Privacy and Data Protection in Mobile Applications

Privacy and Data Protection in Mobile Applications
Author:
Publisher:
Total Pages: 69
Release: 2017
Genre:
ISBN: 9789292042424

While online users increasingly rely on the use of mobile applications (apps) for their everyday activities and needs, the processing of personal data through such tools poses significant risks to users’ security and privacy. Such risks stem mainly from the variety of data and sensors held in mobile devices, the use of different types of identifiers and extended possibility of users’ tracking, the complex mobile app ecosystem and limitations of app developers, as well as the extended use of third-party software and services. For these reasons, the implementation of the core data protection principles, as stipulated by the General Data Protection Regulation (GDPR), faces serious challenges in mobile apps. This may hinder compliance of mobile app developers and providers with specific rules of GDPR, e.g. with regard to transparency and consent, data protection by design and by default, as well as security of processing. Against this background, the scope of the present document is to provide a meta-study on privacy and data protection in mobile apps by analysing the features of the app development environment that impact privacy and security, as well as defining relevant best-practices, open issues and gaps in the field. To this end, the document explains the basics of the app development lifecycle and takes a look at different depictions of mobile app ecosystems (development versus deployment). While the ecosystem is complex, an app developer centric approach is taken, while also addressing app providers and other actors in the ecosystem (OS providers, device manufactures, market operators, ad libraries, et cetera). Specifically, roles and responsibilities are analysed and aspects of software development are discussed as they can be leveraged as privacy and security action points. A presentation of idealized app lifecycles (data versus development lifecycles) is performed, as well as their potentials for implementing privacy by design. Particular attention is paid to the Agile Secure Development Lifecycle and possible ways of extending it to also cover privacy and data protection requirements. The permission model of apps is used as an example for a more detailed analysis of data protection challenges in the current mobile app development and deployment practices. Moreover, the document focuses on the concept of privacy by design and tries to make it more clear, especially for mobile app developers. Approaches to privacy and data protection by design and by default are presented that help translate the legal requirements into more tangible engineering goals that developers are more comfortable with. In particular, the concepts of data protection goals and privacy design strategies are discussed in general terms, while providing concrete examples from the mobile app development perspective.

Location Privacy in Mobile Applications

Location Privacy in Mobile Applications
Author: Bo Liu
Publisher: Springer
Total Pages: 109
Release: 2018-08-30
Genre: Computers
ISBN: 9811317054

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Legal Issues of Mobile Apps

Legal Issues of Mobile Apps
Author: Ioannis Iglezakis
Publisher: Kluwer Law International B.V.
Total Pages: 318
Release: 2020-05-12
Genre: Law
ISBN: 9403522437

In less than ten years touchscreen smartphones and their apps have created an unprecedented technological revolution. Yet they are rife with serious potential for breaches of privacy and security, and a lack of uniform rules makes navigation of the legal landscape extremely difficult. Addressing this unstable regulatory environment, this concise, practical guide for the first time provides a measure of legal certainty. It examines case law and legislation in Europe and the United States to highlight the rights and obligations of all actors involved in the marketing of mobile apps, bring to light essential principles and recommend some viable solutions. Nine experts, all versed in the latest developments in international and national laws and regulations affecting digital mobile technology, examine such key topics as the following: contract law as applied to the sale and use of smartphone apps; intellectual property rights in mobile apps; protection of users; data protection; European Union (EU) medical device legislation and its safety implications for app users; fitness or wellness apps; apps’ collection of personal data; apps as hostile code and malware delivery mechanisms; competition law issues; taxation of mobile apps; liability issues for app developers and distributors; and implications of the EU’s new regulatory framework on online platforms. Because it is difficult for a basic user to understand how vulnerable everyday apps can be, and because every new information technology platform delivers new risks along with its benefits, legal practitioners working in a wide variety of fields will be increasingly called upon to engage with both personal and enterprise security and privacy breach cases arising from the use of mobile apps. This deeply informed practical analysis goes a long way toward ensuring appropriate handling of legal issues which arise in the mobile app context. Every practitioner, government official and software developer will welcome this much-needed volume.

