Mobile Security and Privacy 393
should be able to detect such a privacy breach even if it is directly
involved.
Mobile privacy is more complicated than mobile security because
you cannot just draw a line between what information can be used
or shared and what cannot, whereas in security we know that a set of
security functions should be implemented in a system. Moreover, leg-
islation is very often involved, because privacy is indeed surrounded
by sensitive legal issues. Because a system may surreptitiously detect,
use, expose, distribute, or abuse people’s privacy-related information,
it seems quite reasonable to regulate the use of personal data by credit
card companies, telecoms, banks, etc. For example, laws pertaining
to privacy include the Privacy ...