Difference between revisions of "AFSecurity Seminar"
From mn/ifi/AFSecurity
Line 7: | Line 7: | ||
| <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center> | | <center>[[File:logo-Karlstad.png|150px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center> | ||
|} | |} | ||
− | * '''TITLE:''' ''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' ''Nurul Momen'' (Karlstad University) <br />'''ABSTRACT:''' What is the most intimate | + | * '''TITLE:''' ''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' ''Nurul Momen'' (Karlstad University) <br />'''ABSTRACT:''' What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave? |
15:00h Discussion<br /> | 15:00h Discussion<br /> |
Revision as of 09:56, 9 March 2020
Privacy for Mobile Apps
TIME: 14:00h, Friday 27 Mars 2020 Place: Kristen Nygaard's Hall (Room 5370), Ole-Johan Dahl's House, UiO AGENDA: 14:00h Welcome to UiO, coffee served |
|
- TITLE: Privacy for mobile apps: Technical, regulatory and human challenges
SPEAKER: Nurul Momen (Karlstad University)
ABSTRACT: What is the most intimate device that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
15:00h Discussion
BIO: Nurul Momen is a Ph.D. candidate in the Department of Computer Science and Mathematics at Karlstad University, Sweden. His research interests focus on privacy-enhancing technologies, transparency, usability, mobile communications, and data protection, particularly the security and privacy aspects of access-control models for mobile operating systems. Momen received an M.S. in security and an M.S. in privacy from the double-degree program at the Technical University of Berlin, Germany, and the University of Trento, Italy. Contact him at nurul.momen@kau.se.
AFSecurity is organised by the UiO Research Group on Digital Security |