Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2016, International Journal of Scientific & Technology Research
…
4 pages
1 file
Today, in many parts of the world, it is becoming more and more widespread for users to be tracked by mobile smart phone platforms. An apparent motive for this is that numerous advertising companies are utilizing smart phone platforms more than they did some time ago. This is a significant area of this study as most users think that being tracked is a big disadvantage in life while others take a different view. Smart phone technologies provide a massive amount of practical features to individuals but at the same time they extremely influence confidentiality of the users. On the other hand, smart phones technologies are not efficient in appropriately communicating confidentiality threats to individuals. Moreover, widespread confidentiality threat communication techniques in smart phone application ecosystems do not consider the real data access behavior of user applications in their threat evaluations. The purpose of this paper is to present some of arguments and considers whether, on balance, it is truly a disadvantage to be tracked by smart phone platforms.
International Conference for Emerging Technologies in Computing, 2019
Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distrustful of their smartphones, never knowing which application threatens to expose them. In this paper, we have conducted an in-depth review of the significance of smartphones in human life, and we have discussed the methods used by various authorities to collect and exploit users' data for enigmatic benefits. Moreover, we surveyed the smartphone users to identify the vulnerabilities leading to privacy violation, and to examine their knowledge about the protection mechanisms. We determined that Technology and Human are the two major vulnerabilities that are exploited to invade users' privacy. It is the necessity of the moment for the researchers and developers to formulate solutions that could be used to educate and protect smartphone users from potential threats and exploitation of data.
International Journal of Mobile Network Design and Innovation, 2013
A sharp increase in mobile device and applications raise serious concern on individual privacy risk in smartphone. Capabilities of current mobile device which enable it to have similar functionality with notebook inspires user to use it for many purposes. However, the scenario attracts attacker to intrude privacy in order to gain data on the device for specific purpose. This paper presents a preliminary study on privacy risks in smartphone environment from individual user perspective. The contribution of this paper is two fold. First, the privacy risks are reviewed from physical and logical viewpoint. Then an online survey is conducted to gain initial perception of privacy practice among users. Second contribution is by providing and discussing a guideline to deal with privacy risk incident on smartphone. As conclusion, future work and research on privacy risk is discussed to generate more contributions in this area.
Mobile Networks and Applications
Our smartphone is full of applications and data that analytically organize, facilitate and describe our lives. We install applications for the most varied reasons, to inform us, to have fun and for work, but, unfortunately, we often install them without reading the terms and conditions of use. The result is that our privacy is increasingly at risk. Considering this scenario, in this paper, we analyze the user's perception towards privacy while using smartphone applications. In particular, we formulate two different hypotheses: 1) the perception of privacy is influenced by the knowledge of the data used by the installed applications; 2) applications access to much more data than they need. The study is based on two questionnaires (within-subject experiments with 200 volunteers) and on the lists of installed apps (30 volunteers). Results show a widespread abuse of data related to location, personal contacts, camera, Wi-Fi network list, running apps list, and vibration. An in-depth analysis shows that some features are more relevant to certain groups of users (e.g., adults are mainly worried about contacts and Wi-Fi connection lists; iOS users are sensitive to smartphone vibration; female participants are worried about possible misuse of the smartphone camera).
2013
After the recent spread of the Internet, many technology terms appeared like Smartphone, social media and cloud computing. Flexibility in use this technology encourage people to communicate and share their information in all kinds: photos, videos, documents and sometimes sensitive information like bank account. Annually we note the increased number of users of this technology to be arrived over billions of users. Most of these users are public which they do not realize ambiguity of technology and therefore easier to access their information. The abundance of information and poor knowledge of users about privacy led to the emergence of numerous threats and fears under this term. Thus, the importance of educating people about privacy issues and related risk factors become essential. This paper views the definition of privacy and what level of awareness should be applied. With try to understand some security issues and related laws. And compare between two different privacy laws.
2011
This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users. The primary objective was to shed light on the level of information security awareness in smartphone users and determine the extent of sensitive information such users typically hold on these mobile devices.
2014
Our individual privacy is increasingly at risk in a world full of smart mobile devices. The situation will only get worse with the rise of an Internet of Things. One way to address this problem is through the use of systems that better understand their context and and whose information gathering and sharing behaviors can be controlled or influenced by context-aware policies. We illustrate the the problem and an approach to address it through recent work on FaceBlock, a project that protects the privacy of people around Google Glass users by making pictures taken by the latter, Privacy-Aware. Through sharing of privacy policies, users can choose whether or not to be included in pictures.
