Presentation of Steven Palmaers and Christophe Benoit from the Erasmus Hogeschool Brussel and PXL. They did a research of the wearable privacy/security, the wearable jungle and how to build the ultimate User Experience for Apps.
El documento describe el sistema circulatorio humano, incluyendo su importancia para transportar oxígeno y desechos a las células, su constitución de sangre, corazón y vasos sanguíneos, y las funciones de estos componentes como la sangre que transporta oxígeno y dióxido de carbono, el corazón que bombea la sangre en todo el cuerpo mediante la sístole y diástole, y los vasos sanguíneos que distribuyen la sangre a través de las arterias, venas y capilares.
Privacy and personal information presention of professional practice.pptxsadia456189
This document discusses privacy and personal information. It defines privacy as secrecy and protection of personal information, which includes details like names, addresses, financial information, medical records, religious beliefs, and other identifying details. It discusses privacy in various contexts like the workplace, internet, and how to protect personal information online. It emphasizes the importance of keeping personal information private and secure in the digital age to avoid risks like identity theft, data breaches, and unauthorized sharing of information.
Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl
Hr Wcu General Security Awareness Training Ed01Donna Koger
The document discusses protecting sensitive information at Western Carolina University. It defines sensitive information and lists several federal and state laws requiring compliance, including HIPAA, GBLA, FERPA, and NC ITPA. Common threats like phishing, hacking, malware, and physical access are described. Proper security practices like encrypted storage, password protection, and cleaning desks are recommended to prevent data breaches, which can result in penalties for the university.
Awareness Training on Information SecurityKen Holmes
We look at the potential risks to information security, how to minimise these when on the internet and how the ISO/IEC 27001 standard can play a part in doing so.
This document summarizes presentations from an Advanced Networks event. It includes summaries of talks on social impacts of networks, environmental and health effects, privacy and data abuse, ethical issues in open vs closed networks, and security and crime. Specifically, it discusses how networks transform society and introduce new technologies. It also outlines how networks affect power consumption, wildlife, and potentially human health. The document discusses what personal data is, how it is collected, privacy threats, and approaches to data protection. Ethical issues for open and closed networks are presented. Finally, it defines cybercrime, reasons for its occurrence, safety tips, and advantages and challenges of cyber security.
The document discusses the topic of computer privacy and provides information on its history, current legislation, and future concerns. It notes several data breaches that have exposed personal information of millions of individuals. Finally, it offers tips on protecting privacy such as using antivirus software, browser security add-ons, and anonymizing browsers.
El documento describe el sistema circulatorio humano, incluyendo su importancia para transportar oxígeno y desechos a las células, su constitución de sangre, corazón y vasos sanguíneos, y las funciones de estos componentes como la sangre que transporta oxígeno y dióxido de carbono, el corazón que bombea la sangre en todo el cuerpo mediante la sístole y diástole, y los vasos sanguíneos que distribuyen la sangre a través de las arterias, venas y capilares.
Privacy and personal information presention of professional practice.pptxsadia456189
This document discusses privacy and personal information. It defines privacy as secrecy and protection of personal information, which includes details like names, addresses, financial information, medical records, religious beliefs, and other identifying details. It discusses privacy in various contexts like the workplace, internet, and how to protect personal information online. It emphasizes the importance of keeping personal information private and secure in the digital age to avoid risks like identity theft, data breaches, and unauthorized sharing of information.
Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl
Hr Wcu General Security Awareness Training Ed01Donna Koger
The document discusses protecting sensitive information at Western Carolina University. It defines sensitive information and lists several federal and state laws requiring compliance, including HIPAA, GBLA, FERPA, and NC ITPA. Common threats like phishing, hacking, malware, and physical access are described. Proper security practices like encrypted storage, password protection, and cleaning desks are recommended to prevent data breaches, which can result in penalties for the university.
Awareness Training on Information SecurityKen Holmes
We look at the potential risks to information security, how to minimise these when on the internet and how the ISO/IEC 27001 standard can play a part in doing so.
