Change search
Link to record
Permanent link

Direct link
Publications (10 of 53) Show all publications
Nordin, A., Ängeby, K. & Fritsch, L. (2022). Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management. In: Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering: . Paper presented at 16th European-Alliance-for-Innovation (EAI) International Conference on Body Area Networks (BodyNets), 25 December 2021 through 26 December 2021 (pp. 168-175). Springer, 420
Open this publication in new window or tab >>Body-Area Sensing in Maternity Care: Evaluation of Commercial Wristbands for Pre-birth Stress Management
2022 (English)In: Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, Springer, 2022, Vol. 420, p. 168-175Conference paper, Published paper (Refereed)
Abstract [en]

Many women use digital tools during pregnancy and birth. There are many existing mobile applications to measure quantity and length of contractions during early labour, but there is a need to offer evidence-based, credible electronic and digital solutions to parents-to-be. This article presents ongoing research work in a research project regarding mobile telemetric supported maternity care. It summarizes an approach for stress management in late maternity and under birth preparation that is based on body area sensing, our investigation of the properties of commercially available wearable wristbands for body sensing, and the insights gained from testing the wristbands from the project's perspective. We found that sensing precision is very variable depending on the wristband model, while the flows of medical personal data exclusively are routed through vendor cloud platforms outside the EU. The impact of our findings for the use of commercial wristbands in European medical research and practice is discussed in the conclusion.

Place, publisher, year, edition, pages
Springer, 2022
Keywords
Body area networking, Midwifery, Mobile health, Self-metering, Stress management, Wearables, Digital devices, mHealth, Wearable technology, Cloud platforms, Digital solutions, Digital tools, Evidence-based, Mobile applications, On-body, Property, Obstetrics
National Category
Health Sciences Computer and Information Sciences
Research subject
Nursing Science; Computer Science
Identifiers
urn:nbn:se:kau:diva-89507 (URN)10.1007/978-3-030-95593-9_14 (DOI)000774502300014 ()2-s2.0-85125236499 (Scopus ID)9783030955922 (ISBN)
Conference
16th European-Alliance-for-Innovation (EAI) International Conference on Body Area Networks (BodyNets), 25 December 2021 through 26 December 2021
Available from: 2022-04-13 Created: 2022-04-13 Last updated: 2022-09-07Bibliographically approved
Wairimu, S. & Fritsch, L. (2022). Modelling privacy harms of compromised personal medical data - Beyond data breach. In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security: . Paper presented at 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery (ACM), Article ID 133.
Open this publication in new window or tab >>Modelling privacy harms of compromised personal medical data - Beyond data breach
2022 (English)In: ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM), 2022, article id 133Conference paper, Published paper (Refereed)
Abstract [en]

What harms and consequences do patients experience after a medical data breach? This article aims at the improvement of privacy impact analysis for data breaches that involve personal medical data. The article has two major findings. First, scientific literature does not mention consequences and harms to the data subjects when discussing data breaches in the healthcare sector. For conceptualizing actual documented harm, we had to search court rulings and popular press articles instead. We present the findings of our search for empirically founded harms in the first part of the article. Second, we present a modified PRIAM assessment method with the goal of better assessment of harms and consequences of such data breaches for the patient/employee data subject in healthcare. We split the risk assessment into parallel categories of assessment rather than calculating a single risk score. In addition, we quantify the original PRIAM categories into a calculus for risk assessment. The article presents our modified PRIAM which is the result of these modifications. Our overall contribution is the collection of actual harms and consequences of e-health data breaches that complement the overly theoretical discussion in publications. With our operationalization of PRIAM and by providing a catalog of real harms examples, we focus privacy impact assessment on actual harms to persons.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
Series
ACM International Conference Proceeding Series
Keywords
Calculations, Data privacy, Health care, Consequence, Data breach, Data subjects, Harm, Medical data, Patient experiences, Personal health informations, Privacy, Privacy impact, Risks assessments, Risk assessment
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-91872 (URN)10.1145/3538969.3544462 (DOI)2-s2.0-85136920878 (Scopus ID)978-1-4503-9670-7 (ISBN)
Conference
17th International Conference on Availability, Reliability and Security, ARES 2022
Note

Detta paper var publicerat som manuskript med titeln Modelling Privacy Impact of Compromised Personal Medical Data: Beyond Data Breach i Wairimus licentiatuppsats Privacy and Security Analysis: Assessing Risks and Harm to Patients (2022).

