The research model and hypotheses were developed based on the theories of technology acceptance model. Questionnaire was used to collect data. The analysis of this study is designed as individual level to examine the causal relationship among variables. The the reliability and validity of data was tested by explanatory factor analysis, Cronbach's alpha coefficient, confirmatory factor analysis, and correlation analysis. Also, the structural equation model(SEM) analysis was performed to test the usefulness of the model. The analysis results revealed that social norms and individual innovation are major influential variables on the perceived usefulness of smartphone. Also, social norms are influential variables on the perceived enjoyment of smartphone.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Effective Evaluation about the Antivirus Solution for Smart Phone

  • Shin, Suk-Jo;Kim, Seon-Joo;Jiang, Chun-Yan;Jo, In-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.695-700
    • /
    • 2011
  • Smartphone has formed a new market and introduced a new environment. They have an operating system like PCs, enabling free installation and removal of application programs. As the number of Smartphone users is increasing, more personal information is also exposed to malicious codes. There are problem of modification and deletion of files, battery consumption, and information leakage due to malicious codes. As the needs of Smartphone antivirus solutions are increasing, the antivirus solutions should be evaluated with quality characteristics. In this paper, we propose an effective evaluation method for functionality and performance of Smartphone antivirus solutions, and the best practices for evaluation.

Design and Implementation of Remote Control System for Car Navigation (자동차 내비게이션 원격 제어 시스템의 설계 및 구현)

  • Shin, Yejin;Seol, Soonuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1695-1703
    • /
    • 2014
  • Manipulating a car navigation system while driving can lead to car accident due to loss of concentration. This will be more serious for elders or beginner drivers. Recently, a new Road Traffic Law in Korea prohibits drivers from watching or operating any video displaying devices. So the car navigation system came hard to use. In order to solve the issue we design and implement a novel system where a remote person can control the car navigation system on behalf of the driver. In the proposed system, we suggest to utilize the driver's smartphone for allowing sharing the Internet connection of the phone with the navigation system. The required smartphone application and the server will also be designed and implemented.

Finding Smartphone's Factors which Affect Satisfaction or Dissatisfaction based on KANO Model (KANO 모델을 활용한 스마트폰의 만족 및 불만족 요인 분석)

  • Lee, Sang-Gun;Lee, Sin-Seok;Kang, Ju-Young
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.257-277
    • /
    • 2011
  • The current study categorizes factors of smartphone into three, using KANO model: attractive factors which cause only product satisfaction, must-be factors for dissatisfaction, and one-dimensional factors for both. Based on it, it presents a new model for the effects that smartphone factors have on satisfaction or dissatisfaction. The purpose is to theoretically explain that smartphone factors on which companies and users place a high value can actually affect satisfaction or dissatisfaction. After choosing 15 factors out of 25 which had been selected through literature study, these were divided into attractive, must-be, and one-dimensional ones. 93 out of 109 questionnaires returned were used for analysis. After frequency analysis using SPSS were conducted on the surveys, the factors were grouped, based on KANO table. The grouping results are as follows. Attractive factors include 'expansion slots for external memory, battery desorption, brand awareness, mobile banking and internet telephony'. Must-be ones include 'multi-touch, information security, entertainment, information retrieval, location based service and SNS. Finally, 'screen visibility, size of internal memory, the amount of internal memory, battery life, and response to after-sales service' are classified as one-dimensional factors. A critical finding of this paper is that since the results are different depending on the operating system of smartphones, it must be taken into consideration in studies on smartphones. The wide and rapid spread of smartphones has changed people's lifestyle as well as business environment, which forces companies to compete with each other to adapt to the changed circumstances. In this competitive system, studies on smartphone factors of satisfaction and dissatisfaction are essential for firms to establish a new strategy. From this point of view, the present paper is expected to be a basic material for enterprises not only to develop goods and services that maximize customer satisfaction and minimize dissatisfaction, but also to establish the future business strategy.

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

Design and Implementation of a Microwave Motion Detector with Low Power Consumption

  • Sohn, Surg-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.57-64
    • /
    • 2015
  • In this paper, we propose a design of microwave motion detector using X-band doppler radar sensor to minimize the power consumption. To minimize the power consumption and implement battery operated system, pulse input with 2 KHz, 4% duty cycle is exerted on the doppler radar sensor. In order to simplify the process of working with ATmega2560 microcontroller unit, Arduino compatible board is designed and implemented. Arduino is open source hardware and many library software is published as open source tools. Smartphone app is also proposed and designed as a real-time user interface of the motion detector. The SQLite database on the Android mobile operating system is used for recording raw data of motion detection for post-processing job, such as fast Fourier transform (FFT). Bluetooth interface module is implemented on the motion detection board as a wireless communication interface to the smartphone. The speed of human movement is identified by post-processing FFT.