{"title":"地点,地点,地点:对蓝劫持行为的研究","authors":"Jennifer Thom-Santelli, A. Ainslie, Geri Gay","doi":"10.1145/1240866.1241064","DOIUrl":null,"url":null,"abstract":"We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones within a transmission range of 10 meters. A content analysis was conducted on 427 bluejacks from Bluejackq, an online community of bluejackers, in which the contextual characteristics of bluejacking were examined. Bluejacking was found to be highly location-dependent, primarily transpiring in everyday public places. The message content of the bluejacks was also inspired by the physical location where bluejacking took place. We also discuss implications of bluejacking with regards to its relationship to public space and comment on how these findings are relevant to mobile social computing.","PeriodicalId":294433,"journal":{"name":"CHI '07 Extended Abstracts on Human Factors in Computing Systems","volume":"307 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Location, location, location: a study of bluejacking practices\",\"authors\":\"Jennifer Thom-Santelli, A. Ainslie, Geri Gay\",\"doi\":\"10.1145/1240866.1241064\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones within a transmission range of 10 meters. A content analysis was conducted on 427 bluejacks from Bluejackq, an online community of bluejackers, in which the contextual characteristics of bluejacking were examined. Bluejacking was found to be highly location-dependent, primarily transpiring in everyday public places. The message content of the bluejacks was also inspired by the physical location where bluejacking took place. We also discuss implications of bluejacking with regards to its relationship to public space and comment on how these findings are relevant to mobile social computing.\",\"PeriodicalId\":294433,\"journal\":{\"name\":\"CHI '07 Extended Abstracts on Human Factors in Computing Systems\",\"volume\":\"307 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CHI '07 Extended Abstracts on Human Factors in Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1240866.1241064\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CHI '07 Extended Abstracts on Human Factors in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1240866.1241064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Location, location, location: a study of bluejacking practices
We present an initial exploration of bluejacking, the practice of using Bluetooth-enabled mobile phones to send unsolicited messages to other Bluetooth-enabled mobile phones within a transmission range of 10 meters. A content analysis was conducted on 427 bluejacks from Bluejackq, an online community of bluejackers, in which the contextual characteristics of bluejacking were examined. Bluejacking was found to be highly location-dependent, primarily transpiring in everyday public places. The message content of the bluejacks was also inspired by the physical location where bluejacking took place. We also discuss implications of bluejacking with regards to its relationship to public space and comment on how these findings are relevant to mobile social computing.