Consumer Protection

User Guide | Data Integrity

Posted by VivianOnano on Nov 21, 2011
User Guide | Data Integrity data sheet 709 Views
Author: 
Frontline SMS
Publication Date: 
Aug 2011
Publication Type: 
Report/White paper
Abstract: 

FrontlineSMS is a software platform that enables structured communication via text messaging, using only a computer and a mobile phone or GSM (Global System for Mobile) modem. The platform enables two-way messaging between users and groups of people via mobile networks without the need for an Internet connection.

The purpose of this guide is to provide FrontlineSMS users designing, implementing, and monitoring programs with data integrity concerns in mind with a data integrity framework. The guide is intended to help users to understand, analyze, and address the vulnerabilities, risks and threats that can affect the integrity of the information communicated through the FrontlineSMS platform.

 

Featured?: 
Yes

Global Mapping of Technology for Transparency and Accountability

Posted by ccarlon on Oct 21, 2011
Global Mapping of Technology for Transparency and Accountability data sheet 1368 Views
Author: 
Avila, Renata, Hazel Feigenblatt, Rebekah Heacock, and Nathaniel Heller
Publication Date: 
Jan 2010
Publication Type: 
Report/White paper
Abstract: 

As internet and mobile phone use increases, technology is transforming the field of transparency and accountability making it an increasingly dynamic space across the globe. Technology is helping to improve citizen participation in decision-making and producing new ways of identifying public service challenges through processes such as ‘data mashing’.

This paper documents current trends in the way technology is being used to promote transparency in different parts of the world. It reviews over 100 projects from across Africa, Asia, Europe and Latin America, examining how new technologies are re-energising traditional methods. In particular, it focuses on how these new technologies are helping to engage different actors from citizens, media, authorities and the private sector.

Our research finds promising success stories alongside less accomplished examples. The authors argue that a key element of successful technology use in transparency and accountability efforts is their speed – both in execution and in stimulating change. Well-designed efforts produced relevant and usable information that can be used to demand accountability quickly. Technology for transparency and accountability tools need not be sophisticated, but it does need intelligent design that is relevant to the local context. Projects also have a better chance of effectively producing change when they take a collaborative approach, sometimes involving government.


Telecom Regulatory Authority of India: Consultation Paper on Certain Issues relating to Telecom Tariffs

Posted by VivianOnano on Jul 15, 2011
Telecom Regulatory Authority of India: Consultation Paper on Certain Issues relating to Telecom Tariffs data sheet 2031 Views
Author: 
Bhawa, Mahanagar Doorsanchar.
Publication Date: 
Oct 2010
Publication Type: 
Report/White paper
Abstract: 

Service providers periodically publish different tariff offers with the objective of both customer acquisition and customer retention. Transparency in the provision of telecommunication services and tariff offers has always been and continues to be of prime concern to the Authority. TRAI has in the past taken several steps to enhance transparency in tariff offers.

The Authority, however, is receiving several complaints and representations from consumers and their representatives seeking further effective transparency measures. In view of the increased competition as well as the spread of telecom activity to rural areas, the relevance of having a more transparent regime for tariff offerings cannot be overemphasised.  At the same time, service providers and their associations have also raised certain concerns. This consultation paper brings out various issues that have a bearing on telecom tariff offers.


Four Billion Little Brothers? Privacy, Mobile Phones, and Ubiquitous Data Collection.

Posted by VivianOnano on Jun 30, 2011
Four Billion Little Brothers? Privacy, Mobile Phones, and Ubiquitous Data Collection. data sheet 2139 Views
Author: 
Shilton,Katie.
Publication Date: 
Aug 2009
Publication Type: 
Report/White paper
Abstract: 

Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy? They place calls, surf the Internet, and there are close to 4 billion of them in the world. Their built-in microphones, cameras, and location awareness can collect images, sound, and GPS data. Beyond chatting and texting, these features could make phones ubiquitous, familiar tools for quantifying personal patterns and habits. They could also be platforms for thousands to document a neighborhood, gather evidence to make a case, or study mobility and health. This data could help you understand your daily carbon footprint, exposure to air pollution, exercise habits, and frequency of interactions with family and friends.

 

Featured?: 
No

Secure Protocol for Short Message Service

Posted by VivianOnano on Jun 07, 2011
Secure Protocol for Short Message Service data sheet 1389 Views
Author: 
Ahmeda, S. Shubat and Ashraf M. Ali Edwila
Publication Date: 
Jan 2009
Publication Type: 
Report/White paper
Abstract: 

 

In the mobile communication systems, security (encryption) offered by the network operator only applies on the wireless link. Data delivered through the mobile core network may not be protected. Existing end-to-end security mechanisms are provided at application level and typically based on public key cryptosystem.

The main concern in a public-key setting is the authenticity of the public key; this issue can be resolved by identity-based (IDbased) cryptography where the public key of a user can be derived from public information that uniquely identifies the user.

This paper presents an encryption mechanism based on the IDbased scheme using Elliptic curves to provide end-to-end security for SMS. This mechanism has been implemented over the standard SMS network architecture and the encryption overhead has been estimated and compared with RSA scheme. This study indicates that the ID-based mechanism has advantages over the RSA mechanism in key distribution and scalability of increasing security level for mobile service.

