Research Article
A Review and Survey on Smartphones: The Closest Enemy to Privacy
@INPROCEEDINGS{10.1007/978-3-030-23943-5_8, author={Priyanka Jayakumar and Lenice Lawrence and Ryan Chean and Sarfraz Brohi}, title={A Review and Survey on Smartphones: The Closest Enemy to Privacy}, proceedings={Emerging Technologies in Computing. Second International Conference, iCETiC 2019, London, UK, August 19--20, 2019, Proceedings}, proceedings_a={ICETIC}, year={2019}, month={7}, keywords={Smartphones Privacy Data exploitation Mobile applications}, doi={10.1007/978-3-030-23943-5_8} }
- Priyanka Jayakumar
Lenice Lawrence
Ryan Chean
Sarfraz Brohi
Year: 2019
A Review and Survey on Smartphones: The Closest Enemy to Privacy
ICETIC
Springer
DOI: 10.1007/978-3-030-23943-5_8
Abstract
Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distrustful of their smartphones, never knowing which application threatens to expose them. In this paper, we have conducted an in-depth review of the significance of smartphones in human life, and we have discussed the methods used by various authorities to collect and exploit users’ data for enigmatic benefits. Moreover, we surveyed the smartphone users to identify the vulnerabilities leading to privacy violation, and to examine their knowledge about the protection mechanisms. We determined that Technology and Human are the two major vulnerabilities that are exploited to invade users’ privacy. It is the necessity of the moment for the researchers and developers to formulate solutions that could be used to educate and protect smartphone users from potential threats and exploitation of data.