Priyanka Jayakumar
A review and survey on smartphones: The closest enemy to privacy
Jayakumar, Priyanka; Lawrence, Lenice; Chean, Ryan Lim Wai; Brohi, Sarfraz Nawaz
Authors
Lenice Lawrence
Ryan Lim Wai Chean
Sarfraz Nawaz Brohi
Contributors
Mahdi H. Miraz
Editor
Peter S. Excell
Editor
Andrew Ware
Editor
Safeeullah Soomro
Editor
Maaruf Ali
Editor
Abstract
Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distrustful of their smartphones, never knowing which application threatens to expose them. In this paper, we have conducted an in-depth review of the significance of smartphones in human life, and we have discussed the methods used by various authorities to collect and exploit users’ data for enigmatic benefits. Moreover, we surveyed the smartphone users to identify the vulnerabilities leading to privacy violation, and to examine their knowledge about the protection mechanisms. We determined that Technology and Human are the two major vulnerabilities that are exploited to invade users’ privacy. It is the necessity of the moment for the researchers and developers to formulate solutions that could be used to educate and protect smartphone users from potential threats and exploitation of data.
Presentation Conference Type | Conference Paper (published) |
---|---|
Acceptance Date | Jul 1, 2019 |
Online Publication Date | Jul 14, 2019 |
Publication Date | Jan 1, 2019 |
Deposit Date | Sep 9, 2022 |
Journal | Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST |
Print ISSN | 1867-8211 |
Publisher | Springer Verlag (Germany) |
Volume | 285 |
Pages | 106-118 |
Series Title | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 285) |
Series ISSN | 1867-822X |
DOI | https://doi.org/10.1007/978-3-030-23943-5_8 |
Keywords | Smartphones, Privacy, Data exploitation, Mobile applications |
Public URL | https://uwe-repository.worktribe.com/output/9941060 |
Publisher URL | https://link.springer.com/chapter/10.1007/978-3-030-23943-5_8 |
Related Public URLs | https://www.springer.com/series/8197 |
You might also like
Accuracy comparison of machine learning algorithms for predictive analytics in higher education
(2019)
Presentation / Conference Contribution
UAV’s applications, architecture, security issues and attack scenarios: A survey
(2020)
Book Chapter
A three-level ransomware detection and prevention mechanism
(2020)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search