Privacidad y procesado automático de datos personales mediante aplicaciones y bots

  1. Moreno Muñoz, Miguel
Revista:
Dilemata

ISSN: 1989-7022

Año de publicación: 2017

Título del ejemplar: Ética de datos, sociedad y ciudadanía

Número: 24

Páginas: 1-23

Tipo: Artículo

Otras publicaciones en: Dilemata

Resumen

Los servicios prestados a través de redes digitales involucran a una compleja red de actores –no necesariamente humanos– que procesan información personal y explotan comercialmente sus ventajas. El desarrollo de aplicaciones y la introducción de bots y asistentes personales ligados a ecosistemas de servicios en la nube, cuyo desarrollo, supervisión y mejora depende con frecuencia de una sola empresa, añade complejidad adicional a este entramado de intermediarios y plantea riesgos específicos en materia de seguridad y privacidad. En este trabajo analizo las amenazas emergentes para la privacidad derivadas del empleo generalizado de aplicaciones y bots, en un contexto de demanda creciente de servicios gratuitos en la nube gestionados a través de dispositivos móviles.

Referencias bibliográficas

  • Adewole, Kayode Sakariyah, Nor Badrul Anuar, Amirrudin Kamsin, Kasturi Dewi Varathan, and Syed Abdul Razak. Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications 79, February 2017, 41–67.
  • Ashton, Kevin. That “Internet of Things” Thing. RFID Journal 2009. Disponible en: http://www. rfidjournal.com/articles/view?4986.
  • Atzori, Luigi, Antonio Iera, Giacomo Morabito, and Michele Nitti. The Social Internet of Things (SIoT) – When social networks meet the Internet of Things: Concept, architecture and network characterization. Computer Networks 56, November 2012, 3594–3608. Disponible en: http://linkinghub.elsevier.com/retrieve/pii/S1389128612002654.
  • Bal, Gökhan, Kai Rannenberg, and Jason I. Hong. Styx: Privacy risk communication for the Android smartphone platform based on apps’ data-access behavior patterns. Computers & Security 53, 2015, 187–202.
  • Boshmaf, Yazan, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu. Design and analysis of a social botnet. Computer Networks 57, February 2013, 556–578.
  • Bottazzi, Giovanni, and Gianluigi Me. Chapter 17 Responding to cyber crime and cyber terrorism— botnets an insidious threat A2 Akhgar, Babak. Eds. Andrew Staniforth and Francesca B T Cyber Crime and Cyber Terrorism Investigator’s Handbook Bosco, 231–257, Syngress, 2014 .
  • Broad, James, and Andrew Bindner. Chapter 10 Maintaining Access BT Hacking with Kali. 167– 180, [Boston]: Syngress, 2014.
  • Cardozo, Nate, Cindy Cohn, Parker Higgins, Marcia Hofmann, and Rainey Reitman. 2013 Who Has Your Back: Which Companies Help Protect Your Data from the Government? The Electronic Frontier Foundation’s Third Annual Report on Online Service Providers’ Privacy and Transparency Practices Regarding Government Access to User Data. 2013 Disponible en: https://www.eff.org/sites/default/files/who-has-your-back-2013-report-20130513.pdf.
  • Chatfield, T. (5/05/2013), “La verdad de las mentiras en internet”, disponible en: http:// www.bbc.com/mundo/movil/noticias/2013/05/130503_internet_web_mentiras_finde.shtml
  • Drum, K. (2013), “Privacy is dead. Long live transparency!”. Disponible en: http://www.motherjones.com/politics/2013/10/future-of-privacy-nsa-snowden
  • Elliott, Claire. Botnets: To what extent are they a threat to information security? Information Security Technical Report 15, August 2010, 79–103.
  • Ericsson (2014), The Impact of Datafication on Strategic Landscapes. Disponible en: http://www.ericsson.com/res/docs/2014/the-impact-of-datafication-on-strategic-landscapes.pdf
  • Farina, Paolo, Enrico Cambiaso, Gianluca Papaleo, and Maurizio Aiello. Are mobile botnets a possible threat? The case of SlowBot Net. Computers & Security 58, May 2016, 268–283.
  • Farley, Ryan, and Xinyuan Wang. Roving bugnet: Distributed surveillance threat and mitigation. Computers & Security 29, July 2010, 592–602.
  • Friedman, T. L. “How to Beat the Bots”. The New York Times, 10/06/2015. Disponible en: https://www.nytimes.com/2015/06/10/opinion/thomas-friedman-how-to-beat-the-bots.html?_r=0
  • Gartner (2015), Top Strategic Predictions for 2016 and Beyond: The Future Is a Digital Thing. Disponible en: https://www.gartner.com/doc/3142020/top-strategic-predictions-future-digital.
  • Goh, Ong Sing, Chun Che Fung, and Arnold Depickere. Domain knowledge query conversation bots in instant messaging (IM). Knowledge-Based Systems 21, October 2008, 681–691.
  • Hoofnagle, Chris Jay, and Jennifer King. What Californians Understand about Privacy Online. SSRN Electronic Journal 2008. Disponible en: http://www.ssrn.com/abstract=1262130.
  • Informe “We Are Social 2017” (págs. 5, 6, 46 y 50), disponible en: http://www.slideshare.net/wearesocialsg/digital-in-2017-global-overview?ref=https://thenextweb.com/insights/2017/01/24/digital-trends-2017-report-internet/; https://dazeinfo.com/2016/06/13/number-internet-users-worldwide-2016-2020; http://www.internetworldstats.com/stats.htm.
  • Iqbal, Salman et al. On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications 74, October 2016, 98–120.
  • Ji, Yuede, Yukun He, Xinyang Jiang, Jian Cao, and Qiang Li. Combating the evasion mechanisms of social bots. Computers & Security 58, May 2016, 230–249.
