Datenschutz und Smartphone-Nutzung im Konflikt?

2020 ◽  
Author(s):  
Anke Dieckhoff

Smartphones have become a common companion in our everyday lives. Mobile apps can be used to install various functions. For example, it can be used as an MP3 player, navigation device, or fitness tracker. Communication via instant messengers and social networks now also takes place on smartphones and has largely replaced the usual forms of communication. The mostly free applications are profitable for providers primarily because they can process a large amount of personal data. This enables the creation of profiles and the analysis of behavioural patterns. Smartphone users are therefore usually faced with the choice of accepting these processing options or dispensing with the respective application. The work deals with data protection problems of smartphone apps and also presents possibilities for self-protection available to smartphone users.

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Efthimios Alepis ◽  
Constantinos Patsakis

The extensive adoption of mobile devices in our everyday lives, apart from facilitating us through their various enhanced capabilities, has also raised serious privacy concerns. While mobile devices are equipped with numerous sensors which offer context-awareness to their installed apps, they can also be exploited to reveal sensitive information when correlated with other data or sources. Companies have introduced a plethora of privacy invasive methods to harvest users’ personal data for profiling and monetizing purposes. Nonetheless, up till now, these methods were constrained by the environment they operate, e.g., browser versus mobile app, and since only a handful of businesses have actual access to both of these environments, the conceivable risks could be calculated and the involved enterprises could be somehow monitored and regulated. This work introduces some novel user deanonymization approaches for device and user fingerprinting in Android. Having Android AOSP as our baseline, we prove that web pages, by using several inherent mechanisms, can cooperate with installed mobile apps to identify which sessions operate in specific devices and consequently further expose users’ privacy.


2022 ◽  
pp. 27-49
Author(s):  
Sidi Mohamed Sidi Ahmed

The internet of things (IoT) is one of successive technological waves that could have great impact on different aspects of modern life. It is being used in transport, smart grids, healthcare, environmental monitoring, logistics, as well as for processing pure personal data through a fitness tracker, wearable medical device, smartwatch, smart clothing, wearable camera, and so forth. From a legal viewpoint, processing personal data has to be done in accordance with rules of data protection law. This law aims to protect data from collection to retention. It usually applies to the processing of personal data that identifies or can identify a specific natural person. Strict adherence to this law is necessary for protecting personal data from being misused and also for promoting the IoT industry. This chapter discusses the applicability of the data protection law to IoT and the consequences of non-compliance with this law. It also provides recommendations on how to effectively comply with the data protection law in the IoT environment.


2017 ◽  
Vol 2017 (1) ◽  
pp. 118-131 ◽  
Author(s):  
Mojtaba Eskandari ◽  
Bruno Kessler ◽  
Maqsood Ahmad ◽  
Anderson Santana de Oliveira ◽  
Bruno Crispo

Abstract The prevalence of mobile devices and their capability to access high speed internet has transformed them into a portable pocket cloud interface. Being home to a wide range of users’ personal data, mobile devices often use cloud servers for storage and processing. The sensitivity of a user’s personal data demands adequate level of protection at the back-end servers. In this regard, the European Union Data Protection regulations (e.g., article 25.1) impose restriction on the locations of European users’ personal data transfer. The matter of concern, however, is the enforcement of such regulations. The first step in this regard is to analyze mobile apps and identify the location of servers to which personal data is transferred. To this end, we design and implement an app analysis tool, PDTLoc (Personal Data Transfer Location Analyzer), to detect violation of the mentioned regulations. We analyze 1, 498 most popular apps in the EEA using PDTLoc to investigate the data recipient server locations. We found that 16.5% (242) of these apps transfer users’ personal data to servers located at places outside Europe without being under the control of a data protection framework. Moreover, we inspect the privacy policies of the apps revealing that 51% of these apps do not provide any privacy policy while almost all of them contact the servers hosted outside Europe.


Author(s):  
Светлана Казанцева ◽  
Svetlana Kazanceva ◽  
Михаил Хоружий ◽  
Yury Kazantsev

The article describes the main measures that are applicable to the creation of a system of personal data protection in Russian enterprises. The authors propose a three-stage system of personal data protection, which avoids the employment of unsatisfactory and unsuitable employees who could put the company at risk in case of disclosure of trade secrets.