This document summarizes presentations from an Advanced Networks event. It includes summaries of talks on social impacts of networks, environmental and health effects, privacy and data abuse, ethical issues in open vs closed networks, and security and crime. Specifically, it discusses how networks transform society and introduce new technologies. It also outlines how networks affect power consumption, wildlife, and potentially human health. The document discusses what personal data is, how it is collected, privacy threats, and approaches to data protection. Ethical issues for open and closed networks are presented. Finally, it defines cybercrime, reasons for its occurrence, safety tips, and advantages and challenges of cyber security.
The document discusses the topic of computer privacy and provides information on its history, current legislation, and future concerns. It notes several data breaches that have exposed personal information of millions of individuals. Finally, it offers tips on protecting privacy such as using antivirus software, browser security add-ons, and anonymizing browsers.
Training for managers and supervisors presentationbrentcarey
The document discusses privacy training for managers and supervisors in the Southern Region. It aims to help them understand the past, current, and desired future privacy culture. It outlines why privacy is important, what information is considered sensitive, and managers' responsibilities regarding collecting, storing, sharing, and protecting personal data. The training identifies challenges to privacy compliance and provides strategies to build a strong privacy culture, such as designating Privacy Contact Officers and monitoring data access. The overall goal is to minimize privacy incidents and complaints by fostering a workplace where privacy is a priority.
This is a presentation I gave for the UQ Business School (in conjunction with Stan Gallo of KPMG) at the Urbane Restaurant to a group of Queensland CEO/C-Suite people. These dinners are part of UQ's engagement with the business community - a relationship we value. This engagement ensures we don't get all locked up in our ivory tower.
The document discusses goals and strategies for defensive information warfare, including protecting information resources from attacks that decrease availability to both offense and defense or decrease integrity. It outlines key areas of prevention, deterrence, detection, emergency preparedness, and response. Main goals are to provide cost-effective defense without limiting organizational capabilities.
Surveillance Systems And Studies That Should Be...Ann Johnson
The film Red Road depicts the negative impacts of CCTV surveillance on individual privacy and freedom. The main character Jackie works in the CCTV control room, constantly watching over others. This leads her to become obsessed with finding a man from her past. The film shows how CCTV surveillance can compromise people's privacy and cross ethical lines.
Red Road demonstrates how CCTV surveillance strips away individual privacy and freedom. Jackie is able to watch people going about their daily lives without their consent or knowledge from the CCTV control room. This level of constant monitoring would make most people feel uncomfortable, as if they are never truly
The document discusses social media, web 2.0, and privacy. It notes that while social media allows people to share information, it also means that personal data is increasingly collected and used in ways that impact privacy. The document outlines how companies collect and use personal data from social media as well as employees' online activities, and the privacy and legal issues this raises for both individuals and employers. It also provides recommendations for how companies can improve their data privacy and security practices.
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...m Habitat
This document summarizes key points about privacy and mobile health apps from a presentation given by Professor Jeremy Wyatt. It discusses how easily personal data can be identified even when anonymized, and how social media and mobile apps have increased data sharing. While health professionals are bound by ethics to protect patient data, companies freely trade personal data as a commodity. The document outlines some options for individuals to better control their personal data, and concludes that laws are tightening but individuals still need ways to protect their privacy in the digital era.
Securing people that don't look like you, yetLaura Bell
Developing a diagnostic framework to measure digital independence with an aim of providing integrated digital security assistance as part of community support and product design.
This document discusses introductory concepts of information security. It states that information is a valuable asset that needs protection, as it exists in many forms and goes through a lifecycle of being created, stored, processed, transmitted, used, and potentially lost or corrupted. The document outlines that information security aims to protect information from threats through logical, physical, and organizational controls, and that it ensures confidentiality, integrity, and availability of information. It emphasizes that information security is a process involving people, policies, and technology to manage risks to information in a proactive manner.
This document provides an information security training presentation covering several topics:
- The importance of information security and protecting personal, legal, corporate, and operational information.
- Risks of data breaches including regulatory fines, restoration costs, and reputational damage.
- Common causes of data breaches such as user error, insufficient protection methods, and deliberate leaks.
- Classifying information into categories like confidential, internal, and public.
- Information security best practices for email, mobile devices, cloud services, and handling physical documents.
- The company's information security policy and employees' responsibilities to understand and follow the policy.
