Search results

1 – 10 of 24
Click here to view access options
Article
Publication date: 19 August 2021

Oussama BenRhouma, Ali AlZahrani, Ahmad AlKhodre, Abdallah Namoun and Wasim Ahmad Bhat

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand…

Abstract

Purpose

The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android devices.

Design/methodology/approach

This study uses a black-box testing-principles based methodology to develop use-cases that simulate real-world case-scenarios of the activities performed by the users on the social media application. The authors executed these use-cases in a controlled experiment and examined the Android smartphone to recover the private-data pertaining to these use-cases.

Findings

The results suggest that the social media data recovered from Android devices can reveal a complete timeline of activities performed by the user, identify all the videos watched, uploaded, shared and deleted by the user, disclose the username and user-id of the user, unveil the email addresses used by the user to download the application and share the videos with other users and expose the social network of the user on the platform. Forensic investigators may find this data helpful in investigating crimes such as cyber bullying, racism, blasphemy, vehicle thefts, road accidents and so on. However, this data-breach in Android devices is a threat to user's privacy, identity and profiling in second-hand market.

Practical implications

Perceived notion of data sanitisation as a result of application removal and factory-reset can have serious implications. Though being helpful to forensic investigators, it leaves the user vulnerable to privacy breach, identity theft, profiling and social network revealing in second-hand market. At the same time, users' sensitivity towards data-breach might compel users to refrain from selling their Android devices in second-hand market and hamper device recycling.

Originality/value

This study attempts to bridge the literature gap in social media data-breach in second-hand Android devices by experimentally determining the extent of the breach. The findings of this study can help digital forensic investigators in solving crimes such as vehicle theft, road accidents, cybercrimes and so on. It can assist smartphone users to decide whether to sell their smartphones in a second-hand market, and at the same time encourage developers and researchers to design methods of social media data sanitisation.

Details

Information & Computer Security, vol. 30 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Click here to view access options
Article
Publication date: 11 February 2019

Vinayak Agrawal and Shashikala Tapaswi

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by…

Abstract

Purpose

The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.

Design/methodology/approach

Logical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.

Findings

Forensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.

Research limitations/implications

As this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.

Practical implications

Most of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.

Originality/value

This is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Click here to view access options
Article
Publication date: 9 November 2015

Himanshu Srivastava and Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

Downloads
1282

Abstract

Purpose

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.

Design/methodology/approach

Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.

Findings

Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.

Research limitations/implications

The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.

Practical implications

The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.

Originality/value

This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Click here to view access options
Article
Publication date: 1 June 2012

Ahmed Patel, Wei Qi and Mona Taghavi

Mobile agent‐based e‐marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their…

Abstract

Purpose

Mobile agent‐based e‐marketplaces are business applications that have been developed as flexible and efficient approaches to help companies or corporations to extend their businesses to outreach larger markets without regional and continental boundaries. Every distributed system is unable to avoid security problems due to the open internet environment. Mobile agent‐based e‐marketplaces are no exceptions. The purpose of this paper is to design and implement a framework and system of a secure and trustworthy mobile agent‐based e‐marketplace to overcome this problem.

Design/methodology/approach

The authors present an analysis and evaluation of a secure and trustworthy mobile agent‐based e‐marketplace, which was specified and prototyped. The experimental results of the implemented system are used to address the evaluation of the system. The discussion of the solution is also presented.

Findings

The evaluation and performance results show that the proposed framework and system have the ability to provide a secure and efficient e‐marketplace environment for trading products. The authors draw conclusions and highlight future work on this specific research area.

Originality/value

The performance and scalability are the two most important issues for mobile‐agent based systems together with their feasibility. The evaluation and performance results are used to reflect the results of the research in its entirety.

Details

Information Management & Computer Security, vol. 20 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Click here to view access options
Book part
Publication date: 29 May 2020

Femi Oladele and Timothy G. Oyewole

Abstract

Details

Social Media, Mobile and Cloud Technology Use in Accounting: Value-Analyses in Developing Economies
Type: Book
ISBN: 978-1-83982-161-5

Click here to view access options
Article
Publication date: 25 November 2013

Wu He

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of…

Downloads
4016

Abstract

Purpose

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper is to survey the state-of-the-art of security aspect of mobile social media, identify recent trends, and provide recommendations for researchers and practitioners in this fast moving field.

Design/methodology/approach

This paper reviews disparate discussions in literature on security aspect of mobile social media though blog mining and an extensive literature search. Based on the detailed review, the author summarizes some key insights to help enterprises understand security risks associated with mobile social media.

Findings

Risks related to mobile social media are identified based on the results of the review. Best practices and useful tips are offered to help enterprises mitigate risks of mobile social media. This paper also provides insights and guidance for enterprises to mitigate the security risks of mobile social media.

Originality/value

The paper consolidates the fragmented discussion in literature and provides an in-depth review to help researchers understand the latest development of security risks associated with mobile social media.