Available from: 2022-09-13 Created: 2022-09-13 Last updated: 2022-10-04Bibliographically approved
Hatamian, M., Wairimu, S., Momen, N. & Fritsch, L. (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. Empirical Software Engineering, 26(3), Article ID 36.
Open this publication in new window or tab >>A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps
2021 (English)In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 26, no 3, article id 36Article in journal (Refereed) Published
Abstract [en]

As this article is being drafted, the SARS-CoV-2/COVID-19 pandemic is causing harm and disruption across the world. Many countries aimed at supporting their contact tracers with the use of digital contact tracing apps in order to manage and control the spread of the virus. Their idea is the automatic registration of meetings between smartphone owners for the quicker processing of infection chains. To date, there are many contact tracing apps that have already been launched and used in 2020. There has been a lot of speculations about the privacy and security aspects of these apps and their potential violation of data protection principles. Therefore, the developers of these apps are constantly criticized because of undermining users’ privacy, neglecting essential privacy and security requirements, and developing apps under time pressure without considering privacy- and security-by-design. In this study, we analyze the privacy and security performance of 28 contact tracing apps available on Android platform from various perspectives, including their code’s privileges, promises made in their privacy policies, and static and dynamic performances. Our methodology is based on the collection of various types of data concerning these 28 apps, namely permission requests, privacy policy texts, run-time resource accesses, and existing security vulnerabilities. Based on the analysis of these data, we quantify and assess the impact of these apps on users’ privacy. We aimed at providing a quick and systematic inspection of the earliest contact tracing apps that have been deployed on multiple continents. Our findings have revealed that the developers of these apps need to take more cautionary steps to ensure code quality and to address security and privacy vulnerabilities. They should more consciously follow legal requirements with respect to apps’ permission declarations, privacy principles, and privacy policy contents.

Place, publisher, year, edition, pages
Springer Nature, 2021
Keywords
contact tracing apps, covid19, privacy, security, software quality, android, permissions, personal data, maturity, information privacy, privacy risk
National Category
Computer and Information Sciences Software Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-83509 (URN)10.1007/s10664-020-09934-4 (DOI)000631083100001 ()2-s2.0-85103351291 (Scopus ID)
Projects
Digital Well ResearchAlert
Available from: 2021-03-22 Created: 2021-03-22 Last updated: 2022-09-15Bibliographically approved
Momen, N., Bock, S. & Fritsch, L. (2020). Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android. In: SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies: . Paper presented at The 25th ACM Symposium on Access Control Models and Technologies, Barcelona, Spain, June 10-12, 2020. (pp. 71-80). ACM Digital Library
Open this publication in new window or tab >>Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android
2020 (English)In: SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, ACM Digital Library, 2020, p. 71-80Conference paper, Published paper (Refereed)
Abstract [en]

The consent to personal data sharing is an integral part of modern access control models on smart devices. This paper examines the possibility of registering conditional consent which could potentially increase trust in data sharing. We introduce an indecisive state of consenting to policies that will enable consumers to evaluate data services before fully committing to their data sharing policies. We address technical, regulatory, social, individual and economic perspectives for inclusion of partial consent within an access control mechanism. Then, we look into the possibilities to integrate it within the access control model of Android by introducing an additional button in the interface---\emph{Maybe}. This article also presents a design for such implementation and demonstrates feasibility by showcasing a prototype built on Android platform. Our effort is exploratory and aims to shed light on the probable research direction.

