2021 ◽  
Author(s):  
Daria Ilkina

This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.


2021 ◽  
Author(s):  
Daria Ilkina

This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


Author(s):  
Мадина Усенбай ◽  
Акмарал Иманбаева

Конфиденциальность является одним из важных параметров для повышения безопасности в сети, цель которого - сохранить секретную информацию. Рассмотрена модель доверия, состоящая из текущих и прошлых оценок на основе репутации объекта в сети. В модели используется параметр времени для защиты конфиденциальности пользователя для статических и динамических объектов, например, в IoT или облачной технологии. Confidentiality is one of the important parameters for increasing security on the network, the coal of which is to keep secret information. A trust model consisting of current and past assessments based on the object reputation in the network is considered. The model uses a time parameter to protect user privacy for static and dynamic objects, for example, in IoT or cloud technology.


2020 ◽  
Author(s):  
Marcelo Corrales Compagnucci ◽  
Mark Fenwick ◽  
Helena Haapio ◽  
Timo Minssen ◽  
Erik P.M. Vermeulen
Keyword(s):  

2020 ◽  
Author(s):  
Alex Akinbi ◽  
Ehizojie Ojie

BACKGROUND Technology using digital contact tracing apps has the potential to slow the spread of COVID-19 outbreaks by recording proximity events between individuals and alerting people who have been exposed. However, there are concerns about the abuse of user privacy rights as such apps can be repurposed to collect private user data by service providers and governments who like to gather their citizens’ private data. OBJECTIVE The objective of our study was to conduct a preliminary analysis of 34 COVID-19 trackers Android apps used in 29 individual countries to track COVID-19 symptoms, cases, and provide public health information. METHODS We identified each app’s AndroidManifest.xml resource file and examined the dangerous permissions requested by each app. RESULTS The results in this study show 70.5% of the apps request access to user location data, 47% request access to phone activities including the phone number, cellular network information, and the status of any ongoing calls. 44% of the apps request access to read from external memory storage and 2.9% request permission to download files without notification. 17.6% of the apps initiate a phone call without giving the user option to confirm the call. CONCLUSIONS The contributions of this study include a description of these dangerous permissions requested by each app and its effects on user privacy. We discuss principles that must be adopted in the development of future tracking and contact tracing apps to preserve the privacy of users and show transparency which in turn will encourage user participation.


Author(s):  
Lamya Alkhariji ◽  
Nada Alhirabi ◽  
Mansour Naser Alraja ◽  
Mahmoud Barhamgi ◽  
Omer Rana ◽  
...  

Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions to learn how to incorporate different privacy-preserving ideas into their IoT application designs. This article lays the foundations toward developing such a privacy assistant by synthesising existing PbD knowledge to elicit requirements. It is believed that such a privacy assistant should not just prescribe a list of privacy-preserving ideas that developers should incorporate into their design. Instead, it should explain how each prescribed idea helps to protect privacy in a given application design context—this approach is defined as “Explainable Privacy.” A total of 74 privacy patterns were analysed and reviewed using ten different PbD schemes to understand how each privacy pattern is built and how each helps to ensure privacy. Due to page limitations, we have presented a detailed analysis in Reference [3]. In addition, different real-world Internet of Things (IoT) use-cases, including a healthcare application, were used to demonstrate how each privacy pattern could be applied to a given application design. By doing so, several knowledge engineering requirements were identified that need to be considered when developing a privacy assistant. It was also found that, when compared to other IoT application domains, privacy patterns can significantly benefit healthcare applications. In conclusion, this article identifies the research challenges that must be addressed if one wishes to construct an intelligent privacy assistant that can truly augment software developers’ capabilities at the design phase.


2021 ◽  
Vol 29 (3) ◽  
Author(s):  
Péter Orosz ◽  
Tamás Tóthfalusi

AbstractThe increasing number of Voice over LTE deployments and IP-based voice services raise the demand for their user-centric service quality monitoring. This domain’s leading challenge is measuring user experience quality reliably without performing subjective assessments or applying the standard full-reference objective models. While the former is time- and resource-consuming and primarily executed ad-hoc, the latter depends upon a reference source and processes the voice payload that may offend user privacy. This paper presents a packet-level measurement method (introducing a novel metric set) to objectively assess network and service quality online. It is accomplished without inspecting the voice payload and needing the reference voice sample. The proposal has three contributions: (i) our method focuses on the timeliness of the media traffic. It introduces new performance metrics that describe and measure the service’s time-domain behavior from the voice application viewpoint. (ii) Based on the proposed metrics, we also present a no-reference Quality of Experience (QoE) estimation model. (iii) Additionally, we propose a new method to identify the pace of the speech (slow or dynamic) as long as voice activity detection (VAD) is present between the endpoints. This identification supports the introduced quality model to estimate the perceived quality with higher accuracy. The performance of the proposed model is validated against a full-reference voice quality estimation model called AQuA, using real VoIP traffic (originated in assorted voice samples) in controlled transmission scenarios.


Sign in / Sign up

Export Citation Format

Share Document