Details

Information Management & Computer Security, vol. 21 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Click here to view access options
Book part
Publication date: 29 May 2020

Femi Oladele and Timothy G. Oyewole

Abstract

Details

Social Media, Mobile and Cloud Technology Use in Accounting: Value-Analyses in Developing Economies
Type: Book
ISBN: 978-1-83982-161-5

Click here to view access options
Article
Publication date: 4 April 2016

Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh and Ke Chen

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services…

Abstract

Purpose

The use of mobile devices in handling our daily activities that involve the storage or access of sensitive data (e.g. on-line banking, paperless prescription services, etc.) is becoming very common. These mobile electronic services typically use a knowledge-based authentication method to authenticate a user (claimed identity). However, this authentication method is vulnerable to several security attacks. To counter the attacks and to make the authentication process more secure, this paper aims to investigate the use of touch dynamics biometrics in conjunction with a personal identification number (PIN)-based authentication method, and demonstrate its benefits in terms of strengthening the security of authentication services for mobile devices.

Design/methodology/approach

The investigation has made use of three light-weighted matching functions and a comprehensive reference data set collected from 150 subjects.

Findings

The investigative results show that, with this multi-factor authentication approach, even when the PIN is exposed, as much as nine out of ten impersonation attempts can be successfully identified. It has also been discovered that the accuracy performance can be increased by combining different feature data types and by increasing the input string length.

Originality/value

The novel contributions of this paper are twofold. Firstly, it describes how a comprehensive experiment is set up to collect touch dynamics biometrics data, and the set of collected data is being made publically available, which may facilitate further research in the problem domain. Secondly, the paper demonstrates how the data set may be used to strengthen the protection of resources that are accessible via mobile devices.

Details

International Journal of Pervasive Computing and Communications, vol. 12 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Click here to view access options
Article
Publication date: 24 October 2019

Ewan Sutherland

The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against…

Abstract

Purpose

The purpose of this paper is to review the prosecution by US authorities of Zhongxing Telecommunication Equipment (ZTE) Corporation for its violation of sanctions against the sale of systems to Iran and North Korea; the violation of the plea agreement; and, following presidential intervention, the imposition of a further fine and restructuring of its management.

Design/methodology/approach

An analysis of the materials used in court proceedings and speeches by officials in the case against ZTE

Findings

The US president intervened in a quasi-judicial matter in which a foreign firm had violated US sanctions that he had supported to lessen the penalties it faced. The firm had also violated its plea agreement. This personal intervention weakened enforcement of US sanctions on human rights and weapons of mass destruction (WMD). However, it revealed the excessive reliance of Chinese manufacturers on US-domiciled suppliers of semiconductors and software.

Research limitations/implications

Neither was access to Chinese documents possible nor would it have been practicable to interview managers at ZTE.

Practical implications

Enforcement of US sanctions on the sale of telecommunications equipment have now been moved from strict enforcement on matters of human rights and WMD into political, trade and even personal negotiations with the US president.

Originality/value

A first analysis of a telecommunications sanctions case.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Click here to view access options
Article
Publication date: 6 August 2021

Rudi Wessel Pretorius, Sanet Carow, Graeme Wilson and Peter Schmitz

This paper aims to showcase and critically review the value of selected pedagogies in which real-world engagements are used to enhance sustainability learning in an open…

Abstract

Purpose

This paper aims to showcase and critically review the value of selected pedagogies in which real-world engagements are used to enhance sustainability learning in an open, distance and e-learning (ODeL) context in the Global South. The paper considers opportunities, issues, alternatives and implementation guidelines.

Design/methodology/approach

The School of Ecological and Human Sustainability (University of South Africa) serves as case study, with blended and fully online learning used as examples of pedagogies. The assessment of these pedagogies uses examples of learning activities and exercises, critical reflections on feedback by lecturers and students and consideration against criteria for real-world learning.

Findings

The experiences showcased illustrate that despite challenges in ODeL, real-world engagements can be used successful as pedagogy for sustainability learning in the Global South context. Limited access to ICTs can be mitigated through mobile technologies and free and open software applications, as illustrated by the examples in this paper.

Research limitations/implications

The case study approach and qualitative methodology present limitations, with focus on only two examples. However, significant depth is achieved with the assessment of these examples, while the recommendations and lessons learnt can be applied in other contexts, thus expanding on the knowledge and experience in this field.

Originality/value

This paper showcases innovative approaches to incorporate real-world engagements for sustainability learning in ODeL. Application of real-world engagements in ODeL in the Global South context is original and addresses the need for teaching and learning strategies responding to the digital divide and contributing to expand access to higher education and an Afrocentric discourse to best practice.

Details

International Journal of Sustainability in Higher Education, vol. 22 no. 6
Type: Research Article
ISSN: 1467-6370

Keywords

1 – 10 of 24