Place, publisher, year, edition, pages
ACM Digital Library, 2020
Keywords
Partial consent; Access control; Privacy; Data protection
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-77501 (URN)10.1145/3381991.3395603 (DOI)2-s2.0-85086822285 (Scopus ID)
Conference
The 25th ACM Symposium on Access Control Models and Technologies, Barcelona, Spain, June 10-12, 2020.
Funder
The Research Council of Norway, 270969
Available from: 2020-04-19 Created: 2020-04-19 Last updated: 2021-03-18Bibliographically approved
Momen, N. & Fritsch, L. (2020). App-generated digital identities extracted through Androidpermission-based data access - a survey of app privacy. In: Reinhardt, D.; Langweg, H.; Witt, B. C; Fischer, M (Ed.), Sicherheit 2020: . Paper presented at INFORMATIK 2020 - Back to the Future (pp. 15-28). Gesellschaft für Informatik
Open this publication in new window or tab >>App-generated digital identities extracted through Androidpermission-based data access - a survey of app privacy
2020 (English)In: Sicherheit 2020 / [ed] Reinhardt, D.; Langweg, H.; Witt, B. C; Fischer, M, Gesellschaft für Informatik, 2020, p. 15-28Conference paper, Published paper (Refereed)
Abstract [en]

Smartphone apps that run on Android devices can access many types of personal information. Such information can be used to identify, profile and track the device users when mapped into digital identity attributes. This article presents a model of identifiability through access to personal data protected by the Android access control mechanism called permissions. We present an abstraction of partial identity attributes related to such personal data, and then show how apps accumulate such attributes in a longitudinal study that was carried out over several months. We found that apps' successive access to permissions accumulates such identity attributes, where different apps show different interest in such attributes.

Place, publisher, year, edition, pages
Gesellschaft für Informatik, 2020
Keywords
Privacy; Android; Apps; IdentiĄcation; Digital Identity; Survey and Permissions
National Category
Computer Sciences Information Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-77345 (URN)10.18420/sicherheit2020_01 (DOI)978-3-88579-695-4 (ISBN)
Conference
INFORMATIK 2020 - Back to the Future
Projects
Ars Forencia
Note

Konferensen inställd, men bidrag publicerat

Available from: 2020-03-24 Created: 2020-03-24 Last updated: 2021-03-11Bibliographically approved
Bisztray, T., Gruschka, N., Mavroeidis, V. & Fritsch, L. (2020). Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics. In: Heiko Roßnagel, Christian Schunck, Sebastian Mödersheim, Detlef Hühnlein (Ed.), Open Identity Summit 2020: . Paper presented at Open Identity Summit 2020 (pp. 185-192). Bonn: Gesellschaft für Informatik e.V., P-305
Open this publication in new window or tab >>Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics
2020 (English)In: Open Identity Summit 2020 / [ed] Heiko Roßnagel, Christian Schunck, Sebastian Mödersheim, Detlef Hühnlein, Bonn: Gesellschaft für Informatik e.V. , 2020, Vol. P-305, p. 185-192Conference paper, Published paper (Refereed)
Abstract [en]

Privacy issues concerning biometric identification are becoming increasingly relevant due to their proliferation in various fields, including identity and access control management (IAM). The General Data Protection Regulation (GDPR) requires the implementation of a data protection impact assessment for privacy critical systems. In this paper, we analyse the usefulness of two different privacy impact assessment frameworks in the context of biometric data protection. We use experiences from the SWAN project that processes four different biometric characteristics for authentication purposes. The results of this comparison elucidate how useful these frameworks are in identifying sector-specific privacy risks related to IAM and biometric identification.

Place, publisher, year, edition, pages
Bonn: Gesellschaft für Informatik e.V., 2020
Series
Lecture Notes in Informatics, ISSN 1617-5468 ; P-305
Keywords
data protection, privacy, impact assessment, GDPR, DPIA, identity management, biometrics
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-77895 (URN)10.18420/ois2020_17 (DOI)2-s2.0-85097354539 (Scopus ID)978-3-88579-699-2 (ISBN)
Conference
Open Identity Summit 2020
Funder
The Research Council of Norway
Available from: 2020-05-29 Created: 2020-05-29 Last updated: 2021-04-22Bibliographically approved
Fritsch, L. (2020). Identification collapse - contingency in Identity Management. In: Heiko Roßnagel; Christian Schunck; Sebastian Mödersheim; Detlev Hühnlein (Ed.), Open Identity Summit 2020: . Paper presented at Open Identity Summit 2020 (pp. 15-26). Bonn: Gesellschaft für Informatik e.V., P-305
Open this publication in new window or tab >>Identification collapse - contingency in Identity Management
2020 (English)In: Open Identity Summit 2020 / [ed] Heiko Roßnagel; Christian Schunck; Sebastian Mödersheim; Detlev Hühnlein, Bonn: Gesellschaft für Informatik e.V. , 2020, Vol. P-305, p. 15-26Conference paper, Published paper (Refereed)
Abstract [en]

