scholarly journals A Survey of Privacy Vulnerabilities of Mobile Device Sensors

2022 ◽  
Author(s):  
Paula Delgado-Santos ◽  
Giuseppe Stragapede ◽  
Ruben Tolosana ◽  
Richard Guest ◽  
Farzin Deravi ◽  
...  

The number of mobile devices, such as smartphones and smartwatches, is relentlessly increasing to almost 6.8 billion by 2022, and along with it, the amount of personal and sensitive data captured by them. This survey overviews the state of the art of what personal and sensitive user attributes can be extracted from mobile device sensors, emphasising critical aspects such as demographics, health and body features, activity and behaviour recognition, etc. In addition, we review popular metrics in the literature to quantify the degree of privacy, and discuss powerful privacy methods to protect the sensitive data while preserving data utility for analysis. Finally, open research questions are presented for further advancements in the field.

Author(s):  
Akrati Saxena ◽  
Harita Reddy

AbstractOnline informal learning and knowledge-sharing platforms, such as Stack Exchange, Reddit, and Wikipedia have been a great source of learning. Millions of people access these websites to ask questions, answer the questions, view answers, or check facts. However, one interesting question that has always attracted the researchers is if all the users share equally on these portals, and if not then how the contribution varies across users, and how it is distributed? Do different users focus on different kinds of activities and play specific roles? In this work, we present a survey of users’ social roles that have been identified on online discussion and Q&A platforms including Usenet newsgroups, Reddit, Stack Exchange, and MOOC forums, as well as on crowdsourced encyclopedias, such as Wikipedia, and Baidu Baike, where users interact with each other through talk pages. We discuss the state of the art on capturing the variety of users roles through different methods including the construction of user network, analysis of content posted by users, temporal analysis of user activity, posting frequency, and so on. We also discuss the available datasets and APIs to collect the data from these platforms for further research. The survey is concluded with open research questions.


Author(s):  
Jacques Thomassen ◽  
Carolien van Ham

This chapter presents the research questions and outline of the book, providing a brief review of the state of the art of legitimacy research in established democracies, and discusses the recurring theme of crisis throughout this literature since the 1960s. It includes a discussion of the conceptualization and measurement of legitimacy, seeking to relate legitimacy to political support, and reflecting on how to evaluate empirical indicators: what symptoms indicate crisis? This chapter further explains the structure of the three main parts of the book. Part I evaluates in a systematic fashion the empirical evidence for legitimacy decline in established democracies; Part II reappraises the validity of theories of legitimacy decline; and Part II investigates what (new) explanations can account for differences in legitimacy between established democracies. The chapter concludes with a short description of the chapters included in the volume.


2021 ◽  
Vol 16 (2) ◽  
pp. 111-135
Author(s):  
Emilio M. Sanfilippo

Information entities are used in ontologies to represent engineering technical specifications, health records, pictures or librarian data about, e.g., narrative fictions, among others. The literature in applied ontology lacks a comparison of the state of the art, and foundational questions on the nature of information entities remain open for research. The purpose of the paper is twofold. First, to compare existing ontologies with both each other and theories proposed in philosophy, semiotics, librarianship, and literary studies in order to understand how the ontologies conceive and model information entities. Second, to discuss some open research challenges that can lead to principled approaches for the treatment of information entities, possibly by getting into account the variety of information entity types found in the literature.


2015 ◽  
pp. 1933-1955
Author(s):  
Tolga Soyata ◽  
He Ba ◽  
Wendi Heinzelman ◽  
Minseok Kwon ◽  
Jiye Shi

With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today's mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to establish high-speed connections to vast computational resources located in the cloud. While the execution scheme based on this mobile-cloud collaboration opens the door to many applications that can tolerate response times on the order of seconds and minutes, it proves to be an inadequate platform for running applications demanding real-time response within a fraction of a second. In this chapter, the authors describe the state-of-the-art in mobile-cloud computing as well as the challenges faced by traditional approaches in terms of their latency and energy efficiency. They also introduce the use of cloudlets as an approach for extending the utility of mobile-cloud computing by providing compute and storage resources accessible at the edge of the network, both for end processing of applications as well as for managing the distribution of applications to other distributed compute resources.