  • Khajenasiri, Iman, Abouzar Estebsari, Marian Verhelst, and Georges Gielen. A Review on Internet of Things Solutions for Intelligent Energy Control in Buildings for Smart City Applications. Energy Procedia 111, March 2017, 770–779. Disponible en: http://linkinghub.elsevier.com/retrieve/pii/S1876610217302692.
  • Khan, Minhaj Ahmad. A survey of security issues for cloud computing. Journal of Network and Computer Applications 71, August 2016, 11–29.
  • Kobie, N. “What is the internet of things?”, 6/05/2015. Disponible en: https://www.theguardian.com/technology/2015/may/06/what-is-theinternet-of-things-google
  • Kshetri, Nir. Big data’s impact on privacy, security and consumer welfare. Telecommunications Policy 38, December 2014, 1134–1145. Disponible en: http://linkinghub.elsevier.com/retrieve/pii/S0308596114001542.
  • Kshetri, Nir. The evolution of the internet of things industry and market in China: An interplay of institutions, demands and supply. Telecommunications Policy 41, 2017, 49–67.
  • Li, Min, Xiaoxun Sun, Hua Wang, Yanchun Zhang, and Ji Zhang. Privacy-aware access control with trust management in web service. World Wide Web 14, 2011, 407–430.
  • Luna Dong, X. et al. (2015), “Knowledge-Based Trust: Estimating the Trustworthiness of Web Sources”, Proceedings of the VLDB Endowment. Disponible en: https://arxiv.org/pdf/1502.03519v1.pdf
  • Madden, M. (2014), “Public perceptions of privacy and security in the post-snowden era”. Pew Research Center’s Internet & American Life Project. Disponible en: http://www.pewinternet.org/2014/11/12/public-privacyperceptions
  • Mansfield-Devine, Steve. Monitoring communications: the false positive problem. Computer Fraud & Security 2013, September 2013, 5–11.
  • Mansfield-Devine, Steve. Ransomware: taking businesses hostage. Network Security 2016, October 2016, 8–17. Disponible en: http://linkinghub.elsevier.com/retrieve/pii/S1353485816300964
  • McGee, M. (3/03/2015), “Google Researchers Introduce System To Rank Web Pages On Facts, Not Links”, disponible en: http://searchengineland.com/google-researchers-introduce-system-rankweb-pages-facts-not-links-215835
  • Mendelson, D., and D. Mendelson. Legal protections for personal health information in the age of Big Data – a proposal for regulatory framework. Ethics, Medicine and Public Health 3, 2017, 37–55.
  • Mollah, Muhammad Baqer, Md. Abul Kalam Azad, and Athanasios Vasilakos. Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications 84, 2017, 38–54.
  • Nguyen, Kenneth D., Heather Rosoff, and Richard S. John. The effects of attacker identity and individual user characteristics on the value of information privacy. Computers in Human Behavior 55, 2016, 372–383.
  • Pagallo, Ugo. Robots in the cloud with privacy: A new threat to data protection? Computer Law & Security Review 29, October 2013, 501–508.
  • Parra-Arnau, Javier. Pay-per-tracking: A collaborative masking model for web browsing. Information Sciences 385–386, April 2017, 96–124.
  • Perera, Charith, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. Context Aware Computing for The Internet of Things: A Survey. IEEE Communications Surveys & Tutorials 16, 2014, 414–454. Disponible en: http://ieeexplore.ieee.org/document/6512846.
  • Qin, Yongrui et al. When things matter: A survey on data-centric internet of things. Journal of Network and Computer Applications 64, April 2016, 137–153. Disponible en: http://linkinghub.elsevier.com/retrieve/pii/S1084804516000606.
  • Rabotka, Vladimir, and Mohammad Mannan. An evaluation of recent secure deduplication proposals. Journal of Information Security and Applications 27–28, April 2016, 3–18.
  • Sarabia, D. “La NSA almacenó más de 150 millones de llamadas en 2016 pese a los cambios en la ley”, 03/05/2017. Disponible en: http://www.eldiario.es/cultura/ tecnologia/privacidad/NSA-almaceno-millones-llamadas-cambios_0_639736184.html
  • Schuster, Stefan, Melle van den Berg, Xabier Larrucea, Ton Slewe, and Peter Ide-Kostic. Mass surveillance and technological policy options: Improving security of private communications. Computer Standards & Interfaces 50, 2017, 76–82.
  • Seewald, Alexander K, and Wilfried N Gansterer. On the detection and identification of botnets. Computers & Security 29, February 2010, 45–58.
  • Tormo, Ginés Dólera, Félix Gómez Mármol, and Gregorio Martínez Pérez. Towards privacy-preserving reputation management for hybrid broadcast broadband applications. Computers & Security 49, March 2015, 220–238.
  • Truong, Hong-Linh, Phu H Phung, and Schahram Dustdar. Governing Bot-as-a-Service in Sustainability Platforms – Issues and Approaches. Procedia Computer Science 10, 2012, 561–568.
  • Voigt, K. (2012), “China looks to lead the Internet of Things”. Disponible en: http://www.cnn.com/2012/11/28/business/china-internet-of-things
  • Weber, Rolf H, and Evelyne Studer. Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review 32, October 2016, 715–728.
  • Zarpelão, Bruno Bogaz, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84, April 2017, 25–37. Disponible en: http://linkinghub.elsevier.com/retrieve/pii/S1084804517300802.
  • Zhao, David et al. Botnet detection based on traffic behavior analysis and flow intervals. Computers & Security 39, Part A, November 2013, 2–16.