Models of Privacy and Security Issues on Mobile Applications

Author(s):  
Lili Nemec Zlatolas ◽  
Tatjana Welzer-Druzovec ◽  
Marjan Heričko ◽  
Marko Hölbl

The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.

Author(s):  
Lili Nemec Zlatolas ◽  
Tatjana Welzer ◽  
Marjan Heričko ◽  
Marko Hölbl

The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.


Author(s):  
Christos Bouras ◽  
Eri Giannaka ◽  
Thrasyvoulos Tsiatsos

E-Collaboration is an important research topic, with a great number of researchers contributing on many aspects. The main reason for this major research activity is the broad topic’s scope, which involves not only technological but also social and psychological issues. As a result there are multiple interpretations about what e-collaboration is. More specifically we definitely can say that e-collaboration has been defined in many ways in the past, and the number of definitions has grown recently. The next section present the main terms in this area.


2009 ◽  
pp. 8-16 ◽  
Author(s):  
Christos Bouras ◽  
Eri Giannaka ◽  
Thrasyvoulos Tsiatsos

E-Collaboration is an important research topic, with a great number of researchers contributing on many aspects. The main reason for this major research activity is the broad topic’s scope, which involves not only technological but also social and psychological issues. As a result there are multiple interpretations about what e-collaboration is. More specifically we definitely can say that e-collaboration has been defined in many ways in the past, and the number of definitions has grown recently. The next section present the main terms in this area.


Author(s):  
Asmita Manna ◽  
Anirban Sengupta ◽  
Chandan Mazumdar

During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.


Author(s):  
Asmita Manna ◽  
Anirban Sengupta ◽  
Chandan Mazumdar

During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.


2019 ◽  
Vol 17 (1/2) ◽  
pp. 191-197 ◽  
Author(s):  
Andrew Boyles Petersen

In the past year, transportation rental companies, including Bird, Lime, and Spin, have dropped hundreds of thousands of rental scooters across North America. Relying on mobile apps and scooter-mounted GPS units, these devices have access to a wide-variety of consumer data, including location, phone number, phone metadata, and more. Pairing corroborated phone and scooter GPS data with a last-mile transportation business model, scooter companies are able to collect a unique, highly identifying dataset on users. Data collected by these companies can be utilized by internal researchers or sold to advertisers and data brokers. Access to so much consumer data, however, poses serious security risks. ­Although Bird, Lime, and Spin posit electric scooters as environmentally friendly and accessible transportation, they also allow for unethical uses of user data through vaguely-worded terms of service. To promote more equitable transportation practices, this article will explore the implications of dockless scooter geotracking, as well as related infrastructure, privacy, and data security ramifications.


2014 ◽  
Vol 602-605 ◽  
pp. 3570-3574
Author(s):  
Zhen Hua Luo ◽  
Fen Jiang

In the industrial manufacturing process, most kinds of surfaces are processed by planar materials, but undevelopable surfaces are difficult develop to the plane. The approximation algorithms to develop a undevelopable surface is an important research topic in Computer Aided Geometric Design (CAGD). In this paper, we propose a new approximation algorithms based optimization algorithm. We guarantee the deformation vector make the minimum changes during the developing process. In the paper, some numerical example are given and the can illustrate the our method is effective.


2021 ◽  
Vol 6 ◽  
Author(s):  
Magdalena Riedl ◽  
Carsten Schwemmer ◽  
Sandra Ziewiecki ◽  
Lisa M. Ross

Despite an increasing information overflow in the era of digital communication, influencers manage to draw the attention of their followers with an authentic and casual appearance. Reaching large audiences on social media, they can be considered as digital opinion leaders. In the past, they predominantly appeared as experts for topics like fashion, sports, or gaming and used their status to cooperate with brands for marketing purposes. However, since recently influencers also turn towards more meaningful and political content. In this article, we share our perspective on the rise of political influencers using examples of sustainability and related topics covered on Instagram. By applying a qualitative observational approach, we illustrate how influencers make political communication look easy, while at the same time seamlessly integrating product promotions in their social media feeds. In this context, we discuss positive aspects of political influencers like contributions to education and political engagement, but also negative aspects such as the potential amplification of radical political ideology or conspiracy theories. We conclude by highlighting political influencers as an important research topic for conceptual and empirical studies in the future.


2014 ◽  
Vol 46 (1) ◽  
pp. 145-161
Author(s):  
Ana Jevtic ◽  
Jovan Miric

Children?s attribution of emotions to a moral transgressor is an important research topic in the psychology of moral and emotional development. This is especially because of the so-called Happy Victimizer Phenomenon (HVP) where younger children attribute positive emotions to a moral transgressor described in a story. In the two studies that we have conducted (children aged 5, 7 and 9, 20 of each age; 10 of each age in the second study) we have tested the possible influence of the fear of sanctions and the type of transgression (stealing and inflicting body injuries) on the attribution of emotions. Children were presented with stories that described transgressions and they were asked to answer how the transgressor felt. The fear of sanctions did not make a significant difference in attribution but the type of transgression did - more negative emotions were attributed for inflicting body injuries than for stealing. Positive emotions were explained with situational-instrumental explanations in 84% of cases while negative emotions were explained with moral explanations in 63,5%. Girls attributed more positive emotions (61%) than boys (39%). However, our main finding was that, for the aforementioned age groups, we did not find the HVP effect although it has regularly been registered in foreign studies. This finding denies the generalizability of the phenomenon and points to the significance of disciplining styles and, even more so, culture for children?s attribution of emotions to moral transgressors.


2021 ◽  
Author(s):  
Alisson Steffens Henrique ◽  
Esteban Walter Gonzalez Clua ◽  
Rodrigo Lyra ◽  
Anita Maria da Rocha Fernandes ◽  
Rudimar Luis Scaranto Dazzi

Game Analytics is an important research topic in digitalentertainment. Data log is usually the key to understand players’behavior in a game. However, alpha and beta builds may need aspecial attention to player focus and immersion. In this paper, wepropose t he us e of player’s focus detection, through theclassification of pictures. Results show that pictures can be usedas a new source of data for Game Analytics, feeding developerswith a better understanding of players enjoyment while in testingphases .


Sign in / Sign up

Export Citation Format

Share Document