Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Impact of user data privacy management controls on mobile device investigations
Andriotis, Panagiotis; Tryfonas, Theo
Authors
Theo Tryfonas
Contributors
Gilbert Peterson
Editor
Sujeet Shenoi
Editor
Abstract
© IFIP International Federation for Information Processing 2016. There are many different types of mobile device users, but most of them do not seek to expand the functionality of their smartphones and prefer to interact with them using predefined user profiles and settings. However, “power users” are always seeking opportunities to gain absolute control of their devices and expand their capabilities. For this reason, power users attempt to obtain “super user” privileges (root) or jailbreak their devices. Meanwhile, the “bring your own device” (BYOD) trend in the workplace and increased numbers of high profile users who demand enhanced data privacy and protection are changing the mobile device landscape. This chapter discusses variations of the Android operating system that attempt to bypass the limitations imposed by the previous Android permission model (up to version 5.1) and highlights the fact that forensic analysts will encounter devices with altered characteristics. Also, the chapter discusses the Android permission model introduced in the latest operating system (version M or 6.0) that will likely change the way users interact with apps.
Presentation Conference Type | Conference Paper (published) |
---|---|
Publication Date | Jan 1, 2016 |
Journal | IFIP Advances in Information and Communication Technology |
Print ISSN | 1868-4238 |
Publisher | Springer Verlag (Germany) |
Peer Reviewed | Peer Reviewed |
Volume | 484 |
Pages | 89-105 |
Book Title | Advances in Digital Forensics XII |
ISBN | 9783319462783 |
DOI | https://doi.org/10.1007/978-3-319-46279-0_5 |
Keywords | Android devices, privacy, trust, power users, anti-forensics |
Public URL | https://uwe-repository.worktribe.com/output/916415 |
Publisher URL | http://dx.doi.org/10.1007/978-3-319-46279-0_5 |
You might also like
On the development of automated forensic analysis methods for mobile devices
(2014)
Presentation / Conference Contribution
Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method
(2014)
Presentation / Conference Contribution
Smartphone message sentiment analysis
(2014)
Book Chapter
An extensible platform for the forensic analysis of social media data
(2015)
Presentation / Conference Contribution
Messaging activity reconstruction with sentiment polarity identification
(2015)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search