addressing privacy and societal challenges from the ...csajaykr/myhome/research/akp2013.pdf ·...
TRANSCRIPT
![Page 1: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/1.jpg)
Project Presentation
Addressing Privacy and Societal Challenges
from the Deployment of Emerging Biometrics
and Data Protection Technologies
Supervisors Name: Dr. Ajay Kumar Student Name: Au Ka Po
Student Number: 10593042D
![Page 2: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/2.jpg)
Contents
Introduction
Popular security technologies in Mainland China
Privacy issues in emerging technologies
Organization of Survey Studies
Survey and Analysis
Recommendations
Conclusions
2
![Page 3: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/3.jpg)
Introduction
Background ◦ New challenges from technologies
◦ Potential privacy issues versus Benefits
◦ Smartphone and Internet access becomes popular,
malicious App also increases
Objectives 1. Investigate and evaluate the emerging privacy issues related
to technologies
2. Raise the awareness on privacy related challenges in the use popular technologies
3. Study the privacy concerns and attitude of general public about the use of Smartphone
3
![Page 4: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/4.jpg)
Situation of using latest technologies
in China CCTV ◦ Beijing – cinema, supermarket, shopping mall
◦ Shanghai – 24 hours monitoring by 4000 people
◦ Chongqing – Total 3.1 hundred thousands
Biometrics – Fingerprint Identification ◦ Stored in identification card starts at Jan 2013
◦ Record foreigners who work or study in China
4
![Page 5: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/5.jpg)
Situation of using latest technologies
in China Smartphone users : over 250 million
Penetration rate: over 67.7%
5
![Page 6: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/6.jpg)
Introduction
Malware grew 163% in 2012
Infected 32.8M Android device
Infection Rate is the highest in
China
6
![Page 7: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/7.jpg)
Privacy issues of using Smartphones
Privacy Invasion without consent
Modification of App – Wechat
◦ Connect with Trojan horse
◦ More than 160 versions of Wechat are modified
Advertisement pop up, costing money and stealing
password
◦ Download App from unofficial channel
◦ Apk files sent by IM Apps
7
![Page 8: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/8.jpg)
Privacy issues of using Smartphone
Wechat App is suspected of monitoring chat history ◦ “Restricted words” pop up if users send the message
containing political content
◦ Hu Jia who is activist suspects
he was monitored when using it
Real personal information is required when ◦ Sign-up communication services or
◦ Publish blog or comment in blog or forum
8
![Page 9: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/9.jpg)
Privacy issues of using technologies
Registering new account in Wechat
Hold ID card and take photo
9
![Page 10: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/10.jpg)
Privacy issues of using technologies
Smartphone Vulnerabilities
Bypass password using system bugs
◦ iOS 6.1 - iphone
◦ Android 4.1.2 – Sony Xperia Z
Spoofing attack of biometrics
◦ Face recognition in Android 4.0.x
Photo and facemask of owners
10
![Page 11: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/11.jpg)
Study using Survey
Online survey – 177 respondents Developed by PHP, MySQL
Managed by phpMyAdmin
Offline survey – 235 respondents Interview with people by face to face
Distribute to classmates
Privacy concerns - not willing to provide personal information
Entered the offline survey data to online system
All data was backed-up and secured
11
![Page 12: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/12.jpg)
Study using Survey
phpmyAdmin
12
![Page 13: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/13.jpg)
Study using Survey
Respondent background
Age
Gender
Education level
13
![Page 14: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/14.jpg)
Survey & Analysis
IBM SPSS statistics 19
14
![Page 15: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/15.jpg)
Survey & Analysis
Two Stop Cluster
15
![Page 16: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/16.jpg)
Survey & Analysis
Distribution of Smartphone Platform
16
iOS
27%
Android
68%
Window
Phone
1%
Symbiam
2%
BlackBerry
1%
Not a
Smartphone
user
1%
![Page 17: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/17.jpg)
0
0.5
1
Survey & Analysis
Criteria of choosing Smartphone OS
1. More Apps
2. Trendy
3. User friendliness
Few users choose
security reason
17
![Page 18: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/18.jpg)
Survey & Analysis
Downloading App from unofficial ways
More Android device users do so
More iOS users think that it is not safe
18
0%
5%
10%
15%
20%
25%
30%
35% 32%
7% 9%
31%
5%
12%
4%
23%
15%
7%
25%
5%
20%
5%
iOS Android
![Page 19: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/19.jpg)
Survey & Analysis
Keep using App if real personal information is needed?
