Open Access Open Access  Restricted Access Subscription Access

Analyzing the Growing Needs of Users to Employ Hardware and Software Restrictions in Smartphones for Increased Privacy and Data Security


Affiliations
1 Multimedia Specialist, Philco Media, Kottayam, Kerala, India
2 Lecturer (Computer Science), Department of Commerce, Bishop Kurialacherry College for Women, Amalgiri P.O., Kottayam - 686 561, Kerala, India

   Subscribe/Renew Journal


The use of smartphones has become an inevitable part of the lives of common people, as these days almost every day to day activity requires the active use of smartphones for the real world task processing. As the demanding needs of smartphones with the bundled operating system code along with a huge variety of user applications increased, there also exists an evil part hidden within the wide variety of applications that the application developers make use of to gain profit by collecting details about users either as private personal documents or in the form of metadata. As normal users of the system, they may not be always informed or well known about the ways in which these applications work. There also exists a problem where user security is compromised in the form of malicious code. Many government organizations collect and record information about user activity through telecom operators in the name of some backdoor operations they were working without the user’s consent. In this paper we try to focus on the perspectives that a common user needs to be aware of, to make their system more private and secure it from data breeches.

Keywords

Countermeasures, Data Breaches, Data Security, Defense, Malware Attacks, User Privacy.
User
Subscription Login to verify subscription
Notifications
Font Size


  • Analyzing the Growing Needs of Users to Employ Hardware and Software Restrictions in Smartphones for Increased Privacy and Data Security

Abstract Views: 290  |  PDF Views: 0

Authors

Jithu Philip
Multimedia Specialist, Philco Media, Kottayam, Kerala, India
Merin Raju
Lecturer (Computer Science), Department of Commerce, Bishop Kurialacherry College for Women, Amalgiri P.O., Kottayam - 686 561, Kerala, India

Abstract


The use of smartphones has become an inevitable part of the lives of common people, as these days almost every day to day activity requires the active use of smartphones for the real world task processing. As the demanding needs of smartphones with the bundled operating system code along with a huge variety of user applications increased, there also exists an evil part hidden within the wide variety of applications that the application developers make use of to gain profit by collecting details about users either as private personal documents or in the form of metadata. As normal users of the system, they may not be always informed or well known about the ways in which these applications work. There also exists a problem where user security is compromised in the form of malicious code. Many government organizations collect and record information about user activity through telecom operators in the name of some backdoor operations they were working without the user’s consent. In this paper we try to focus on the perspectives that a common user needs to be aware of, to make their system more private and secure it from data breeches.

Keywords


Countermeasures, Data Breaches, Data Security, Defense, Malware Attacks, User Privacy.

References





DOI: https://doi.org/10.17010/ijcs%2F2021%2Fv6%2Fi5%2F166514