GRAD695 ?Harrisburg Anonymizing Voice Input in Mobile Devices

User Generated

Zvpxl_I

Computer Science

grad 695

Description

A research topic must be SMART, related to the major you are pursuing in the university, and a topic that you must be passionate about. In this assignment, submit a double-spaced paper written in APA style and backed by pieces of scholarly evidence, stating your topic and proving that the topic is SMART, related to your major, and a topic you are passionate about. Remember that this paper is a research paper and must include a title page, an abstract, and table of contents before the body of the paper. Your submission must be an MS-Word document. Do not zip file ending with .RAR or any other type of files that is not compatible with the windows environment. Your submission must not be in PDF format. You must also submit a power-point presentation of the paper submitted. The PPT will have only 5 slides.


Before starting please contact me as need to finalize the topic on which in future research paper will be written in continuity to this topic.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

here you go

Running Head: Anonymizing Voice Input in Mobile Devices

Human-Computer Interaction: Anonymizing Voice Input in Mobile Devices
Student Name
Course/Number
Due Date
Faculty Name

1

Anonymizing Voice Input in Mobile Devices

2

Table of Contents
I.

Abstract ................................................................................................................................................. 3

II.

Introduction ........................................................................................................................................... 4

III.
1.

Privacy Risks .................................................................................................................................... 5

2.

Security Risks ................................................................................................................................... 6

IV.
V.

Existing Risks ................................................................................................................................... 5

Proposed Solution ............................................................................................................................. 6
SMART Criteria.................................................................................................................................... 7

References ..................................................................................................................................................... 8

Anonymizing Voice Input in Mobile Devices

I.

3

Abstract

Human-computer interaction (HCI) refers to the study of people’s interaction with
computers and the extent to which computers are or aren’t developed for interacting with humans
successfully. Historically, excluding a few, most computer system developers failed to pay enough
attention to ease of use of computers. Arguably, even today some computer users would say that
not enough attention is paid by computer makers in ensuring their products are user friendly.
Computer system developers may however defend themselves by illustrating the extreme
complexity of designing and making computer products and that the demand for services rendered
by computers has always beaten the demand for ease of use. Mobile devices nowadays use an input
class that offers users access to features such as touchscreen, geographical input and accelerometer
and even voice input. Through voice input, user experience has greatly improved by allowing them
to operate their devices hands free. A technology key to voice input is speech recognition, which
often gets outsourced to the cloud for optimal performance. Outsourcing to the cloud however,
comes with its own risks since the privacy of a user can easily be compromised by matching a
voice to a specific user, using speech recognition to learn their sensitive input content and further
profiling users based on such content.
This paper aims to reveal possible solution to the security concern earlier mentioned,
through an intermediate between users and the cloud, which creates user anonymity...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags