Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corre...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Security experts often question why some users take actions that could expose them to security and p...
none4noSmartphones contain a myriad of personal information and, due to their ubiquity and the possi...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
This paper describes how mobile device apps can inadvertently broadcast personal information through...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public ...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile ne...
In recent years, we have seen the increase of Internet of Things (IoT) solutions, products and servi...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Security experts often question why some users take actions that could expose them to security and p...
none4noSmartphones contain a myriad of personal information and, due to their ubiquity and the possi...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
This paper describes how mobile device apps can inadvertently broadcast personal information through...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public ...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile ne...
In recent years, we have seen the increase of Internet of Things (IoT) solutions, products and servi...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
Our smartphone is full of applications and data that analytically organize, facilitate and describe ...
The importance of wireless cellular communication in our daily lives has grown considerably in the l...
Security experts often question why some users take actions that could expose them to security and p...