2019
DOI: 10.3390/informatics6010007
|View full text |Cite
|
Sign up to set email alerts
|

What Is This Sensor and Does This App Need Access to It?

Abstract: Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users and makes the task of sensor management more complex. In this paper, first, we discuss the issues around the secu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…user consent and third party sharing which may lead to malicious purposes, and that technologies fail to abide by the new General Data Protection Regulation (GDPR) in that they continue to share valuable personal information to commercial entities in ways of which users may not be fully aware [43]. Women may be aware of and have consented to some of these uses as agreed on or requested when frst using the chosen app, but have no knowledge of others (such as some sensors on their devices and tracking data) [47]. In other words, as 'fertility goes digital' (valued at USD50 billion by 2025 [70]), it comes at the expense of (mostly) women's privacy.…”
Section: Introductionmentioning
confidence: 99%
“…user consent and third party sharing which may lead to malicious purposes, and that technologies fail to abide by the new General Data Protection Regulation (GDPR) in that they continue to share valuable personal information to commercial entities in ways of which users may not be fully aware [43]. Women may be aware of and have consented to some of these uses as agreed on or requested when frst using the chosen app, but have no knowledge of others (such as some sensors on their devices and tracking data) [47]. In other words, as 'fertility goes digital' (valued at USD50 billion by 2025 [70]), it comes at the expense of (mostly) women's privacy.…”
Section: Introductionmentioning
confidence: 99%
“…, 2015). Finally, in the context of technology use, sensors allow for more meaningful interactions and features (Mehrnezhad and Toreini, 2019).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Horizontal and vertical integrated technologies link a company closely with its suppliers and customers as well as with its own departments, functions, and capabilities, creating a considerable automated value chain (R€ ußmann et al, 2015). Finally, in the context of technology use, sensors allow for more meaningful interactions and features (Mehrnezhad and Toreini, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…• Sensor permission. Permission wise, each sensor has different permission levels, based on how Android deems their threat to the user's privacy (Mehrnezhad and Toreini 2019). In short, there are three relevant types of Android sensor permission for our purpose.…”
Section: Assessing the Feasibility Of Employing Smartphone Sensorsmentioning
confidence: 99%