2020 ◽  
pp. 1207-1221
Author(s):  
Carlos E. Jiménez-Gómez

Despite its origins, openness in the judiciary has expanded beyond transparency and, therefore, beyond the common law open justice principle. Several initiatives worldwide are echoing this trend and a new term, open judiciary, is arising as a way to address openness in the justice field. This chapter gives an overview of open judiciary initiatives worldwide, focusing on some of the most successful, in order to identify drivers of adoption, critical success factors, and preliminary results. The research is embedded in a broader exploratory study on the state of the art of open judiciary. The chapter is addressed to answer two of the research questions: What are some learning practices that can be identified worldwide in relation to openness in the judiciary? What are some of the most important lessons that can be learnt from these practices?


Sensors ◽  
2016 ◽  
Vol 16 (2) ◽  
pp. 184 ◽  
Author(s):  
Ivan Pires ◽  
Nuno Garcia ◽  
Nuno Pombo ◽  
Francisco Flórez-Revuelta

This paper focuses on the research on the state of the art for sensor fusion techniques, applied to the sensors embedded in mobile devices, as a means to help identify the mobile device user’s daily activities. Sensor data fusion techniques are used to consolidate the data collected from several sensors, increasing the reliability of the algorithms for the identification of the different activities. However, mobile devices have several constraints, e.g., low memory, low battery life and low processing power, and some data fusion techniques are not suited to this scenario. The main purpose of this paper is to present an overview of the state of the art to identify examples of sensor data fusion techniques that can be applied to the sensors available in mobile devices aiming to identify activities of daily living (ADLs).


2017 ◽  
Vol 24 (4) ◽  
pp. 529-540
Author(s):  
Paul Eisenberg

Purpose This paper aims to approach fundamental topics of financial crime and the law. What does constitute financial crime? Which field of law is best suited to address the threats of transgression by financial executives? What does motivate highly rewarded financiers to become white collar criminals? Design/methodology/approach To answer these research questions, contemporary theories of criminology in general and of white collar crime in particular, as well as theories on motivation, are critically discussed. Benefits and limitations of the theories in use are exemplified on the background of the London Interbank Offered Rate (LIBOR) scandal. Findings The paper criticises that the state-of-the-art theories are not able to embrace financial criminality in its entirety. A provoking pace for further research might be that of psychopathic disorders among white collar criminals. Thus, white collar crime maintains its challenging character. Originality/value This paper provides a thorough testing of multidisciplinary theories that emerged over the past decades against the recent LIBOR scandal. The research questions addressed and the methodologies applied provide a framework for the assessment of the prevailing theories against other financial scandals.


2013 ◽  
Vol 9 (4) ◽  
pp. 331-345
Author(s):  
Jianwei Niu ◽  
Mingzhu Liu ◽  
Han-Chieh Chao

With the proliferation of high-end mobile devices that feature wireless interfaces, many promising applications are enabled in opportunistic networks. In contrary to traditional networks, opportunistic networks utilize the mobility of nodes to relay messages in a store-carry-forward paradigm. Thus, the relay process in opportunistic networks faces several practical challenges in terms of delay and delivery rate. In this paper, we propose a novel P2P Query algorithm, namely Betweenness Centrality Forwarding (PQBCF), for opportunistic networking. PQBCF adopts a forwarding metric called Betweenness Centrality (BC), which is borrowed from social network, to quantify the active degree of nodes in the networks. In PQBCF, nodes with a higher BC are preferable to serve as relays, leading to higher query success rate and lower query delay. A comparison with the state-of-the-art algorithms reveals that PQBCF can provide better performance on both the query success Ratio and query delay, and approaches the performance of Epidemic Routing (ER) with much less resource consumption.


Author(s):  
Carlos E. Jiménez-Gómez

Despite its origins, openness in the judiciary has expanded beyond transparency and, therefore, beyond the common law open justice principle. Several initiatives worldwide are echoing this trend and a new term, open judiciary, is arising as a way to address openness in the justice field. This chapter gives an overview of open judiciary initiatives worldwide, focusing on some of the most successful, in order to identify drivers of adoption, critical success factors, and preliminary results. The research is embedded in a broader exploratory study on the state of the art of open judiciary. The chapter is addressed to answer two of the research questions: What are some learning practices that can be identified worldwide in relation to openness in the judiciary? What are some of the most important lessons that can be learnt from these practices?


Sign in / Sign up

Export Citation Format

Share Document