Skip to main content
Log in

Design of trustworthy smartphone-based multimedia services in cultural environments

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

Smartphone is a dynamic new media that faces high popularity due to its versatile services and the friendliness of its usage. It can be used in many activities of everyday life from e-commerce to e-tourism. In this work, we study smartphone’s secure usability in cultural heritage sites and environments. Our goal is to make a first attempt towards a trustworthy commercial multimedia guiding system targeting cultural sites that will be executed in a set of smartphones. More specifically, we are interested in how the needs of curators and visitors, experts or not, of a cultural heritage site can be facilitated by the provided multimedia guiding services of smartphones employing trustworthy implementations of smartphone services that are controlled by a central server. Furthermore, we make an attempt to propose a simple business model for the commercial exploitation of such services.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Adolphs, C., & Winkelmann, A. (2010). Personalisation research on e-commerce—a state of the art review (2000–2008). Journal of Electronic Commerce Research, 11(4), 326–341.

    Google Scholar 

  2. Al Bouna, B., & Chbeir, R. (2006). Multimedia-based authorization and access control policy specification. In Proc. of the 3rd ACM workshop on secure web services (pp. 61–68).

    Chapter  Google Scholar 

  3. Arnold, D. (2008). Paster’s quadrant: cultural heritage as inspiration for basic research in computer science. Journal on Computing and Cultural Heritage, 1(1).

  4. Bakos, Y. (1998). The emerging role of electronic marketplaces on the Internet. Communications of the ACM, 41(8), 35–42.

    Article  Google Scholar 

  5. Bengtsson, A., & Westerdahl, L. (2005). Secure choreography of cooperating web services. In Proc. of the 3rd European conference on web services (pp. 152–159).

    Google Scholar 

  6. Bichler, M., Field, S., & Werthner, H. (2001). Introduction: theory and application of electronic market design. Journal of Electronic Commerce Research, 1, 215–220.

    Article  Google Scholar 

  7. Celentano, A., Orsini, R., Pittarello, F., & Barbieri, G. (2009). Design and evaluation of a mobile art guide on iPod touch. In Proc. of the ID&A interaction design & architecture(s) (Vol. 5–6, pp. 77–80).

    Google Scholar 

  8. Chen, S., Shyu, M., & Zhao, N. (2004). SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database. In Proc. of the 12th annual ACM international conference on multimedia (pp. 432–435).

    Chapter  Google Scholar 

  9. Ciocca, G., Colombo, A., Gagliardi, I., & Schettini, R. (2008). Intangible heritage management and multimodal navigation. In Proc. of the 4th international conference AXMEDIS (pp. 95–102).

    Google Scholar 

  10. Cutrí, G., Naccarato, G., & Pantano, E. (2008). Mobile cultural heritage: the case study of locri. In Proc. of the edutainment (pp. 410–420).

    Google Scholar 

  11. Davison, J., Walsh, A., & Brown, D. (2000). Mobile e-commerce: market strategies. London: Ovum Research Ltd.

    Google Scholar 

  12. Galani, A., Chalmers, M., Brown, B., McColl, I., Randell, C., & Steed, A. (2003). Developing a mixed reality co-visiting experience for local and remote museum companions. In Proc. of the 10th conference human computer interaction (pp. 1143–1147).

    Google Scholar 

  13. Giordano, C., Modeo, S., Bernardi, G., & Ricchiuti, F. (2007). Using mobile phones as remote control for ubiquitous video-recording. In Proc. of the 6th international conference MUM (Vol. 284, pp. 125–130)).

    Google Scholar 

  14. Habib, S. M., Jacob, C., & Olovsson, T. (2009). An analysis of the robustness and stability of the network stack in symbian-based smartphones. Journal of Networks, 4(10), 968–975.

    Article  Google Scholar 

  15. Hjorth, L. (2009). The big bang: an example of mobile media as new media. Computer in Entertainment, 7(2), 1–13.

    Article  Google Scholar 

  16. Housley, R., & Ford, W. (1999). Internet X.509 public key infrastructure certificate and CRL profile. RFC 2459.

  17. Kodali, N. B., Farkas, C., & Wijesekera, D. (2004). An authorization model for multimedia digital libraries. Journal of Digital Libraries, 4(3), 139–155.

    Article  Google Scholar 

  18. Koukopoulos, D. K., & Styliaras, G. D. (2010). Security in collaborative multimedia web-based art projects. Journal of Multimedia, 5(5), 404–416.

    Article  Google Scholar 

  19. Mostarda, L., Dong, C., & Dulay, N. (2008). Place and time authentication of cultural assets. In Proc. of the IFIP (Vol. 263, pp. 279–294).

    Google Scholar 

  20. Mukkamala, R., Kamisetty, V., & Yedugani, P. (2009). Detecting and resolving misconfigurations in role-based access control. Information Systems Security, 5905, 318–325.

    Article  Google Scholar 

  21. Museum of Modern Art (2013). http://www.moma.org.

  22. National Museum of Contemporary Art (2013). http://www.emst.gr.

  23. Oberheide, J., & Jahanian, F. (2010). When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments. In Proc. of the 11th international workshop mobile computing systems and applications (pp. 43–48).

    Google Scholar 

  24. Renaud, K., & Angeli, A. (2009). Visual passwords: cure-all or snake-oil. Communications of the ACM, 52(12), 135–140.

    Article  Google Scholar 

  25. Sauer, S., & Gobel, S. (2003). Focus your young visitors: kids innovation-fundamental changes in digital edutainment. In Proc. of the conference museums and the web (pp. 131–141).

    Google Scholar 

  26. Sharma, A. (2008). Bluetooth security issues: threats and consequences. In Proc. of the 2nd national conference COIT (pp. 78–80).

    Google Scholar 

  27. Sinkovics, R., Yamin, M., & Hossinger, M. (2007). Cultural adaptation in cross border e-commerce: a study of German companies. Journal of Electronic Commerce Research, 8(4), 221–235.

    Google Scholar 

  28. Stallings, W. (2006). Cryptography and network security: principles and practice. New York: Prentice Hall.

    Google Scholar 

  29. Tarasewich, P., Nickerson, R. C., & Warkentin, M. (2002). Issues in mobile e-commerce. Communications of the Association for Information Systems, 8, 41–64.

    Google Scholar 

  30. Tsekleves, E., & Cosmas, J. (2003). Promoting and disseminating cultural heritage sites to people on the move. In International cultural heritage informatics meeting 2003. Archives & Museums Informatics Europe

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitrios Koukopoulos.

Additional information

Part of this work has been appeared in the Proceedings of the 2011 International Conference on Multimedia Information Networking and Security (MINES’11), pp. 604–608, IEEE Computer Press, Shanghai, China, 2011.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Koukopoulos, D., Styliaras, G. Design of trustworthy smartphone-based multimedia services in cultural environments. Electron Commer Res 13, 129–150 (2013). https://doi.org/10.1007/s10660-013-9112-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-013-9112-5

Keywords

Navigation