scholarly journals Mobile Devices: A Public Source of Private Data

Author(s):  
Monika Jabłońska ◽  
Piotr Jabłoński
Keyword(s):  
2016 ◽  
Vol 2016 (3) ◽  
pp. 96-116 ◽  
Author(s):  
Chad Spensky ◽  
Jeffrey Stewart ◽  
Arkady Yerukhimovich ◽  
Richard Shay ◽  
Ari Trachtenberg ◽  
...  

AbstractModern mobile devices place a wide variety of sensors and services within the personal space of their users. As a result, these devices are capable of transparently monitoring many sensitive aspects of these users’ lives (e.g., location, health, or correspondences). Users typically trade access to this data for convenient applications and features, in many cases without a full appreciation of the nature and extent of the information that they are exposing to a variety of third parties. Nevertheless, studies show that users remain concerned about their privacy and vendors have similarly been increasing their utilization of privacy-preserving technologies in these devices. Still, despite significant efforts, these technologies continue to fail in fundamental ways, leaving users’ private data exposed.In this work, we survey the numerous components of mobile devices, giving particular attention to those that collect, process, or protect users’ private data. Whereas the individual components have been generally well studied and understood, examining the entire mobile device ecosystem provides significant insights into its overwhelming complexity. The numerous components of this complex ecosystem are frequently built and controlled by different parties with varying interests and incentives. Moreover, most of these parties are unknown to the typical user. The technologies that are employed to protect the users’ privacy typically only do so within a small slice of this ecosystem, abstracting away the greater complexity of the system. Our analysis suggests that this abstracted complexity is the major cause of many privacy-related vulnerabilities, and that a fundamentally new, holistic, approach to privacy is needed going forward. We thus highlight various existing technology gaps and propose several promising research directions for addressing and reducing this complexity.


2018 ◽  
Vol 2 (3) ◽  
pp. 45 ◽  
Author(s):  
Mohamed Khamis ◽  
Malin Eiband ◽  
Martin Zürn ◽  
Heinrich Hussmann

As mobile devices allow access to an increasing amount of private data, using them in public can potentially leak sensitive information through shoulder surfing. This includes personal private data (e.g., in chat conversations) and business-related content (e.g., in emails). Leaking the former might infringe on users’ privacy, while leaking the latter is considered a breach of the EU’s General Data Protection Regulation as of May 2018. This creates a need for systems that protect sensitive data in public. We introduce EyeSpot, a technique that displays content through a spot that follows the user’s gaze while hiding the rest of the screen from an observer’s view through overlaid masks. We explore different configurations for EyeSpot in a user study in terms of users’ reading speed, text comprehension, and perceived workload. While our system is a proof of concept, we identify crystallized masks as a promising design candidate for further evaluation with regard to the security of the system in a shoulder surfing scenario.


2012 ◽  
Vol 2 (3) ◽  
pp. 86-88
Author(s):  
Dr. Kuntal Patel ◽  
◽  
Prof. Parimal Patel
Keyword(s):  

Author(s):  
Seungtaek SONG ◽  
Namhyun KIM ◽  
Sungkil LEE ◽  
Joyce Jiyoung WHANG ◽  
Jinkyu LEE

Sign in / Sign up

Export Citation Format

Share Document