Identity management (IdM) facilitates identification, authentication and authorization inmost digital processes that involve humans. Digital services as well as work processes, customerrelationship management, telecommunications and payment systems rely on forms of IdM. IdMis a business-critical infrastructure. Organizations rely on one specific IdM technology chosen tofit a certain context. Registration, credential issuance and deployment of digital identities are thenbound to the chosen technology. What happens if that technology is disrupted? This article discussesconsequences and mitigation strategies for identification collapse based on case studies and literaturesearch. The result is a surprising shortage of available documented mitigation and recovery strategiesfor identification collapse.

Place, publisher, year, edition, pages
Bonn: Gesellschaft für Informatik e.V., 2020
Series
Lecture Notes in Informatics (LNI), ISSN 1617-5468 ; P-305
Keywords
Identity management;business continuity;cybersecurity;contingency management
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-77893 (URN)10.18420/ois2020_01 (DOI)2-s2.0-85097355232 (Scopus ID)978-3-88579-699-2 (ISBN)
Conference
Open Identity Summit 2020
Available from: 2020-05-29 Created: 2020-05-29 Last updated: 2021-03-18Bibliographically approved
Fritsch, L. (2020). Identity Management as a target in cyberwar. In: Heiko Roßnagel, Christian Schunck, Sebastian Mödersheim, Detlef Hühnlein (Ed.), Open Identity Summit 2020: . Paper presented at Open Identity Summit 2020 (pp. 61-70). Bonn: Gesellschaft für Informatik e.V., P-305
Open this publication in new window or tab >>Identity Management as a target in cyberwar
2020 (English)In: Open Identity Summit 2020 / [ed] Heiko Roßnagel, Christian Schunck, Sebastian Mödersheim, Detlef Hühnlein, Bonn: Gesellschaft für Informatik e.V. , 2020, Vol. P-305, p. 61-70Conference paper, Published paper (Refereed)
Abstract [en]

This article will discuss Identity Management (IdM) and digital identities in the context ofcyberwar. Cyberattacks that target or exploit digital identities in this context gain leverage throughthe central position of IdM digital infrastructures. Such attacks will compromize service operations,reduce the security of citizens and will expose personal data - those of military personell included. Thearticle defines the issue, summarizes its background and then discusses the implications of cyberwarfor vendors and applicants digital identity management infrastructures where IdM is positioned as acritical infrastructure in society.

Place, publisher, year, edition, pages
Bonn: Gesellschaft für Informatik e.V., 2020
Series
Lecture Notes in Informatics (LNI), ISSN 1617-5468 ; P-305
Keywords
Identity management;Cyberwar;Cyber conflict;Digital identities;Information Privacy; Critical Infrastructure Protection;Security;Cyberconflict;Cybersecurity
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-77894 (URN)10.18420/ois2020_05 (DOI)2-s2.0-85097341633 (Scopus ID)978-3-88579-699-2 (ISBN)
Conference
Open Identity Summit 2020
Available from: 2020-05-29 Created: 2020-05-29 Last updated: 2021-03-18Bibliographically approved
Toresson, L., Shaker, M., Olars, S. & Fritsch, L. (2020). PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users. In: Communications in Computer and Information Science, CCIS: . Paper presented at International Conference on Human-Computer Interaction, HCI International 2020, 19 July 2020 through 24 July 2020 (pp. 613-621). Springer, 1226
Open this publication in new window or tab >>PISA: A Privacy Impact Self-assessment App Using Personas to Relate App Behavior to Risks to Smartphone Users
2020 (English)In: Communications in Computer and Information Science, CCIS, Springer, 2020, Vol. 1226, p. 613-621Conference paper, Published paper (Refereed)
Abstract [en]

