Published June 19, 2017 | Version v1
Journal article Open

Possessing Mobile Devices

Creators

  • 1. Meiji University (明治大学)

Description

Smartphones and tablet computers have an ownership model more akin to that of games consoles such as the Sony PlayStation than the PC. Given the ubiquity of these devices and their very broad capabilities and usage, this leaves users vulnerable to significant security and privacy violations. Rather than users possessing these devices, the devices are possessed by multiple third parties, to the detriment of users' rights. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.

Files

Possession_v3.pdf

Files (75.8 kB)

Name Size Download all
md5:6acdd0c632ade34202cd7baad8f1702b
75.8 kB Preview Download

Additional details

References

  • [1] R. Anderson. Security engineering. 2nd ed. John Wiley & Sons, 2008. [2] P. Bright. Google won't �x bug hitting 60 percent of Android phones. 13th Jan. 2015. url: tinyurl.com/o2d5hho. [3] M. D. Cavelty. \Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities". In: Science and engineering ethics 20.3 (2014), pp. 701{715. [4] R. Chow. \Why-Spy: An Analysis of Privacy and Geolocation in the Wake of the 2010 Google Wi-Spy Controversy". In: Rutgers Computers and Technology Law Journal 39 (2013), pp. 56{93. [5] Copyright O�ce of the Library of Congress (US). Exemption to Prohibition on Cir- cumvention of Copyright Protection Systems for Access Control Technologies. 2012. url: tinyurl.com/ngewrn2. [6] B. F. Fitzgerald. \The PlayStation mod chip: a technological guarantee of the digital consumer's liberty or copyright menace/circumvention device?" In: Media and arts law review 10.1 (2005), pp. 85{98. [7] N. Ford. Hacked Jeep USB software patch criticized. 8th September. 2015. url: tinyurl.com/qy82237. [8] A. Greenberg. Hackers Remotely Kill a Jeep on the HighwayWith Me in It. Wired, 21st July. 2015. url: tinyurl.com/oaabx46. [9] J. W. Harris. \Who owns my body". In: Oxford Journal of Legal Studies 16.1 (1996), pp. 55{84. [10] V. Heuston R. F. \Donoghue v. Stevenson in retrospect". In: Modern Law Review 20 (1957), p. 1. [11] M. T. Hoeker. \From Carterfone to the iPhone: Consumer Choice in the Wireless Telecommunications Marketplace". In: CommLaw Conspectus 17 (2008), p. 187. [12] IDC. Android and iOS Squeeze the Competition, Swelling to 96.3% of the Smartphone Operating System Market for Both 4Q14 and CY14, According to IDC. Press Release from International Data Corporation. 2015. url: tinyurl.com/p5mltv4. [13] M. Kan. Samsung faces lawsuit in China over bloatware on phones. PCWorld 3rd July. 2015. url: tinyurl.com/pqqddke. [14] V. Kumpu. \Privacy and the emergence of the \ubiquitous computing society": The struggle over the meaning of \privacy" in the case of the Apple location tracking scandal". In: Technology in Society 34.4 (2012), pp. 303{310. issn: 0160-791X. doi: dx.doi.org/10.1016/j.techsoc.2012.10.002. url: www.sciencedirect.com/ science/article/pii/S0160791X12000565. [15] T. B. Lee. \Jailbreaking now legal under DMCA for smartphones, but not tablets". In: arstechnica (2012). 26th Octover. tinyurl.com/8os3qn5. [16] A. Lella and A. Lipsman. The U.S. Mobile App Report. comScore White Paper. 21st August. 2014. url: tinyurl.com/pokl2uf. [17] S. Liebergeld and M. Lange. \Android security, pitfalls and lessons learned". In: Information Sciences and Systems 2013. Springer, 2013, pp. 409{417. [18] N. Mawston. Android Shipped 1 Billion Smartphones Worldwide in 2014. Strategy Analytics Report. 29th January. 2015. url: tinyurl.com/om9etpe. [19] J. Pearson. White Hat Hackers Would Have Their Devices Destroyed Under the TPP. Motherboard, 9th October. 2015. url: tinyurl.com/o3bm553. [20] S. Perez. Majority Of Digital Media Consumption Now Takes Place In Mobile Apps. TechCrunch. 21st August. 2014. url: tinyurl.com/mlvo5el. [21] B. Reeves and C. Nass. The Media Equation. 2nd Ed. Stanford: CSLI, 2002. [22] K. Rogers. Jailbroken: Examining the policy and legal implications of iPhone jail- breaking. 2012. [23] SnoopWall. Flashlight Apps Threat Assessment Report. 2014. url: tinyurl . com / pvj3oh3. [24] D. R. Thomas, A. R. Beresford, and A. Rice. \Security Metrics for the Android Ecosystem". In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM. 2015, pp. 87{98. [25] J. Vincent. \Emotional Attachment to Mobile Phones: An Extraordinary Relation- ship". In: Mobile World. Ed. by Lynne Hamill, Amparo Lasen, and Dan Diaper. Springer London, 2005, pp. 93{104. url: dx.doi.org/10.1007/1-84628-204-7_6. [26] J. W. Wade. \Strict Tort Liability of Manufacturers". In: Southwestern Law Journal 19 (1965), p. 5. [27] M. H. Wolk. \The iPhone Jailbreaking Exemption and the Issue of Openness". In: Cornell Journal of Law and Public Policy 19 (2009), pp. 795{828. [28] T. Wu. \Wireless Carterfone". In: International Journal of Communication 1 (2007), pp. 389{426. [29] X. Zhou et al. \The peril of fragmentation: Security hazards in android device driver customizations". In: Security and Privacy (SP), 2014 IEEE Symposium on. IEEE. 2014, pp. 409{423. 8