Results 71 to 80 of about 8,962 (209)

No App, No Entry: Conceptualizing Digital Technology Captivity in Service Access

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT We introduce Digital Technology Captivity (DTC), a form of consumer vulnerability that arises when digital technologies become the mandatory gateway to essential services. When access is tied to systems that feel unfamiliar, complex, or intimidating—and when preferred alternatives are limited—consumers may experience heightened vulnerability ...
Carolyn Wilson‐Nash   +4 more
wiley   +1 more source

Key Technical Fields and Future Outlooks of Space Manipulators: A Survey

open access: yesSmartBot, EarlyView.
This paper systematically reviews the technological development of space manipulators, emphasizing the unique challenges posed by space environments. It examines four areas: structural design, modeling, planning, and control, while introducing typical ground test platforms.
Gang Chen   +12 more
wiley   +1 more source

Case Study: PQC Migration for Android Strongbox Keymaster on Samsung Galaxy Mobile Devices

open access: yesIEEE Access
Advances in quantum computers and their algorithms are significantly changing modern cyber-security systems. Post-Quantum Cryptography (PQC) has been standardized to protect modern security systems from large-scale and reliable quantum computing. However,
Sungmin Lee   +3 more
doaj   +1 more source

Platform competition and strategic trade‐offs for complementors: Heterogeneous reactions to the entry of a new platform

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary We study how the entry of a rival platform affects the strategies of the incumbent's complementors. The latter face a trade‐off: While the entry threatens their benefits from indirect network effects, it also allows them to escape intense within‐platform competition.
Johannes Loh, Ambre Elsas‐Nicolle
wiley   +1 more source

Android Access Control Extension

open access: yesActa Informatica Pragensia, 2015
The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with ...
Anton Baláž   +2 more
doaj   +1 more source

CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC) FOR SMART PHONES [PDF]

open access: yesICTACT Journal on Soft Computing, 2016
Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one ...
S. Sharavanan, R.M. Balajee
doaj  

Saving Bambi from the mower? Using a drone with thermal camera to evaluate a low‐tech scaring technique to reduce roe deer fawn mortality during grass harvest

open access: yesWildlife Biology, EarlyView.
Roe deer is a species that hides their neonates as an anti‐predator strategy. This may prove efficient against mammalian predators, such as the red fox; however, it might be an ecological trap as large numbers of fawns are killed by tractors with harvesters each year during grass harvest.
Thomas Vogler   +2 more
wiley   +1 more source

Android Malware Detection Using API Calls and Permissions With Random Forest Classifier

open access: yesIEEE Access
Android malware poses a persistent and evolving threat to mobile security, considering its capability to compromise sensitive user data and evade traditional detection methods. While signature-based approaches remain effective against known threats, they
Abdul Museeb   +5 more
doaj   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Design of intelligent locks based on the triple KeeLoq algorithm

open access: yesAdvances in Mechanical Engineering, 2016
KeeLoq algorithm with high security was usually used in wireless codec. Its security lack is indicated in this article according to the detailed rationale and the introduction of previous attack researches.
Huibin Chen, Jing Liu, Cheng-Fu Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy