The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.17)
pp: 83-86
Hilarie Orman , Purple Streak
ABSTRACT
Smartphones and mobile devices make desktops and laptops seem clunky in comparison, but do they protect privacy? Here, the author examines the mechanisms for mobile device privacy, from operating system approaches to what users should know about risks.
INDEX TERMS
Mobile communication, Handheld devices, Smart phones, Privacy, Internet, Risk management, mobile devices, smartphone security, online privacy
CITATION
Hilarie Orman, "Did You Want Privacy With That?: Personal Data Protection in Mobile Devices", IEEE Internet Computing, vol.17, no. 3, pp. 83-86, May-June 2013, doi:10.1109/MIC.2013.48
REFERENCES
1. "Privacy and Data Management on Mobile Devices," Pew Internet and American Life Project, 5 Sept. 2012; www.pewinternet.org/Press-Releases/2012Mobile-Privacy.aspx .
2. J.H. Saltzer, "Protection and the Control of Information Sharing in Multics," Comm. ACM, vol. 17, no. 7, 1974; doi:10.1145/361011.361067.
3. J. Han et al., "Comparing Mobile Privacy Protection through Cross-Platform Applications," Proc. ISOC Networks and Distributed Systems Conf., ISOC, 2013.
4. A.P. Felt et al., "Permission Re-Delegation: Attacks and Defenses," Proc. 20th Usenix Security Symp., Usenix Assoc., 2011; www.usenix.org/event/sec11/tech/full_papers Felt.pdf.
5. D.D. Zovi and C. Miller, "iOS Security Internals," 2012 RSA Security Conf., featured presentation, 2012.
6. B. Sasso, "HTC Settles Privacy Case over Flaws in Phones,"22 Feb. 2013; http://thehill.com/blogs/hillicon-valley/ technology284403-htc-settles-ftc-charges-over-security-flaws-on-phones-tablets .
7. K.D. Harris, "Privacy on the Go, Recommendations for the Mobile Ecosystem," California Dept of Justice, Jan. 2013.
26 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool