Emerging Technologies in Computing. Second International Conference, iCETiC 2019, London, UK, August 19–20, 2019, Proceedings

Research Article

A Review and Survey on Smartphones: The Closest Enemy to Privacy

  • @INPROCEEDINGS{10.1007/978-3-030-23943-5_8,
        author={Priyanka Jayakumar and Lenice Lawrence and Ryan Chean and Sarfraz Brohi},
        title={A Review and Survey on Smartphones: The Closest Enemy to Privacy},
        proceedings={Emerging Technologies in Computing. Second International Conference, iCETiC 2019, London, UK, August 19--20, 2019, Proceedings},
        proceedings_a={ICETIC},
        year={2019},
        month={7},
        keywords={Smartphones Privacy Data exploitation Mobile applications},
        doi={10.1007/978-3-030-23943-5_8}
    }
    
  • Priyanka Jayakumar
    Lenice Lawrence
    Ryan Chean
    Sarfraz Brohi
    Year: 2019
    A Review and Survey on Smartphones: The Closest Enemy to Privacy
    ICETIC
    Springer
    DOI: 10.1007/978-3-030-23943-5_8
Priyanka Jayakumar1,*, Lenice Lawrence1,*, Ryan Chean1,*, Sarfraz Brohi1,*
  • 1: Taylor’s University
*Contact email: Priyankas.Jayakumar@sd.taylors.edu.my, Lenicelawrence@sd.taylors.edu.my, Ryanwaichean.Lim@sd.taylors.edu.my.Lim, SarfrazNawaz.Brohi@taylors.edu.my

Abstract

Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distrustful of their smartphones, never knowing which application threatens to expose them. In this paper, we have conducted an in-depth review of the significance of smartphones in human life, and we have discussed the methods used by various authorities to collect and exploit users’ data for enigmatic benefits. Moreover, we surveyed the smartphone users to identify the vulnerabilities leading to privacy violation, and to examine their knowledge about the protection mechanisms. We determined that Technology and Human are the two major vulnerabilities that are exploited to invade users’ privacy. It is the necessity of the moment for the researchers and developers to formulate solutions that could be used to educate and protect smartphone users from potential threats and exploitation of data.