Inicio  /  Informatics  /  Vol: 6 Par: 1 (2019)  /  Artículo
ARTÍCULO
TITULO

What Is This Sensor and Does This App Need Access to It?

Maryam Mehrnezhad and Ehsan Toreini    

Resumen

Mobile sensors have already proven to be helpful in different aspects of people?s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path. While the users are benefiting from richer and more personalized apps, the growing number of sensors introduces new security and privacy risks to end users and makes the task of sensor management more complex. In this paper, first, we discuss the issues around the security and privacy of mobile sensors. We investigate the available sensors on mainstream mobile devices and study the permission policies that Android, iOS and mobile web browsers offer for them. Second, we reflect the results of two workshops that we organized on mobile sensor security. In these workshops, the participants were introduced to mobile sensors by working with sensor-enabled apps. We evaluated the risk levels perceived by the participants for these sensors after they understood the functionalities of these sensors. The results showed that knowing sensors by working with sensor-enabled apps would not immediately improve the users? security inference of the actual risks of these sensors. However, other factors such as the prior general knowledge about these sensors and their risks had a strong impact on the users? perception. We also taught the participants about the ways that they could audit their apps and their permissions. Our findings showed that when mobile users were provided with reasonable choices and intuitive teaching, they could easily self-direct themselves to improve their security and privacy. Finally, we provide recommendations for educators, app developers, and mobile users to contribute toward awareness and education on this topic.

 Artículos similares

       
 
R. J. Roosien, M. N. A. Lim, S. M. Petermeijer and W. F. Lammen    
To reduce the carbon footprint of transport, policymakers are simultaneously stimulating cleaner vehicles and more sustainable mobility choices, such as a shift to rail for short-haul flights within Europe. The purpose of this study is to determine the c... ver más
Revista: Aerospace

 
Sara M. Marcelino, Pedro Dinis Gaspar, Arminda do Paço, Tânia M. Lima, Ana Monteiro, José Carlos Franco, Erika S. Santos, Rebeca Campos and Carlos M. Lopes    
Agriculture intensification has driven the loss of biodiversity at a global level. The implementation of strategies to conserve and promote biodiversity in agricultural areas can be favoured by adequate assessment methods that foster the awareness of dec... ver más
Revista: Applied Sciences

 
Aravind Kolli, Qi Wei and Stephen A. Ramsey    
In this work, we explored computational methods for analyzing a color digital image of a wound and predicting (from the analyzed image) the number of days it will take for the wound to fully heal. We used a hybrid computational approach combining deep ne... ver más
Revista: Computation

 
Kenneth Thibodeau    
Constructed Past Theory (CPT) is an abstract representation of how information about the past is produced and interpreted. It is grounded in the assertion that whatever we can write or say about anything in the past is the product of cognition. Understan... ver más
Revista: Information

 
Mohamed Tawfik, Jaime Hoogesteger, Moustafa Moussa and Petra Hellegers    
Egypt?s quota of Nile River water has been constant since the 1950s, despite the continual agricultural land expansion. To facilitate land reclamation, Egypt has reallocated Nile water from downstream users, mostly smallholders in the ?old lands? of the ... ver más
Revista: Water