Internet-connected voice-controlled speakers, also known as smart speakers, are increasingly popular due to their convenience for everyday tasks such as asking about the …
The open-source nature of the Android OS makes it possible for manufacturers to ship custom versions of the OS along with a set of pre-installed apps, often for product …
JL Kröger, L Gellrich, S Pape… - … on Privacy Enhancing …, 2022 - petsymposium.org
Through voice characteristics and manner of expression, even seemingly benign voice recordings can reveal sensitive attributes about a recorded speaker (eg, geographical …
Assessing the information security awareness (ISA) of users is crucial for protecting systems and organizations from social engineering attacks. Current methods do not consider the …
In order to improve mobile data transparency, various approaches have been proposed to inspect network traffic generated by mobile devices and detect exposure of personally …
JL Kröger, OHM Lutz, S Ullrich - Available at SSRN 3881776, 2021 - papers.ssrn.com
Despite years of heavy criticism, privacy self-management (ie, the principle that people individually manage their privacy via notice and choice) remains the standard of privacy …
C Han, I Reyes, Á Feal, J Reardon… - Proceedings on …, 2020 - petsymposium.org
It is commonly assumed that “free” mobile apps come at the cost of consumer privacy and that paying for apps could offer consumers protection from behavioral advertising and long …
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages, phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …
E Okoyomon, N Samarin… - … (ConPro 2019), in …, 2019 - dspace.networks.imdea.org
The dominant privacy framework of the information age relies on notions of “notice and consent.” That is, service providers will disclose, often through privacy policies, their data …