We present an educative self-assessment app intended to increase awareness of app-related privacy risks. The privacy impact self-assessment (PISA) app is intended to stimulate smartphone user reflection over risks of data sharing and data extraction from their smartphones. An interactive user interface performs an end-user targeted dialogue about apps using personas with a variety of vulnerabilities. The guided dialogue about threats is intended to engage the user’s reflection about own app risk. We describe the underlying model and interaction design, summarize the personas and discuss the user interfaces implemented in the app.

Place, publisher, year, edition, pages
Springer, 2020
Series
Communications in Computer and Information Science book series, ISSN 1865-0929, E-ISSN 1865-0937
Keywords
Privacy impact awareness, Privacy personas, Privacy risk, Smartphone apps, User education, User interface, Data Sharing, Human computer interaction, Risk assessment, Smartphones, Data extraction, End users, Interaction design, Interactive user interfaces, Privacy risks, Self assessment, User interfaces
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-82949 (URN)10.1007/978-3-030-50732-9_79 (DOI)2-s2.0-85088741692 (Scopus ID)978-3-030-50731-2 (ISBN)978-3-030-50732-9 (ISBN)
Conference
International Conference on Human-Computer Interaction, HCI International 2020, 19 July 2020 through 24 July 2020
Available from: 2021-02-19 Created: 2021-02-19 Last updated: 2021-04-28Bibliographically approved
Hatamian, M., Momen, N., Fritsch, L. & Rannenberg, K. (2019). A Multilateral Privacy Impact Analysis Method for Android Apps. In: M. Naldi, G. F. Italiano, K. Rannenberg, M. Medina & A. Bourka (Ed.), Privacy Technologies and Policy: . Paper presented at Annual Privacy Forum 2019, Rome, Italy, June 13-14 (pp. 87-106). Cham: Springer, 11498
Open this publication in new window or tab >>A Multilateral Privacy Impact Analysis Method for Android Apps
2019 (English)In: Privacy Technologies and Policy / [ed] M. Naldi, G. F. Italiano, K. Rannenberg, M. Medina & A. Bourka, Cham: Springer, 2019, Vol. 11498, p. 87-106Conference paper, Published paper (Refereed)
Abstract [en]

Smartphone apps have the power to monitor most of people’s private lives. Apps can permeate private spaces, access and map social relationships, monitor whereabouts and chart people’s activities in digital and/or real world. We are therefore interested in how much information a particular app can and intends to retrieve in a smartphone. Privacy-friendliness of smartphone apps is typically measured based on single-source analyses, which in turn, does not provide a comprehensive measurement regarding the actual privacy risks of apps. This paper presents a multi-source method for privacy analysis and data extraction transparency of Android apps. We describe how we generate several data sets derived from privacy policies, app manifestos, user reviews and actual app profiling at run time. To evaluate our method, we present results from a case study carried out on ten popular fitness and exercise apps. Our results revealed interesting differences concerning the potential privacy impact of apps, with some of the apps in the test set violating critical privacy principles. The result of the case study shows large differences that can help make relevant app choices.

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
Lecture Notes in Computer Science, LNCS, ISSN 0302-9743, E-ISSN 1611-3349 ; 11498
Keywords
Smartphone apps, Case study, Security, Privacy, Android, Privacy policy, Reviews, Privacy impact, Privacy score and ranking, Privacy risk, Transparency
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-72432 (URN)10.1007/978-3-030-21752-5_7 (DOI)000561013800007 ()2-s2.0-85067825202 (Scopus ID)978-3-030-21751-8 (ISBN)978-3-030-21752-5 (ISBN)
Conference
Annual Privacy Forum 2019, Rome, Italy, June 13-14
Projects
Excellenta miljön, 8730Alert, 5617Privacy & Us, 4961
Available from: 2019-06-12 Created: 2019-06-12 Last updated: 2020-09-24Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-0418-4121

Search in DiVA

Show all publications