 


The Mobile Minute: Android Malware, Revolutions and ICT, Revenue from Apps

Posted by AnneryanHeatwole on Mar 07, 2011

Today's Mobile Minute features mobile app revenue, context around ICTs and revolutions in the Middle East, an infographic of the top mobile operating systems around the world, new funds for telecommunications in Iraq, and malware in the Android app store.

  • A new report from Forrester Research estimates that revenue from mobile apps will reach $38 billion by 2015. The New York Times looks at the data from the report and examines what it means for the future growth of the app market.

Towards End-to-End Security in Branchless Banking

Posted by MarkWeingarten on Feb 22, 2011
Towards End-to-End Security in Branchless Banking data sheet 1562 Views
Author: 
Panjwani, Saurabh
Publication Date: 
Feb 2011
Publication Type: 
Report/White paper
Abstract: 

Mobile-based branchless banking has become one of the key mechanisms for extending financial services to disenfranchised populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-layer services for securing transactions and do not implement any application-layer security. Recent attacks on some of the most popular branchless banking systems show that these systems are not end-to-end secure.

In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer of the protocol and guarantee end-to-end security to system users. Our main contribution is a threat model which effectively captures the goals of end-to-end authenticated transactions in branchless banking. This model, besides incorporating the obvious external threats to a protocol, also accounts for the possibility of insider attacks - those mountable by banking agents or other human intermediaries in the system. We then provide recommendations for solution design based on the security requirements of our model and the infrastructural constraints under which branchless banking systems operate.


Consumentor Ek. förening

Posted by Ola Thorsen on Apr 15, 2010

Consumentor is a cooperative with 10 employes.Our goal is to offer a simple and flexible tool that enables all consumers to make longterm sustainable consumer choises on a daily bases. It should be easy, fun and awarding to do right !

Organization Type: 
Commercial
Address: 
House of Win-Win, Tredje Långgatan 13 B
State/Province: 
Västra Götaland
City: 
Gothenburg
Country: 
Sweden
Postal code: 
41303

Qton Solutions

Posted by penunn on Nov 04, 2009

Qton Solutions

Qton provides development and government organisations in the emerging markets with appropriate mobile and web based applications.

With extensive experience in mobile applications and software development Qton has a knowledgeable team committed to supplying affordable and effective solutions.

Aim

To assist organisations achieve their aims by enabling basic mobile phones to:

Organization Type: 
Commercial
Address: 
139 Oxford Road
State/Province: 
Cambs
City: 
Cambridge
Country: 
UK
Postal code: 
43

Peace Corps

Posted by AnneryanHeatwole on Sep 01, 2009

The Peace Corps traces its roots and mission to 1960, when then-Senator John F. Kennedy challenged students at the University of Michigan to serve their country in the cause of peace by living and working in developing countries. From that inspiration grew an agency of the federal government devoted to world peace and friendship. Since that time, more than 195,000 Peace Corps Volunteers have served in 139 host countries to work on issues ranging from AIDS education to information technology and environmental preservation.

Organization Type: 
Government
State/Province: 
n/a
City: 
Washington, D.C.
Country: 
USA

Blurring Livelihoods and Lives The Social Uses of Mobile Phones and Socioeconomic Development

Posted by LeighJaschke on Jul 18, 2009
Blurring Livelihoods and Lives The Social Uses of Mobile Phones and Socioeconomic Development data sheet 1705 Views
Author: 
Donner , Jonathan
Publication Type: 
Journal article
Abstract: 
This paper focuses on how this intermingling of lives and livelihoods, as mediated by the mobile phone, figures into the micro-processes of economic development. It neither broadly elaborates the core contributions of mobile phone use to economic development (synchronizing prices, expanding markets, reducing transport costs, etc.), nor suggests that one kind of mobile use is more important than another. Instead, it argues simply for a perspective on work and on livelihoods that is broad enough to account for (and perhaps even take advantage of) the social processes surrounding these activities. Analysts, policymakers, and technologists interested in the application of Mobiles for Development (M4D) should not ignore the way mobiles blur livelihoods and lives; the developmental and nondevelopmental uses of the mobile are not in competition, nor are they always distinguishable. Instead, the uses of mobiles for developmental and non-developmental purposes are often interrelated and sometimes mutually reinforcing. The social functions of the mobile (in matters of connection and self-expression) are helping drive its widespread adoption, and these same functions inform the very behaviors that make the mobile a tool for economic development.

Good Guide - Green Product Info To Your Phone

Posted by KatrinVerclas on Sep 11, 2008

We have written a lot about providing consumers with just-in-tine information about products on their mobile.  Shoppers can receive an SMS about sustainable fish or climate impact of products already.  This is the idea of the new GoodGuide, a new start-up spun out of the University of Berkeley. Good Guide provides 'green' consumer information for shoppers who want to buy products in line with their values.

The brainchild of Dara O'Rourke, an enterprising UC Berkely professor, Good Guide came online yesterday.  The 61,000 products already in the database contain hundreds of datapoints. They are organized into three categories: health, social and environmental impact. Currently, there are two product types only: personal care and household chemicals. Food, electronics, toys, and apparel are to be added over the next several months.