2021
DOI: 10.1108/ics-03-2021-0038
|View full text |Cite
|
Sign up to set email alerts
|

To sell, or not to sell: social media data-breach in second-hand Android devices

Abstract: Purpose The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android devices. Design/methodology/approach This study uses a black-box testing-principles based methodology to develop use-cases that simulate real-world case-scenarios of the activities performed by the users on the social media application. The authors executed these use-cases in a controlled experiment and examined the Android s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Despite substantial literature on potential risks (e.g., [27]), we are the first to look at whether the risks materialize in practice. Our results seem to indicate (in our, relatively small, dataset at least) that the risks rarely materialize (e.g., because buyers format devices immediately) 4 , at least with buyers that are not ill-intentioned. Despite these findings, even incidents for a small number of users can cause severe consequences.…”
Section: Introductionmentioning
confidence: 56%
See 1 more Smart Citation
“…Despite substantial literature on potential risks (e.g., [27]), we are the first to look at whether the risks materialize in practice. Our results seem to indicate (in our, relatively small, dataset at least) that the risks rarely materialize (e.g., because buyers format devices immediately) 4 , at least with buyers that are not ill-intentioned. Despite these findings, even incidents for a small number of users can cause severe consequences.…”
Section: Introductionmentioning
confidence: 56%
“…Other researchers studied the effectiveness of deletion methods on storage devices. BenRhouma et al [4] analyze the data left on Android smartphones, after removing applications or doing a factory reset, and show that these operations did not effectively delete user data. Schneider et al [46] find that remnant data could be recovered from 'new' USB sticks due to memory-chip recycling.…”
Section: Presence Of Remnant Data and Implicationsmentioning
confidence: 99%
“…The exchange of second-hand devices can also lead to data leaks [16]. Some participants like P6 worried about unwiped data: "When you get second-hand phones, they're contaminated .…”
Section: Risk Awareness Of Public and Second-hand Devicesmentioning
confidence: 99%