An effective approach to mobile device management: Security and privacy issues associated with mobile applications

Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the colle...

Full description

Bibliographic Details
Main Authors: Darren Hayes, Francesco Cappa, Nhien An Le-Khac
Format: Article
Language:English
Published: Elsevier 2020-09-01
Series:Digital Business
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2666954420300016
id doaj-38f71779ab0240e3bde5c8664d618ca6
record_format Article
spelling doaj-38f71779ab0240e3bde5c8664d618ca62021-09-03T04:48:29ZengElsevierDigital Business2666-95442020-09-0111100001An effective approach to mobile device management: Security and privacy issues associated with mobile applicationsDarren Hayes0Francesco Cappa1Nhien An Le-Khac2Pace University, Seidenberg School of CSIS, New York, NY, USA; Corresponding authors.LUISS Guido Carli University, Department of Business and Management, Rome, RM, Italy; Corresponding authors.University College Dublin, School of Computer Science, Dublin, IrelandConsumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the collection and sharing of personal data conducted by mobile apps without the knowledge or consent of the user. The findings of this case study research clearly demonstrate that permissions and privacy policies are not enough to determine how invasive an app is. By analysing six popular mobile apps we demonstrate how extensive amounts of data, which go well beyond the permissions requested of the user, are commonly collected. This study illustrates the effectiveness of our proposed approach, which is based upon a static and dynamic analysis, in addition to a review of privacy policy statements. From a corporate perspective, the outcomes of this study are important to understand how many mobile apps put employees, and intellectual property, at risk. Furthermore, we have highlighted how sensitive information being collected may eventually be used in public or private investigations. Moreover, we have also evidenced how the data being collected is contrary to the developers' privacy policies. The results of this study will assist policymakers who may be concerned with consumer privacy and data collection practices.http://www.sciencedirect.com/science/article/pii/S2666954420300016Mobile applicationsMobile device managementMobile forensicsMobile securityPrivacyIT risk
collection DOAJ
language English
format Article
sources DOAJ
author Darren Hayes
Francesco Cappa
Nhien An Le-Khac
spellingShingle Darren Hayes
Francesco Cappa
Nhien An Le-Khac
An effective approach to mobile device management: Security and privacy issues associated with mobile applications
Digital Business
Mobile applications
Mobile device management
Mobile forensics
Mobile security
Privacy
IT risk
author_facet Darren Hayes
Francesco Cappa
Nhien An Le-Khac
author_sort Darren Hayes
title An effective approach to mobile device management: Security and privacy issues associated with mobile applications
title_short An effective approach to mobile device management: Security and privacy issues associated with mobile applications
title_full An effective approach to mobile device management: Security and privacy issues associated with mobile applications
title_fullStr An effective approach to mobile device management: Security and privacy issues associated with mobile applications
title_full_unstemmed An effective approach to mobile device management: Security and privacy issues associated with mobile applications
title_sort effective approach to mobile device management: security and privacy issues associated with mobile applications
publisher Elsevier
series Digital Business
issn 2666-9544
publishDate 2020-09-01
description Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the collection and sharing of personal data conducted by mobile apps without the knowledge or consent of the user. The findings of this case study research clearly demonstrate that permissions and privacy policies are not enough to determine how invasive an app is. By analysing six popular mobile apps we demonstrate how extensive amounts of data, which go well beyond the permissions requested of the user, are commonly collected. This study illustrates the effectiveness of our proposed approach, which is based upon a static and dynamic analysis, in addition to a review of privacy policy statements. From a corporate perspective, the outcomes of this study are important to understand how many mobile apps put employees, and intellectual property, at risk. Furthermore, we have highlighted how sensitive information being collected may eventually be used in public or private investigations. Moreover, we have also evidenced how the data being collected is contrary to the developers' privacy policies. The results of this study will assist policymakers who may be concerned with consumer privacy and data collection practices.
topic Mobile applications
Mobile device management
Mobile forensics
Mobile security
Privacy
IT risk
url http://www.sciencedirect.com/science/article/pii/S2666954420300016
work_keys_str_mv AT darrenhayes aneffectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications
AT francescocappa aneffectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications
AT nhienanlekhac aneffectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications
AT darrenhayes effectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications
AT francescocappa effectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications
AT nhienanlekhac effectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications
_version_ 1717817825514487808