USERS' MANAGEMENT OF MOBILE DEVICES AND PRIVACY

被引:5
|
作者
Serrano-Telleria, Ana [1 ]
机构
[1] Univ Castilla La Mancha, Journalism Fac, Campus Univ, Cuenca 16071, Spain
来源
PROFESIONAL DE LA INFORMACION | 2018年 / 27卷 / 04期
关键词
Data; Mobile devices; Mobile ecosystem; Mobile phones; Privacy; Private sphere; Public sphere; Intimate sphere; Personal sphere; Smartphones;
D O I
10.3145/epi.2018.jul.11
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
This article aims to offer a guide of observed practices based on the main results obtained after the two-year European Feder project (April 2013-15) 'Public and private in mobile communications' carried out at LabCom. IFP, Beira Interior University in Portugal. Both quantitative and qualitative methods were used (surveys, interviews, focus groups, content analysis, digital ethnography, observation ethnography, workshops, etc.) in order to describe how users manage their public, private, intimate and personal spheres within the mobile media ecosystem. Results obtained showed an increased awareness of the risks without a concomitant exploration of consequences, an extensively circumstantial behaviour pattern influenced by interface design and volatile policies, terms and conditions, and a lack of rational user behaviours and performances.
引用
下载
收藏
页码:822 / 829
页数:8
相关论文
共 50 条
  • [31] PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users
    Yigitoglu, Emre
    Gursoy, Mehmet Emre
    Liu, Ling
    Loper, Margaret
    Bamba, Bhuvan
    Lee, Kisung
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1238 - 1247
  • [32] A Privacy Preserving Framework for Rewarding Users in Opportunistic Mobile Crowdsensing
    Montori, Federico
    Bedogni, Luca
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [33] Privacy aware monitoring of mobile users in sensor networks environment
    Jagdale B.
    Bakal J.
    International Journal of Interactive Mobile Technologies, 2019, 13 (02): : 127 - 140
  • [34] Mining patterns of mobile users through mobile devices and the musics they listen
    Goh, J
    Taniar, D
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 1203 - 1211
  • [35] SPE: Security and Privacy Enhancement Framework for Mobile Devices
    Krupp, Brian
    Sridhar, Nigamanth
    Zhao, Wenbing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 433 - 446
  • [36] Undermining User Privacy on Mobile Devices Using AI
    Gulmezoglu, Berk
    Zankl, Andreas
    Tol, M. Caner
    Islam, Saad
    Eisenbarth, Thomas
    Sunar, Berk
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 214 - 227
  • [37] SECURITY AND PRIVACY IN AN ENTERPRISE SEARCH INFRASTRUCTURE FOR MOBILE DEVICES
    Praher, Christian P.
    Praher, Jakob F.
    IDIMT-2008: MANAGING THE UNMANAGEABLE, 2008, 25 : 431 - +
  • [38] Reconciling user privacy and implicit authentication for mobile devices
    Shahandashti, Siamak F.
    Safavi-Naini, Reihaneh
    Safa, Nashad Ahmed
    COMPUTERS & SECURITY, 2015, 53 : 215 - 233
  • [39] A Module for Protecting Data Location Privacy on Mobile Devices
    Makki, Fatima
    El-Hajj, Wassim
    Safa, Haidar
    Alhakim, Abbas
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 512 - 517
  • [40] Toward privacy in IoT mobile devices for activity recognition
    Jourdan, Theo
    Boutet, Antoine
    Frindel, Carole
    PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018), 2018, : 155 - 165