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
In a data driven economy, analysts must be concerned with how data is collected, processed and subsequently used to improve online customer experiences, during those moments that matter.
Unlocking Value & Controlling Risk by #MindYourPrivacy
The document discusses information security and internet snooping. It defines security and notes that security risks can come from many sources like fire, theft, or loss. It then explores how technology like the internet, mobile devices, and digitization of information has expanded security risks, especially around personal information theft and exposure. The document outlines the many ways personal information can be collected, from public records to social media to purchases. It also discusses how collected information can be used, sold to third parties, or exposed. Finally, it provides some security best practices around awareness, limiting exposure, securing devices and networks, and establishing security policies.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Do you wish to know how important is data protection and how to train your employees on the data security measures? Then download this presentation now.
This document provides an introduction and overview of computer security and privacy. It discusses how computer security aims to protect information from unauthorized access while allowing intended use. Privacy involves protecting personal information. The document then covers physical security, network security, basic security objectives of confidentiality, integrity and availability. It provides examples of security policies, mechanisms, and goals of prevention, detection and recovery. Finally, it discusses the brief history of computer security and privacy and covers early efforts to address these issues through standards, legislation and security controls.
The document discusses several ethical and legal issues related to health information technology in Thailand. It outlines why these issues are important, including risks to patient outcomes and privacy. Key principles that guide ethics in health IT are discussed, such as non-maleficence, beneficence, justice, and respect for autonomy. The appropriate use of health IT and obligations of practitioners and developers are also covered. The document then examines privacy, security, and relevant laws including those related to HIPAA in the US and privacy in Thailand.
Legal, Ethical, Environmental, Economic and Social ImplicationsSabahtHussein
This document discusses several legal, ethical, environmental, economic and social implications of intellectual property rights, data storage, online marketing, and emerging technologies. It covers topics such as copyright, patents, trademarks, data protection principles, energy usage of data centers, online tracking and targeted advertising, social media issues, cybersecurity, privacy and the "right to be forgotten", and the rise of big data. The document provides an overview of these issues and their complex implications.
This document discusses privacy, security, and ethics as they relate to technology and personal data. It addresses threats to privacy from large databases, private networks, and the internet. It also covers security threats from computer criminals like hackers and issues around computer crime. Finally, it discusses ethics around copyright, software piracy, and plagiarism as shaped by digital technologies.
The document discusses security threats in eHealth (electronic health) systems. It outlines various motives for attacks on eHealth systems, including financial gain, revenge, intellectual challenge, and terrorism. Tactics that may be used include stealing devices, sniffing networks, social engineering, trojans, backdoors, and malicious apps. The document recommends solutions like strengthening technology, processes, user training, compliance, and information security governance to better secure eHealth systems and patient data.
When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage files on your network or potentially put sensitive data at risk. This free webinar will help you understand what the threats are and how your computers can get infected.
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile Convention
Mobile moments are the next battleground. Consumers will take control of the brand relationship via their smartphones.
Thomas Husson' slides on Mobile First and the fact that just being mobile first is not enough anymore.
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisMobile Convention
In the future, every company is an education company.
Kimo Quaintance's slides about the future of mobile security.
Kimo works at George C. Marshall European Center for Security Studies.
More Related Content
Similar to Wearables - Nothing new but it's time to build engaging experiences. | Mobile Convention 2015
Training for managers and supervisors presentationbrentcarey
The document discusses privacy training for managers and supervisors in the Southern Region. It aims to help them understand the past, current, and desired future privacy culture. It outlines why privacy is important, what information is considered sensitive, and managers' responsibilities regarding collecting, storing, sharing, and protecting personal data. The training identifies challenges to privacy compliance and provides strategies to build a strong privacy culture, such as designating Privacy Contact Officers and monitoring data access. The overall goal is to minimize privacy incidents and complaints by fostering a workplace where privacy is a priority.
This is a presentation I gave for the UQ Business School (in conjunction with Stan Gallo of KPMG) at the Urbane Restaurant to a group of Queensland CEO/C-Suite people. These dinners are part of UQ's engagement with the business community - a relationship we value. This engagement ensures we don't get all locked up in our ivory tower.
