Software security and privacy risks in mobile e-commerce
Communications of the ACM
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Providing K-Anonymity in location based services
ACM SIGKDD Explorations Newsletter
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Direct anonymous attestation: enhancing cloud service user privacy
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part II
Kernel-based Behavior Analysis for Android Malware Detection
CIS '11 Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Measuring user confidence in smartphone security and privacy
Proceedings of the Eighth Symposium on Usable Privacy and Security
Addressing Security and Privacy Risks in Mobile Applications
IT Professional
Smartphone Security Challenges
Computer
Hi-index | 0.00 |
A sharp increase in mobile device and applications raise serious concern on individual privacy risk in smartphone. Capabilities of current mobile device which enable it to have similar functionality with notebook inspires user to use it for many purposes. However, the scenario attracts attacker to intrude privacy in order to gain data on the device for specific purpose. This paper presents a preliminary study on privacy risks in smartphone environment from individual user perspective. The contribution of this paper is two fold. First, the privacy risks are reviewed from physical and logical viewpoint. Then an online survey is conducted to gain initial perception of privacy practice among users. Second contribution is by providing and discussing a guideline to deal with privacy risk incident on smartphone. As conclusion, future work and research on privacy risk is discussed to generate more contributions in this area.