Difference between revisions of "AFSecurity Seminar"
From mn/ifi/AFSecurity
Line 1: | Line 1: | ||
− | == | + | == Privacy for Mobile Apps == |
{| border="0" cellpadding="1" cellspacing="1" width="100%" | {| border="0" cellpadding="1" cellspacing="1" width="100%" | ||
Line 7: | Line 7: | ||
| <center>[[File:GNSS.png|200px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center><center>GNSS</center> | | <center>[[File:GNSS.png|200px|link=https://wiki.uio.no/mn/ifi/AFSecurity/]]</center><center>GNSS</center> | ||
|} | |} | ||
− | * '''TITLE:''' '' | + | * '''TITLE:''' ''Privacy for mobile apps: Technical, regulatory and human challenges'' <br />'''SPEAKER:''' ''Nurul Momen'' (Karlstad University) <br />'''ABSTRACT:''' What is the most intimate thing that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave? |
16:00h Discussion<br /> | 16:00h Discussion<br /> | ||
− | '''BIO:''' | + | '''BIO:''' Nurul Momen |
− | + | PhD Student, PriSec<br /> | |
+ | Dept. of Mathematics & Computer Science <br /> | ||
+ | Karlstad University, Sweden. | ||
{| border="0" cellpadding="1" cellspacing="1" width="90%" | {| border="0" cellpadding="1" cellspacing="1" width="90%" |
Revision as of 19:20, 7 March 2020
Privacy for Mobile Apps
TIME: 15:00h, Wednesday 26 February 2020 Place: Kristen Nygaard's Hall (Room 5370), Ole-Johan Dahl's House, UiO AGENDA: 15:00h Welcome to UiO |
|
- TITLE: Privacy for mobile apps: Technical, regulatory and human challenges
SPEAKER: Nurul Momen (Karlstad University)
ABSTRACT: What is the most intimate thing that you possess? If the answer is your mobile phone, you'd probably be interested in finding out how apps behave. In one end, we have a powerful device capable of collecting, monitoring, processing, transmitting data and in other end, this device is connected to hundreds of services through apps. Undeniably, users are being subjected to privacy exploitation due to the obvious reason - surveillance capitalism. We intend to turn the table around by simply asking - how do the apps behave?
16:00h Discussion
BIO: Nurul Momen
PhD Student, PriSec
Dept. of Mathematics & Computer Science
Karlstad University, Sweden.
AFSecurity is organised by the UiO Research Group on Digital Security |