The document discusses goals and strategies for defensive information warfare, including protecting information resources from attacks that decrease availability to both offense and defense or decrease integrity. It outlines key areas of prevention, deterrence, detection, emergency preparedness, and response. Main goals are to provide cost-effective defense without limiting organizational capabilities.
Surveillance Systems And Studies That Should Be...Ann Johnson
The film Red Road depicts the negative impacts of CCTV surveillance on individual privacy and freedom. The main character Jackie works in the CCTV control room, constantly watching over others. This leads her to become obsessed with finding a man from her past. The film shows how CCTV surveillance can compromise people's privacy and cross ethical lines.
Red Road demonstrates how CCTV surveillance strips away individual privacy and freedom. Jackie is able to watch people going about their daily lives without their consent or knowledge from the CCTV control room. This level of constant monitoring would make most people feel uncomfortable, as if they are never truly
The document discusses social media, web 2.0, and privacy. It notes that while social media allows people to share information, it also means that personal data is increasingly collected and used in ways that impact privacy. The document outlines how companies collect and use personal data from social media as well as employees' online activities, and the privacy and legal issues this raises for both individuals and employers. It also provides recommendations for how companies can improve their data privacy and security practices.
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...m Habitat
This document summarizes key points about privacy and mobile health apps from a presentation given by Professor Jeremy Wyatt. It discusses how easily personal data can be identified even when anonymized, and how social media and mobile apps have increased data sharing. While health professionals are bound by ethics to protect patient data, companies freely trade personal data as a commodity. The document outlines some options for individuals to better control their personal data, and concludes that laws are tightening but individuals still need ways to protect their privacy in the digital era.
Securing people that don't look like you, yetLaura Bell
Developing a diagnostic framework to measure digital independence with an aim of providing integrated digital security assistance as part of community support and product design.
This document discusses introductory concepts of information security. It states that information is a valuable asset that needs protection, as it exists in many forms and goes through a lifecycle of being created, stored, processed, transmitted, used, and potentially lost or corrupted. The document outlines that information security aims to protect information from threats through logical, physical, and organizational controls, and that it ensures confidentiality, integrity, and availability of information. It emphasizes that information security is a process involving people, policies, and technology to manage risks to information in a proactive manner.
This document provides an information security training presentation covering several topics:
- The importance of information security and protecting personal, legal, corporate, and operational information.
- Risks of data breaches including regulatory fines, restoration costs, and reputational damage.
- Common causes of data breaches such as user error, insufficient protection methods, and deliberate leaks.
- Classifying information into categories like confidential, internal, and public.
- Information security best practices for email, mobile devices, cloud services, and handling physical documents.
- The company's information security policy and employees' responsibilities to understand and follow the policy.
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
In a data driven economy, analysts must be concerned with how data is collected, processed and subsequently used to improve online customer experiences, during those moments that matter.
Unlocking Value & Controlling Risk by #MindYourPrivacy
The document discusses information security and internet snooping. It defines security and notes that security risks can come from many sources like fire, theft, or loss. It then explores how technology like the internet, mobile devices, and digitization of information has expanded security risks, especially around personal information theft and exposure. The document outlines the many ways personal information can be collected, from public records to social media to purchases. It also discusses how collected information can be used, sold to third parties, or exposed. Finally, it provides some security best practices around awareness, limiting exposure, securing devices and networks, and establishing security policies.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Do you wish to know how important is data protection and how to train your employees on the data security measures? Then download this presentation now.
This document provides an introduction and overview of computer security and privacy. It discusses how computer security aims to protect information from unauthorized access while allowing intended use. Privacy involves protecting personal information. The document then covers physical security, network security, basic security objectives of confidentiality, integrity and availability. It provides examples of security policies, mechanisms, and goals of prevention, detection and recovery. Finally, it discusses the brief history of computer security and privacy and covers early efforts to address these issues through standards, legislation and security controls.
The document discusses several ethical and legal issues related to health information technology in Thailand. It outlines why these issues are important, including risks to patient outcomes and privacy. Key principles that guide ethics in health IT are discussed, such as non-maleficence, beneficence, justice, and respect for autonomy. The appropriate use of health IT and obligations of practitioners and developers are also covered. The document then examines privacy, security, and relevant laws including those related to HIPAA in the US and privacy in Thailand.