Male are not willing to use
19
0%
10%
20%
30%
40%
50%
60%
70%
Yes No Not sure
Male
Female
![Page 20: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/20.jpg)
Survey & Analysis
Altitude towards using privacy invasion App
20
0%
10%
20%
30%
40%
50%
60%
Whatsapp Line Wechat
Yes
No
Use carefully
![Page 21: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/21.jpg)
Survey & Analysis
21
Checking permissions of App before downloading
• Half of iOS users
do not check
• None of Symbian users
will check
0%
10%
20%
30%
40%
50%
60%
Yes No Sometimes Not support this
function
16%
47%
33%
4%
16%
40% 41%
3% 0%
60%
20% 20%
iOS Android Symbiam
![Page 22: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/22.jpg)
Survey & Analysis
Sharing location via Smartphone
1. Do not share
2. Restaurant
3. Travel Attractions
22
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50% 47%
10% 9%
15%
1%
7%
11%
40%
16%
7%
11%
4% 6%
16%
Male Female
![Page 23: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/23.jpg)
Survey & Analysis
23
Security lock preferred
1. Password
2. Simple
3. Fingerprint
0%
5%
10%
15%
20%
25%
30%
35%
40%
Simple
screen/key lock
Password Pattern Face
Recognition
Fingerprint
Identification
Iris Recognition Finger knuckle
25% 25%
0%
25%
0%
25%
0%
24%
11%
16%
11%
38%
0% 0%
28% 26%
29%
3%
12%
1% 1%
34%
38%
19%
5% 2%
0% 2%
Primary Secondary College or University Above University
![Page 24: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/24.jpg)
Survey & Analysis
Reason of choosing biometrics lock
General - more secure
Primary & University
Not want to use
24
![Page 25: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/25.jpg)
Survey & Analysis
Install Anti-virus App or not?
More Android users intalled
84% iOS users
do not install
25
![Page 26: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/26.jpg)
Conclusions
Most Popular Reason for Selecting Smartphone OS mainly because of numbers of available Apps
More than half of the people do not delete the data in previous Smartphone after they have purchased a new Smartphone More chance of privacy violations
People with secondary education level prefer using Biometrics security lock for their Smartphone People with higher education may have
more concerns on Biometrics Privacy
26
![Page 27: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/27.jpg)
Conclusions
20% of people do download App from
unofficial avenues and which gain the
privileged control of the phone
More Vulnerable !
26% of people do not enable any security
lock on the phone
More Vulnerable!
27
![Page 28: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/28.jpg)
Recommendations
Apply Security Lock
Backup data regularly
Check update regularly to fix system bugs
Avoid modification of system unnecessarily
Carefully read the permission right of suspected Apps before downloading them
Download Apps from official avenues
◦ If not, make sure to install anti-virus App
Turn off unnecessary networking functions
◦ NFC, GPS, location services
28
![Page 29: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/29.jpg)
References 1. “comScore Releases the ‘2012 Mobile Future in Focus’ Report - comScore, Inc.”[Online]. Available:
http://www.comscore.com/Insights/Press_Releases/2012/2/comScore_Releases_the_2012_Mobile_Future_in_Focus_Report. [Accessed: 25-April-2013].
2. “Social Media and Mobile in China: Smartphone users in China already exceeded 250 million people.” [Online]. Available: http://socialmediainasia.blogspot.hk/2012/06/smartphone-users-in-china-already.html. [Accessed: 16-March-2013].
3.
4. “Malware On Mobile Grew 163% In 2012, Infecting Around 32.8M Android Devices, Report Says | TechCrunch.” [Online]. Available: http://techcrunch.com/2013/04/15/malware-on-mobile-grew-163-in-2012-infecting-around-32-8m-android-devices-report-says/. [Accessed: 23-April-2013].
5.
6. “Jailbreak! New Rules Allow Unapproved iPhone Apps | Fox News.” [Online]. Available: http://www.foxnews.com/tech/2010/07/26/apple-iphone-jailbreak-unapproved-apps/. [Accessed: 07-April-2013].
7.
8. “Hack your Android like a pro: Rooting and ROMs explained | Android Atlas - CNET Reviews.” [Online]. Available: http://reviews.cnet.com/8301-19736_7-57578709-251/hack-your-android-like-a-pro-rooting-and-roms-explained/. [Accessed: 11-April-2013].
9.
10. “Custom ROMs For Android Explained - Here Is Why You Want Them.” [Online]. Available: http://www.androidpolice.com/2010/05/01/custom-roms-for-android-explained-and-why-you-want-them/. [Accessed: 19-April-2013].
29
![Page 30: Addressing Privacy and Societal Challenges from the ...csajaykr/myhome/research/AKP2013.pdf · Introduction Background New challenges from technologies Potential privacy issues versus](https://reader031.vdocuments.us/reader031/viewer/2022022517/5b06f6517f8b9ad5548d9a33/html5/thumbnails/30.jpg)
Q & A section
Thank You!
30