Author(s):  
Ammar Younas ◽  

The increasing ‘datafication of society’1 and ubiquitous computing resulted in high privacy risks such as commercial exploitation of personal data, discrimination, identity theft and profiling (automated processing of personal data). 2 Especially, minor data subjects are more likely to be victims of unfair commercial practices due to their behavioral characteristics (emotional volatility and impulsiveness) and unawareness of consequences of their virtual activities.3 Accordingly, it has been claimed that thousands of mobile apps utilized by children collected their data and used it for tracking their location, processed it for the development of child profiles so as to tailor behavioral advertising targeted at them and shared it with third parties without children’s or parent’s knowledge.4 Following these concerns, recently adopted EU General Data Protection Regulation (679/2016) departed from its Data Protection Directive (DPD) in terms of children’s data protection by explicitly recognizing that minors need more protection than adults5 and providing specific provisions aimed at protecting children’s right to data protection.6 Unlike the GDPR, the DPD was designed to provide “equal” protection for all data subjects irrespective of their age.7 This paper argues that consent principle along with the requirement of parental consent cannot effectively be implemented for the protection of children’s data due to the lack of actual choice, verification issues and complexity of data processing, and also the outcome of the privacy notices in a child-appropriate form is limited. However, there are other mechanisms and restrictions embodied in the GDPR, which provide opportunities for the protection of children’s data by placing burden on data controllers rather than data subjects.


Author(s):  
Ana Margarida Martins ◽  
Beatriz Casais

This study focuses on the use of mobile applications in tourism context (m-tourism). A survey was applied to a hotel in the city of Guimarães, in the north of Portugal, with a sample of 98 tourists. 94 reported to use these devices in tourism context to access information and share experiences in social networks, taking photos and videos, and using GPS. Users have a preference for free applications and look for the creation of itineraries. The use of the app in offline mode is the most valued feature, as well as the availability of updated and useful information. Only 13,7% of the inquired tourists referred the use of the app of the destination Guimarães, where they were staying. This shows that besides the features, it is crucial the promotion of mobile touristic apps, and the establishment of partnerships and rewards to incentivize its use.


Author(s):  
Liliana Giusti Serra

O artigo discorre sobre a questão da proteção de dados e privacidade dos usuários nas bibliotecas a partir do empréstimo de livros eletrônicos realizado pela parceria OverDrive-Amazon e o uso de redes sociais. É realizado um breve panorama dos normativos relativos à confidencialidade de dados por parte das bibliotecas nos Estados Unidos, países da Europa e a situação brasileira. Finaliza discorrendo sobre a importância da utilização de livros eletrônicos e redes sociais pelas bibliotecas, ressaltando apenas que esse uso seja realizado garantindo a preservação e confidencialidade dos dados pessoais dos usuários, utilizando-se das informações coletadas, mas revertendo-as em ofertas de serviços e divulgação dos acervos.AbstractThe article discusses the issue of data protection and privacy of patrons in libraries from lending e-books performed by OverDrive-Amazon partnership and the use of social networks. A brief overview of the normative regarding confidentiality of data by libraries in the United States, European countries and the Brazilian situation is realized. Concludes by addressing the importance of using e-books and social networks by libraries, noting only that its application is carried out ensuring the preservation and confidentiality of patrons personal data, using the information collected, but reversing them into service offerings and dissemination of collections.KeywordsE-books; Patron data protection; Social networks; Privacy; big data


2020 ◽  
Vol 2020 (1) ◽  
pp. 208-217
Author(s):  
Anna G. Donskikh

The article analyzes the legal aspects of the functioning of news communities of social networks. The overwhelming popularity of publics has led to violations of the rights of users to the content and personal data they host, while at the same time there is a legal vulnerability of the communities themselves. It is necessary to develop a comprehensive legal status of publics as sources of original and popular content among journalists and users of social networks.


Sign in / Sign up

Export Citation Format

Share Document