Legal, Ethical, Environmental, Economic and Social ImplicationsSabahtHussein
This document discusses several legal, ethical, environmental, economic and social implications of intellectual property rights, data storage, online marketing, and emerging technologies. It covers topics such as copyright, patents, trademarks, data protection principles, energy usage of data centers, online tracking and targeted advertising, social media issues, cybersecurity, privacy and the "right to be forgotten", and the rise of big data. The document provides an overview of these issues and their complex implications.
This document discusses privacy, security, and ethics as they relate to technology and personal data. It addresses threats to privacy from large databases, private networks, and the internet. It also covers security threats from computer criminals like hackers and issues around computer crime. Finally, it discusses ethics around copyright, software piracy, and plagiarism as shaped by digital technologies.
The document discusses security threats in eHealth (electronic health) systems. It outlines various motives for attacks on eHealth systems, including financial gain, revenge, intellectual challenge, and terrorism. Tactics that may be used include stealing devices, sniffing networks, social engineering, trojans, backdoors, and malicious apps. The document recommends solutions like strengthening technology, processes, user training, compliance, and information security governance to better secure eHealth systems and patient data.
When you have computers connected to the internet or to any external device, you need to take precautions. There are threats present that can not only cause harm to your computers, but could damage files on your network or potentially put sensitive data at risk. This free webinar will help you understand what the threats are and how your computers can get infected.
Similar to Wearables - Nothing new but it's time to build engaging experiences. | Mobile Convention 2015 (20)
Mobile First Will Not Be Enough | Forrester at Mobile Convention ParisMobile Convention
Mobile moments are the next battleground. Consumers will take control of the brand relationship via their smartphones.
Thomas Husson' slides on Mobile First and the fact that just being mobile first is not enough anymore.
The Future of Mobile Security | Kimo Quaintance at Mobile Convention ParisMobile Convention
In the future, every company is an education company.
Kimo Quaintance's slides about the future of mobile security.
Kimo works at George C. Marshall European Center for Security Studies.
F**ck the change | Stefanie Palomino at Mobile Convention London 2016Mobile Convention
Watch Stefanie's presentation at: https://www.youtube.com/watch?v=YmW2ykIuOwc
Everything will change. Everything will be digital. Everything will be mobile!
A controversial presentation of Stefanie Palomino (mobile visionair) about how the mobile growth will affect our lives.
Size Doesn't Matter | Twitter at Mobile Convention London 2016 Mobile Convention
"No matter on which medium your advertising reaches a consumer, they are still a real-live human being & you must connect to them on that level."
Twitter's Ashley Vinson on Mobile Advertising and how you should do that from a brand perspective.
Brand Side of Digital Disruption | Ramon Luijten - EMansion | Mobile Conventi...Mobile Convention
The document is about eMansion, a company that provides customer engagement solutions such as proximity-loyalty apps, live video streaming, 360 3D virtual reality, and creative storytelling to help customers activate, generate traffic, create experiences, and increase conversion and loyalty. It discusses how digital disruption is changing the customer experience and presents opportunities for companies to connect with customers, listen and adapt, provide surprises, and stay relevant through new technologies like virtual and augmented reality.
Mobility Past, Present & Future - A personal journey through time | Mobile Co...Mobile Convention
The presentation of IBM, Gold sponsor of Mobile Convention Brussels 2015. Dean Murphy, MobileFirst Business Leader at IBM takes on a journey of his personal experiences of mobility and it’s evolution over the last few years to where we are today. To do this we need to go back in time.
Avoiding the pitfalls and harnessing the opportunities of Mobile today | Mobi...Mobile Convention
Make sure to listen to his interview at: https://youtu.be/1xdh4YyP4P4
This is the presentation of Mobile Marketing Expert David Skerrett at Mobile Convention Brussels. David was interviewed by Peggy Anne Salz (top 25 Mobile Marketing influencer).
David Skerrett works with his ''next generation'' agency for many big companies like Jameson, BBC, Sky and many more. David won over 25 awards for his mobile campaigns. David Skerrett is interviewed by Peggy Anne Salz about his experience on mobile, to see the opportunities as a brand an how to avoid the common pitfalls when you go mobile.