Mobile Application Security

Mobile Application Security
Author: Himanshu Dwivedi
Publisher: McGraw Hill Professional
Total Pages: 432
Release: 2010-02-18
Genre: Computers
ISBN: 007163357X

Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource. Design highly isolated, secure, and authenticated mobile applications Use the Google Android emulator, debugger, and third-party security tools Configure Apple iPhone APIs to prevent overflow and SQL injection attacks Employ private and public key cryptography on Windows Mobile devices Enforce fine-grained security policies using the BlackBerry Enterprise Server Plug holes in Java Mobile Edition, SymbianOS, and WebOS applications Test for XSS, CSRF, HTTP redirects, and phishing attacks on WAP/Mobile HTML applications Identify and eliminate threats from Bluetooth, SMS, and GPS services Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. Chris Clark is a principal security consultant with iSEC Partners. David Thiel is a principal security consultant with iSEC Partners.

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps
Author: Sen, Devjani
Publisher: IGI Global
Total Pages: 335
Release: 2020-08-07
Genre: Computers
ISBN: 1799834891

Health and fitness apps collect various personal information including name, email address, age, height, weight, and in some cases, detailed health information. When using these apps, many users trustfully log everything from diet to sleep patterns. However, by sharing such personal information, end-users may make themselves targets to misuse of this information by unknown third parties, such as insurance companies. Despite the important role of informed consent in the creation of health and fitness applications, the intersection of ethics and information sharing is understudied and is an often-ignored topic during the creation of mobile applications. Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps is a key reference source that provides research on the dangers of sharing personal information on health and wellness apps, as well as how such information can be used by employers, insurance companies, advertisers, and other third parties. While highlighting topics such as data ethics, privacy management, and information sharing, this publication explores the intersection of ethics and privacy using various quantitative, qualitative, and critical analytic approaches. It is ideally designed for policymakers, software developers, mobile app designers, legal specialists, privacy analysts, data scientists, researchers, academicians, and upper-level students.

Mobile Health Technologies

Mobile Health Technologies
Author: Wilfred Bonney
Publisher: BoD – Books on Demand
Total Pages: 154
Release: 2016-08-31
Genre: Health & Fitness
ISBN: 9535126342

Mobile Health Technologies, also known as mHealth technologies, have emerged, amongst healthcare providers, as the ultimate Technologies-of-Choice for the 21st century in delivering not only transformative change in healthcare delivery, but also critical health information to different communities of practice in integrated healthcare information systems. mHealth technologies nurture seamless platforms and pragmatic tools for managing pertinent health information across the continuum of different healthcare providers. mHealth technologies commonly utilize mobile medical devices, monitoring and wireless devices, and/or telemedicine in healthcare delivery and health research. Today, mHealth technologies provide opportunities to record and monitor conditions of patients with chronic diseases such as asthma, Chronic Obstructive Pulmonary Diseases (COPD) and diabetes mellitus. The intent of this book is to enlighten readers about the theories and applications of mHealth technologies in the healthcare domain.

Introduction to Social Media Investigation

Introduction to Social Media Investigation
Author: Jennifer Golbeck
Publisher: Syngress
Total Pages: 307
Release: 2015-03-14
Genre: Computers
ISBN: 012801802X

If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques. Presents an overview of social media sites, information types, privacy policies, and other general issues relevant to investigating individuals online Discusses the special skills and techniques needed when conducting investigations using social media Includes hands-on tutorials and case studies using Facebook, LinkedIn, Twitter, and other social media sites using proven investigative techniques Shows how to gather additional data using advanced techniques such as crowdsourcing, data mining, and network analysis

Data Protection and Privacy: (In)visibilities and Infrastructures

Data Protection and Privacy: (In)visibilities and Infrastructures
Author: Ronald Leenes
Publisher: Springer
Total Pages: 309
Release: 2017-02-07
Genre: Law
ISBN: 3319507966

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.

Data Protection and Privacy, Volume 13

Data Protection and Privacy, Volume 13
Author: Dara Hallinan
Publisher: Bloomsbury Publishing
Total Pages: 401
Release: 2021-01-28
Genre: Law
ISBN: 1509941770

This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and Artificial Intelligence. It is one of the results of the thirteenth annual International Conference on Computers, Privacy and Data Protection (CPDP) held in Brussels in January 2020. The development and deployment of Artificial Intelligence promises significant break-throughs in how humans use data and information to understand and interact with the world. The technology, however, also raises significant concerns. In particular, concerns are raised as to how Artificial Intelligence will impact fundamental rights. This interdisciplinary book has been written at a time when the scale and impact of data processing on society – on individuals as well as on social systems – is becoming ever starker. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection.

Research Anthology on Privatizing and Securing Data

Research Anthology on Privatizing and Securing Data
Author: Management Association, Information Resources
Publisher: IGI Global
Total Pages: 2188
Release: 2021-04-23
Genre: Computers
ISBN: 1799889556

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.