The Black Mirror: What Your Mobile Phone Number Reveals About You

In the present era of pervasive mobile technologies, interconnecting innovations are increasingly prevalent in our lives. In this evolutionary process, mobile and social media communication systems serve as a backbone for human interactions. When assessing privacy risks related to this, privacy scoring models (PSM) can help quantifying the personal information risks. This paper uses the mobile phone number itself as a basis for privacy scoring. We tested 1,000 random phone numbers for their matching to social media accounts. The results raise concerns how network and communication layers are predominately connected. PSMs will support future organizational sensitivity for data linkability.

[1]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[2]  Dirk von Suchodoletz,et al.  Location Privacy in Mobile Telephony Networks -- Conflict of Interest between Safety, Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.

[3]  Chee-Wee Tan,et al.  How Much will You Pay? Understanding the Value of Information cues in the Sharing Economy , 2017, ECIS.

[4]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[5]  Marek Fuchs,et al.  Pre-Call Validation of RDD Cell Phone Numbers A Field Experiment , 2011 .

[6]  Evren Eren,et al.  Mobile Security: Risiken mobiler Kommunikation und Lösungen zur mobilen Sicherheit , 2006 .

[7]  Nancy K. Lankton,et al.  Understanding the Antecedents and Outcomes of Facebook Privacy Behaviors: An Integrated Model , 2020, IEEE Transactions on Engineering Management.

[8]  Mark Ryan,et al.  Analysis of privacy in mobile telephony systems , 2017, International Journal of Information Security.

[9]  Asma Hamed,et al.  Privacy scoring and users' awareness for Web tracking , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).

[10]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[11]  Özgür Külcü,et al.  Privacy in social networks: An analysis of Facebook , 2014, Int. J. Inf. Manag..

[12]  Yiannis Kompatsiaris,et al.  PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[13]  Starr Roxanne Hiltz,et al.  Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.

[14]  Raymond K. Wong,et al.  Privacy Scoring of Social Network Users as a Service , 2015, 2015 IEEE International Conference on Services Computing.

[15]  Aurélien Francillon,et al.  The role of phone numbers in understanding cyber-crime schemes , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[16]  H. Meffert,et al.  Marketing: Grundlagen marktorientierter Unternehmensführung Konzepte – Instrumente – Praxisbeispiele , 2019 .

[17]  Fredrik Gustafsson,et al.  Power Control in Cellular Radio Systems , 2000 .

[18]  Dominik Herrmann Privacy issues in the Domain Name System and techniques for self-defense , 2015, it Inf. Technol..

[19]  Heribert Meffert,et al.  Grundlagen des Marketing , 2018, Marketing.

[20]  Evan Selinger,et al.  Re-Engineering Humanity , 2018 .

[21]  Hella Kaffel Ben Ayed,et al.  Privacy risk assessment for Web tracking: A user-oriented approach toward privacy risk assessment for Web tracking , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[22]  Yves Deswarte,et al.  Current and future privacy enhancing technologies for the internet , 2006, Ann. des Télécommunications.

[23]  Elizabeth Fife,et al.  The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security , 2012 .

[24]  Brian Cugelman,et al.  Social Influence Scale for Technology Design and Transformation , 2019, INTERACT.

[25]  S. K. Palat,et al.  User profiles and their replication for reduction of HLR accesses and signalling load , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.

[26]  Rachelle Bosua,et al.  Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: A Preliminary Study , 2017, ICIS.

[27]  Elizabeth Fife,et al.  Mobile phones and User Perceptions of Privacy and Security , 2012, ICMB.