• Aucun résultat trouvé

Empowering Users to Make Privacy Decisions in Mobile Environments

N/A
N/A
Protected

Academic year: 2022

Partager "Empowering Users to Make Privacy Decisions in Mobile Environments"

Copied!
1
0
0

Texte intégral

(1)

Empowering Users to Make Privacy Decisions in Mobile Environments

Serge Egelman

International Computer Science Institute (ICSI), University of California, Berkeley, USA egelman@icsi.berkeley.edu

Keynote Abstract

Mobile platforms have enabled third-party app ecosystems that provide users with an endless supply of rich content. At the same time, mobile devices present very serious privacy risks: their ability to capture real-time data about our behav- iors and preferences has created a marketplace for user data that most consumers are simply unaware of. In this talk, I will present prior and ongoing research that my group has performed to understand how users make privacy decisions on their mobile devices, including work that we have done to improve the usability of the permission-granting process through the use of machine learning. I will also present re- search that my research group has conducted to automat- ically examine the privacy behaviors of mobile apps. Us- ing analysis tools that we developed, we have tested over 100,000 of the most popular Android apps to examine what data they access and with whom they share it. I will present data on how mobile apps are tracking and profiling users, how these practices are often against users’ expectations and public disclosures, and how app developers may be violating various privacy regulations.

Biography

Serge Egelman is the Research Director of the Usable Se- curity and Privacy group at the International Computer Sci- ence Institute (ICSI), which is an independent research in- stitute affiliated with the University of California, Berkeley.

He conducts research to help people make more informed online privacy and security decisions, and is generally in- terested in consumer protection. This has included improve- ments to web browser security warnings, authentication on social networking websites, and most recently, privacy on mobile devices. Seven of his research publications have re- ceived awards at the ACM CHI conference, which is the top venue for human-computer interaction research; his research on privacy on mobile platforms has been cited in numerous lawsuits and regulatory actions. He received his PhD from Carnegie Mellon University.

Références

Documents relatifs

Therefore, providing adequate information, making privacy tools more evident, or rewarding and punishing users as they make safer or riskier decisions are all ways of nudging

allows users to release location data to certain parties who have requested permission to access these data; and 9) Time-based rules: allows users to decide the duration

ASSURES the Regional Director of its continued full confidence and of its complete support for the continuance with undiminished drive and determination of the work to

Some of these facets have already been implemented in existing prototypes and provide us with an overview of the subset of teaching expertise than can be embedded in

The OECD Working Party on Information Security and Privacy (WPISP) agreed on a process for conducting this review at its meeting on 2-3 December 2010. With the assistance of the

Smart devices are machines or appliances that utilize different protocols, such as RFID (Radio Frequency Identification), Bluetooth or TCP/IP (Transmission control Protocol) and

The same occurred in 2014 when ING Bank wanted to do a pilot in which it would offer personalised third-party ads to their customers (with their consent) based on

Named Data Networking (NDN) architectures with ubiquitous and protocol-agnostic caching are an interesting scenario to study this problem because they provide potentially