Abstract
Mobile devices and various applications have become an increasingly essential aspect of daily user activity. A key element common for mobile applications available on the market is that they use geolocation. This functionality supports desirable actions to be performed in respect of personalized user expectations. Although the functionality provides a number of benefits, it may also be a source of potential risks to its users. Not only does it expose their views but it may also limit their civil liberties. The article discusses issues related to the access to private data through geolocation services on mobile devices. It focuses on quantitative and qualitative research involving a sample of two hundred most popular free applications in Poland. Research questions aim to obtain information about the nature and the percentage of applications that require access to dubious or special permissions, implemented tracking codes, or trackers, as well as to verify the correlation between tracking codes embedded in applications and requests for access permission. The explanation of technological conditions and processes conducive to aggregate seemingly inaccessible data and possibilities of their use was essential to the success of the research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Following Dominik Karbowski’s definition, geotrapping is a method of “identifying smartphone and tablet users staying in a specific place at a given time. It enables the targeting of an advertising campaign based on the user’s historical location data and targeting them with advertisements also long after leaving the location” (Nowy Marketing, 2017).
- 2.
Exodus Privacy is a French non-profit organization run by activists working to protect privacy in the virtual space. So far, as part of their activities, they have issued 120,000 reports for over 68,000 mobile applications available in the Google Play store. In over 41,000 of them, they identified the tracking codes of advertising ID aggregators (Exodus Privacy, 2020).
- 3.
Whenever the following phrases appear in the paper: elevated privileges, privileged privileges, dangerous privileges, they refer to privileges that, following Android developers, were categorized as privileges that were assigned the rank of “dangerous”.
- 4.
Out of 89 applications requesting more than five elevated privileges and at the same time access to a location (exact or approximate), five of them required access to an approximate location only (these were: Booking, FatSecret, Reddit, Smule, Zara).
- 5.
Out of 39 applications requesting less than six elevated privileges and at the same time access to a location (exact or approximate), four required access only to an approximate location (these were: Allegro, ASOS, Dublicat, Ewa: learn English).
- 6.
Sample of 200 applications, minimum amount equal to 0, maximum 47, and σ is 7.88.
- 7.
Sample of 128 applications, minimum amount equal to 0, maximum 44, and σ is 7.84.
- 8.
SDK—(Software Development Kit) a software library that connects an application to a certain network of online services. This library can perform various functions, for example retrieve the current weather for a specific location. It is also supposed to collect data about the device and transfer it to its own servers—for example by sending weather inquiries for the device’s location.
- 9.
- 10.
A beacon in wireless technology is the concept of broadcasting small pieces of information. The information may be anything, ranging from ambient data (temperature, air pressure, humidity, and so forth) to micro-location data (asset tracking, retail, and so forth) or orientation data (acceleration, rotation, and so forth) (Lindh, 2016, p. 2).
References
AFP News Agency: Protesters Light Up Central Hong Kong in Peaceful Vigil (2019). https://www.youtube.com/watch?v=lBWM-rdjSkA. Last accessed 15 February 2020.
Android Developers: Permissions Overview (2019). https://developer.android.com/guide/topics/permissions/overview#normal-dangerous. Last accessed 15 February 2020.
Calabrese C., McInnis K. L., Hans G. S., Norcie G.: Comments for November 2015 Workshop on Cross-Device Tracking (2015). https://cdt.org/wp-content/uploads/2015/10/10.16.15-CDT-Cross-Device-Comments.pdf. Last accessed 15 February 2020.
Developer Apple: Documentation: ASIdentifierManager (2019). https://developer.apple.com/documentation/adsupport/asidentifiermanager. Last accessed 15 February 2020.
Digital Advertising Alliance: Your Ad Choices. https://optout.aboutads.info. Last accessed 15 February 2020.
Edwards, E.: Google’s New ‘Advertising ID’ Is Now Live And Tracking Android Phones—This Is What It Looks Like, Business Insider (2014). https://www.businessinsider.com/googles-new-advertising-id-is-now-live-and-tracking-new-android-phonesthis-is-what-it-looks-like-2014-1?IR=T. Last accessed 15 February 2020.
Exodus Privacy. https://exodus-privacy.eu.org/en. Last accessed 15 February 2020.
Fang, L.: The Trump Campaign Is Deploying Phone Location-Tracking Technology, The Intercept (2019). https://theintercept.com/2019/12/11/the-donald-trump-campaign-is-deploying-phone-location-tracking-technology. Last accessed 15 February 2020.
Google Support. Identyfikator wyświetlania reklam (2019). https://support.google.com/googleplay/android-developer/answer/6048248. Last accessed 15 February 2020.
Lindh, J.: Bluetooth Low Energy Beacons, Application Report, Texas Instruments (2016). https://www.ti.com/lit/an/swra475a/swra475a.pdf. Last accessed 15 February 2020.
Modon, A.: SilverPush Launches Cross-Device Ad Targeting with Unique Audio Beacon Technology (2014). https://www.prweb.com/releases/silverpush/201407/prweb12043235.htm. Last accessed 15 February 2020.
Mosenia, A., Dai, X., Mittal, P., Jha, N. K.: PinMe: Tracking a Smartphone User around the World. IEEE Transactions on Multi-Scale Computing Systems, 4(3), 420–435 (2018). http://www.arsalanmosenia.com/papers/Pinme_preprint.pdf. Last accessed 15 February 2020.
Nirupam, R., Haitham, H., Romit, R. C.: BackDoor: Making Microphones Hear Inaudible Sounds, in MobiSys (2017). https://synrg.csl.illinois.edu/papers/backdoor_mobisys17.pdf.
Nowy Marketing. G - Geotrapping (Encyklopedia Marketingu) (2017). https://nowymarketing.pl/a/16641,g-geotrapping-encyklopedia-marketingu. Last accessed 15 February 2020.
Selectivv. Open’er Festival 2017 – analiza uczestników (2017). https://selectivv.com/opener-festival-2017-uzytkownicy-smartfonow-liczbach-infografika/. Last accessed 15 February 2020.
Statistica. Number of Smartphone Users Worldwide from 2016 to 2021, Statista.com (2020). https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/. Last accessed 15 February 2020.
Warzel, Ch., Thompson, S. T.: How Your Phone Betrays Democracy. The New York Times (2019). https://www.nytimes.com/interactive/2019/12/21/opinion/location-data-democracy-protests.html. Last accessed 15 February 2020.
Zhuang, Y., Yang, J., Li, Y., Qi, L., El-Sheimy, N. Smartphone-Based Indoor Localization with Bluetooth Low Energy Beacons. Sesnsors, 16(5) (2016). https://www.mdpi.com/1424-8220/16/5/596/pdf. Last accessed 15 February 2020.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jabłońska, M., Jabłoński, P. (2021). Mobile Devices: A Public Source of Private Data. In: Musiał-Karg, M., Luengo, Ó.G. (eds) Digitalization of Democratic Processes in Europe. Studies in Digital Politics and Governance. Springer, Cham. https://doi.org/10.1007/978-3-030-71815-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-71815-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71814-5
Online ISBN: 978-3-030-71815-2
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)