O'Reilly logo

Mobile Security and Privacy by Raymond Choo, Man Ho Au

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

An Introduction to Various Privacy Models

X. Lu; M.H. Au    The Hong Kong Polytechnic University, Kowloon, Hong Kong

Abstract

While the growing popularity of mobile devices has brought great convenience to the general public, it also put the privacy of the individuals at risk. Mobile users’ data are being collected by mobile devices every day for business and research purposes. The use of data mining tools has become increasingly popular. As such, great care must be taken, as the data collected may contain sensitive personal information. While the data may not contain explicit identifiers, they include information about location, physical attributes, or even payment history of an individual. When combined with some publicly available ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required