A Study of Privacy Protection Awareness of Mobile Phone Users 


Vol. 33,  No. 5, pp. 386-394, May  2008


PDF
  Abstract

Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. Rhee, "A Study of Privacy Protection Awareness of Mobile Phone Users," The Journal of Korean Institute of Communications and Information Sciences, vol. 33, no. 5, pp. 386-394, 2008. DOI: .

[ACM Style]

Hae-kyung Rhee. 2008. A Study of Privacy Protection Awareness of Mobile Phone Users. The Journal of Korean Institute of Communications and Information Sciences, 33, 5, (2008), 386-394. DOI: .

[KICS Style]

Hae-kyung Rhee, "A Study of Privacy Protection Awareness of Mobile Phone Users," The Journal of Korean Institute of Communications and Information Sciences, vol. 33, no. 5, pp. 386-394, 5. 2008.