Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices

Abstract : Google Android and Apple iOS ecosystems differ fundamentally, largely because of their parent companies 'different business models. However, the platforms' tools and protections appear to be converging: Android is adopting run-time permissions requests, which iOS has used for years; both are incorporating stronger encryption.

[1]  Konstantin Beznosov,et al.  Understanding Users' Requirements for Data Protection in Smartphones , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.

[2]  Vaishali Patel,et al.  Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study , 2015, Journal of health communication.

[3]  Charles V. Wright,et al.  Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.

[4]  L. Taylor No place to hide? The ethics and analytics of tracking mobility using mobile phone data , 2016 .

[5]  Chris Peters,et al.  The daily you: How the new advertising industry is defining your identity and your worth , 2012, New Media Soc..

[6]  Nicolas Christin,et al.  All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.

[7]  Su Li,et al.  Mobile Phones and Privacy , 2012 .

[8]  Yanick Fratantonio,et al.  ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[9]  Patrick Traynor,et al.  [8WashJLTech&Arts0245] Privacy and Security Concerns Associated with Mobile Money Applications in Africa , 2013 .

[10]  Lorrie Faith Cranor,et al.  "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.

[11]  David A. Wagner,et al.  I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.

[12]  Charles V. Wright,et al.  Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.

[13]  Lorrie Faith Cranor,et al.  The Privacy and Security Behaviors of Smartphone App Developers , 2014 .

[14]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[15]  Patrick D. McDaniel,et al.  Bloatware Comes to the Smartphone , 2012, IEEE Security & Privacy.

[16]  Willis H. Ware RAND and the Information Evolution: A History in Essays and Vignettes , 2008 .