Mobile Convention Brussels 2014 - InBeacon - Remco BronMobile Convention
Beacons use Bluetooth Low Energy technology to detect nearby smartphones and other devices, allowing businesses to send contextual messages and offers to customers within physical locations. Many large retailers and brands are experimenting with beacon implementations to improve customer service, drive purchases, and collect consumer behavior data through proximity marketing. Beacons have the potential to close the loop between the online and offline worlds by personalizing the customer experience across physical stores and digital channels.
Mobile Convention Brussels 2014 - Proximus - Eefje Vanhullebusch Mobile Convention
This document discusses advanced telco services including SMS solutions, smart ticketing, and the Internet of Things (IoT). It provides examples of how SMS can be used for applications like appointment reminders and reducing unpaid invoices. Smart ticketing solutions allow cities and companies to issue and collect payment for tickets digitally. The document also discusses how IoT connects everyday objects through sensors and gateways to create applications that can optimize costs, maximize efficiency, and drive innovation for businesses.
Mobile commerce is growing rapidly, with mobile devices becoming central to the shopping experience. By 2018, nearly half of all e-commerce in Europe will be done on mobile devices, worth €142 billion. Mobile payments are also increasing significantly, expected to reach $507 billion globally by 2014. However, consumers want mobile commerce and payments to be simple and secure. Retailers need to focus on engaging customers through mobile, such as by using beacons, to improve the shopping experience and drive sales across channels. Many retailers still lag in implementing effective mobile strategies.
Mobile Convention Brussels 2014 - Maurice Jongerius - Bol.comMobile Convention
This document discusses mobile trends at Bol.com from 2014-2019, including rising smartphone traffic that surpassed tablets and desktops. It also lists several mobile initiatives for Bol.com like mobile loyalty programs, contactless payments, augmented reality product info, and same-day delivery to enhance customer shopping experiences across various devices.
Mobile Convention Brussels 2014 - Filip Nuytemans UberMobile Convention
Presentation of Filip Nuytemans - Uber at Mobile Convention Brussels 2014. During Mobile Convention Brussels we had an interview with Filip: https://www.youtube.com/watch?v=SIKi5ORn8dI
Mobile Convention is crossing borders. Make Sure to check out our following events:
- Mobile Convention London, is holding on March 26th | www.mobileconventionlondon.uk
- Mobile Convention Amsterdam, is holding on March 26th | www.mobileconventionamsterdam.com
Mobile Convention Brussels 2014 - Benjamin TysebaertMobile Convention
This document discusses the growth of mobile payments, providing statistics showing mobile payments surpassing desktop payments in Europe, Asia, North America, and Latin America. Examples are given of mobile payment solutions for donations using Twitter and adjusting the payment method based on device. Best practices for mobile app payments include seamless registration with one click, retaining user information, connecting payment methods to apps, focusing on small amounts, and selecting the most relevant payment method. The future of payments is predicted to include European banking licenses, growth of European payments and Instantpay, and more flexible subscriptions/donations.
Mobile Convention Brussels 2014 - Tom van den BroekMobile Convention
Mobile Convention in Brussels on November 27th will feature Tom van den Broek discussing mobile trends in news and sports. NOS mobile app and site usage has grown significantly. In 2014, major sports events drove 250k extra app downloads. Looking ahead, opportunities exist in wearables, mobile TV engagement, and using mobile to drive content discovery on the big screen, though linear TV likely still has a place. Attendees should contact Tom van den Broek for more information.
This document discusses mobile payments and analyzes Apple Pay. It provides background on early mobile payment solutions from 2000-2014 that failed to gain traction. It then summarizes how Apple Pay works, including using Touch ID for authentication and storing card details securely on devices. The document also discusses Apple Pay's potential business model of charging a 0.15% cut of transaction values and how it relies on existing payment networks and processors rather than creating a new ecosystem.