2020
Over the last several months, global innovators have developed a heterogenous array of “smart” technology protocols and applications aimed at tracking, tracing, and containing the spread of the novel coronavirus, SARS-CoV-2, which causes the disease COVID-19. The United States, which has left it to the states to acquire or build their own automated track and trace platforms, currently lags behind other countries. However, technology companies Apple and Google have announced co-production of a digital tracing platform for their phones. As this Chapter details, the United States lacks a comprehensive federal health data privacy law that protects the privacy of sensitive information collected and stored by digital contact tracking applications. The Chapter also explains how digital COVID-19 surveillance applications work, assesses their effectiveness from a public health perspective, and enumerates the legal and ethical issues they implicate. It concludes with proposals aimed at maximi...
El Profesional de la Información
This article aims to offer a guide of observed practices based on the main results obtained after the two-year European Feder project (April 2013-15) 'Public and private in mobile communications' carried out at LabCom.IFP, Beira Interior University in Portugal. Both quantitative and qualitative methods were used (surveys, interviews, focus groups, content analysis, digital ethnography, observation ethnography, workshops, etc.) in order to describe how users manage their public, private, intimate and personal spheres within the mobile media ecosystem. Results obtained showed an increased awareness of the risks without a concomitant exploration of consequences, an extensively circumstantial behaviour pattern influenced by interface design and volatile policies, terms and conditions, and a lack of rational user behaviours and performances.
International Journal of Electrical and Computer Engineering (IJECE), 2020
This paper studies the issue the information security for smartphone users in Russia. The report analyses the regulations the state uses to prevent undeclared functionality and malicious programs in mobile phones in Russia; the law enforcement practice in this area; the responsibility of legal entities, officials and persons for non-compliance with the requirements for standardization, ensuring information security and violation of declaration of conformity. The paper develops proposals to improve state regulation of undeclared functionality of mobile devices providing the collection of information, including confidential data. The report discusses specific ethical issues related to privacy, including matters relating to compensation for damage resulting from the leakage of personal information and develops proposals for legal ensuring the information security of mobile phone users. The report first outlines the main actors, terms and concepts used in the report. Second the standards for mobile phone developers, although there is no guarantee of complete information security. In this case, the peculiarity of Russia is that standards used in the field of information security are voluntary. Third how law enforcement agencies protect the user community. In this case there is a potential danger that this may entail uncontrolled access of government agencies to confidential data. 1. INTRODUCTION In the era of smartphones and other internet enabled devices, the question arises as to how much a person is protected from the illegal the collection of personal information while using such devices, "... small-scale IT users remain ill-served by existing cyber security practices" [1]. While using a mobile phone a person may not suspect that his device is relaying information to a third party who may subsequently use this information illegally. Alongside the development of this technology, other technologies are being developed to illegally collect personal information from smartphone users. The illegal collection of information is possible through the installation of a malicious program or through undeclared functions installed on the mobile phone by its developer, "95% of the tested apps have at least one vulnerability" [2]. There are various vulnerabilities and risks associated with the use of mobile devices[3], including the risks of illegal collection of information. New generation of services are often characterized by high dynamism and untrustworthiness: "existing technologies for managing and applying data privacy policies could be unsuccessful ..." [4] For the purpose of unifying the approaches to information security, states are developing standards for technical regulation. Although the application of standards in the development of mobile applications is not always effective [5]. The standards define the range of key issues that developers should be guided by (this depends on the demand of application the standards in the state). However, standards cannot provide all possible vulnerabilities.
Psychology and Education: A Multidisciplinary Journal, 2023
Social Sciences in Theory and Practice, 2024
Revista Último Andar, 2016
Isegoría, nº 35, 2006
Yeni Asya , 2010
China Study, 2024
Letramentos Docentes: um olhar reflexivo sobre ser professor de língua portuguesa, 2024
Journal of Ancient Egyptian Interconnections, 2016
Biotechnology Progress, 2001
European Journal of Human Genetics, 2013
Peritoneal Dialysis International, 2019
Journal of Advanced Research in Natural and Applied Sciences
Behavioral Neuroscience, 1996
Nursing Standard, 2006
gabriella maroya, 2024
Brazilian Journal of Oceanography, 2009