An effective approach to mobile device management: Security and privacy issues associated with mobile applications
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the colle...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2020-09-01
|
Series: | Digital Business |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2666954420300016 |
id |
doaj-38f71779ab0240e3bde5c8664d618ca6 |
---|---|
record_format |
Article |
spelling |
doaj-38f71779ab0240e3bde5c8664d618ca62021-09-03T04:48:29ZengElsevierDigital Business2666-95442020-09-0111100001An effective approach to mobile device management: Security and privacy issues associated with mobile applicationsDarren Hayes0Francesco Cappa1Nhien An Le-Khac2Pace University, Seidenberg School of CSIS, New York, NY, USA; Corresponding authors.LUISS Guido Carli University, Department of Business and Management, Rome, RM, Italy; Corresponding authors.University College Dublin, School of Computer Science, Dublin, IrelandConsumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the collection and sharing of personal data conducted by mobile apps without the knowledge or consent of the user. The findings of this case study research clearly demonstrate that permissions and privacy policies are not enough to determine how invasive an app is. By analysing six popular mobile apps we demonstrate how extensive amounts of data, which go well beyond the permissions requested of the user, are commonly collected. This study illustrates the effectiveness of our proposed approach, which is based upon a static and dynamic analysis, in addition to a review of privacy policy statements. From a corporate perspective, the outcomes of this study are important to understand how many mobile apps put employees, and intellectual property, at risk. Furthermore, we have highlighted how sensitive information being collected may eventually be used in public or private investigations. Moreover, we have also evidenced how the data being collected is contrary to the developers' privacy policies. The results of this study will assist policymakers who may be concerned with consumer privacy and data collection practices.http://www.sciencedirect.com/science/article/pii/S2666954420300016Mobile applicationsMobile device managementMobile forensicsMobile securityPrivacyIT risk |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Darren Hayes Francesco Cappa Nhien An Le-Khac |
spellingShingle |
Darren Hayes Francesco Cappa Nhien An Le-Khac An effective approach to mobile device management: Security and privacy issues associated with mobile applications Digital Business Mobile applications Mobile device management Mobile forensics Mobile security Privacy IT risk |
author_facet |
Darren Hayes Francesco Cappa Nhien An Le-Khac |
author_sort |
Darren Hayes |
title |
An effective approach to mobile device management: Security and privacy issues associated with mobile applications |
title_short |
An effective approach to mobile device management: Security and privacy issues associated with mobile applications |
title_full |
An effective approach to mobile device management: Security and privacy issues associated with mobile applications |
title_fullStr |
An effective approach to mobile device management: Security and privacy issues associated with mobile applications |
title_full_unstemmed |
An effective approach to mobile device management: Security and privacy issues associated with mobile applications |
title_sort |
effective approach to mobile device management: security and privacy issues associated with mobile applications |
publisher |
Elsevier |
series |
Digital Business |
issn |
2666-9544 |
publishDate |
2020-09-01 |
description |
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not. This research raises several concerns about the collection and sharing of personal data conducted by mobile apps without the knowledge or consent of the user. The findings of this case study research clearly demonstrate that permissions and privacy policies are not enough to determine how invasive an app is. By analysing six popular mobile apps we demonstrate how extensive amounts of data, which go well beyond the permissions requested of the user, are commonly collected. This study illustrates the effectiveness of our proposed approach, which is based upon a static and dynamic analysis, in addition to a review of privacy policy statements. From a corporate perspective, the outcomes of this study are important to understand how many mobile apps put employees, and intellectual property, at risk. Furthermore, we have highlighted how sensitive information being collected may eventually be used in public or private investigations. Moreover, we have also evidenced how the data being collected is contrary to the developers' privacy policies. The results of this study will assist policymakers who may be concerned with consumer privacy and data collection practices. |
topic |
Mobile applications Mobile device management Mobile forensics Mobile security Privacy IT risk |
url |
http://www.sciencedirect.com/science/article/pii/S2666954420300016 |
work_keys_str_mv |
AT darrenhayes aneffectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications AT francescocappa aneffectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications AT nhienanlekhac aneffectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications AT darrenhayes effectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications AT francescocappa effectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications AT nhienanlekhac effectiveapproachtomobiledevicemanagementsecurityandprivacyissuesassociatedwithmobileapplications |
_version_ |
1717817825514487808 |