Presentation of Kimo Quaintance about mobile privacy en mobile security at Mobile Convention Brussels 2014. During Mobile Convention Brussels we had an interview with Kimo. Watch it here: https://www.youtube.com/watch?v=syRKq8bC1ks
Watch the full session here: https://www.youtube.com/watch?v=um0Ga72xTJc
Mobile Convention is crossing borders, make sure to check our following events:
- Mobile Convention London: March 26th - www.mobileconventionlondon.uk
- Mobille Convention Amsterdam | June 4th 2015 | http://www.mobileconventionamsterdam.nl/
This document discusses privacy-friendly and secure access control via mobile devices. It proposes a framework that minimizes personal data disclosure through anonymous credentials, local profiles controlled by the user, and micro-incentives. This allows for customization and prevents abuse while rewarding loyalty. The framework separates concerns for software developers, service providers, technology providers and users to facilitate integration in a privacy-friendly manner. Two example applications (inShopnito and avisPoll) are evaluated using this framework.
Connect is an interactive TV system developed by RTL Belgium that allows viewers to engage with content and ads on a second screen like a smartphone or tablet. It uses watermarking and time-syncing to link the TV programming and second screens. This increases viewer engagement, especially for ads. Over 1 million RTL apps have been downloaded, with 41% of downloads for the TV channel apps that have Connect features. Connect ads have seen a 19% increase in unaided recall, 58% higher ad relevance, and 83% higher persuasion value. RTL aims to continue expanding Connect to more channels and features like coupons, e-commerce, and collecting customer data.
The document summarizes trends in mobile app development based on a talk by Chris Heilmann. It notes that iOS dominates the high-end market while Android has most other areas. Windows Phone is gaining developer interest but not users. It discusses Android fragmentation, the dominance of HTML5 for cross-platform development, and how a majority of developers struggle to earn over $500 per month from their apps despite games dominating app store revenues. It also covers the usage of third party tools, differences between platforms, and emerging areas like wearables and the Internet of Things.
The document discusses trends in mobile app and web usage. It notes that time spent in mobile apps is increasing, with over 80% of mobile time now spent in apps rather than mobile websites. It also discusses the growing popularity of Android devices and how mobile usage is shifting to apps on smartphones and tablets. Emerging technologies like smartwatches, connected home devices, and beacons may further influence mobile trends.
2. Wearables are nothing new
We tend to use wearables like we are used to:
Health monitoring
Quantified Self
Problem: narrow scope & retention
Christophe Benoit
3. What is new:
ability to communicate and interact
How is my stomach doing this morning?
Network of wearables for monitoring with
centralisation of data
Problem: egocentric (retention)
Christophe Benoit
6. Wearable activities
Check in/out
Small payments
Personal contextual notifications
Identification (loyality cards)
Evolving to a necessity
Christophe Benoit
8. Privacy / Security
Two perspectives
User
Social network
Three types of issues
Data specific (right to forget, fear about what is done with the data)
Device / application specific (social, criminal, )
Sensor specific (location, speech, images, videos)
Possibly continuous & discreet
Data collection & processing
Data transmission & storage
Sensor data / images / videos
Surveillance
Expose details by combining data
Awareness & consent: often problematic
Steven Palmaers
9. Privacy / Security
What information is gathered? In what detail? How is it collected?
How long is the information kept?
How is the information used? Is it sold?
Who has ownership? Right to be forgotten.
Different access roles for different groups of users
Can the user modify / tamper with / delete the data?
Transmission / storage
Encryption of data => privacy policies
Steven Palmaers
10. Privacy / Security
Wrist-mounted vs. head-mounted
Wrist-mounted seems less intrusive
GPS data is perceived as the most sensitive
(Lack of) access control
Non-disclosure => sensitive notifications are visible to people around
you
Hands-free operation => speech input / facial recognition
Social media / real-time updates
Data protection laws (per country, European, …)
Steven Palmaers
11. Privacy / Security
new technologies => new possibilities => new security threats
Secure communication
Wi-fi / Bluetooth
Sensitive data (e.g. pin codes, financial data, …)
Fraud
Medical or financial history / insights
Third party apps / malware
Steven Palmaers
12. Contact information
Christophe Benoit
Erasmus University College Brussels
christophe.benoit@ehb.be
+32 471 32 11 75
Steven Palmaers
PXL University College Hasselt
Steven.palmaers@pxl.be
+32 472 67 06 44