10 research outputs found

    PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices

    Get PDF
    Mobile devices are ubiquitous in today's digital world. While people enjoy the convenience brought by mobile devices, it has been proven that many mobile apps leak personal information without user consent or even awareness. That can occur due to many reasons, such as careless programming errors, intention of developers to collect private information, infection of innocent apps by malware, etc. Thus, the research community has proposed many methods and systems to detect privacy leakage and prevent such detected leakage on mobile devices. This is a to do note at margin While it is obviously essential to evaluate the accuracy and effectiveness of privacy protection systems, we are not aware of any automated system that can benchmark performance of privacy protection systems on Android devices. In this paper, we report PPAndroid-Benchmarker, the first system of this kind, which can fairly benchmark any privacy protection systems dynamically (i.e., in run time) or statically. PPAndroid-Benchmarker has been released as an open-source tool and we believe that it will help the research community, developers and even end users to analyze, improve, and choose privacy protection systems on Android devices. We applied PPAndroid-Benchmarker in dynamic mode to 165 Android apps with some privacy protection features, selected from variant app markets and the research community, and showed effectiveness of the tool. We also illustrate two components of PPAndroid-Benchmarker on the design level, which are Automatic Test Apps Generator for benchmarking static analysis based tools and Reconfigurability Engine that allows any instance of PPAndroid-Benchmarker to be reconfigured including but not limited to adding and removing information sources and sinks. Furthermore, we give some insights about current status of mobile privacy protection and prevention in app markets based upon our analysis

    Sinus Histiocytosis with Massive Lymphadenopathy: A Case Report with Pleural Effusion and Cervical Lymphadenopathy

    Get PDF
    Sinus histiocytosis with massive lymphadenopathy (SHML) is a rare disorder characterized by a nonneoplastic proliferation of distinctive histiocyte cells within lymph node sinuses and lymphatics in extranodal sites. SHML occurs worldwide and is primarily a disease of childhood and early adulthood. A 26-yr-old man presented with painless palpable lymph node in cervical area. Radiographic studies revealed pleural effusion with lymphadenopathy and calcification in mediastinum. The cervical lymph node biopsy showed dilated sinuses filled with histiocytes with clear cytoplasm. The cells stained positive with CD68 and S-100. These cytologic and immunohistochemical findings were considered consistent with the diagnosis of SHML

    Fidelity assessment of the suicide reporting guidelines in Korean newspapers

    No full text
    Abstract Background With the dishonor of being the highest suicide rated country in Organisation for Economic Co-operation and Development, South Korea should take more initiatives in suicide prevention. Although the role of the media and its relation to actual suicide attempts has been tested and supported by many studies, the suicide reporting guidelines are not well followed. The purpose of this study is to examine how well Korean newspapers adhere to existing guidelines and to suggest limitation and improvements for the current guidelines. Methods Five mainstream newspapers in South Korea, namely, Kyunghyang Shinmun, Hankyoreh, Chosun Ilbo, JoongAng Daily, and Dong-A Ilbo, were chosen for the analysis. Using the Naver news search engine, articles dated from January 1, 2014, to December 31, 2017, were selected with the keyword “suicide” and advanced option “printed newspaper.” However, articles, columns, opinions, and reviews that utilized the word “suicide” in a general context were excluded from the final analysis. Finally, the number of cases was narrowed down to 368. Each article was analyzed using the guideline framework consisting of 13 items: sensational coverage, overstatement, direct wording, method used, details about site/location, photographs, suicide note, generalization, speculation, romanticization, interviews with the bereaved, help-seeking information, and public education. Results More than 60% of the articles included direct wording (63.9%), mentioned the method used (68.2%), and provided details about the site or location (74.5%). Nearly half of the articles revealed the contents of the suicide note (44.6%). Less than 3% of the suicide reports had information about hotline logo or phone numbers (1.4%) and facts regarding suicide and suicide prevention (2.2%). Conclusions Our study revealed that the guidelines were ineffective in their monitoring role and that most of the newspapers were incompliant with many significant guideline items in South Korea. Our findings not only explore the limitations of the current guidelines but also provide an important rationale as to why there should be stronger suicide monitoring regulation or an agency with sufficient authority to prevent suicide in a nation-wide scale

    Ontology Development for Cyber Violence Victimization in Korean Adolescents

    No full text
    Since the dynamics and forms of cyber violence evolve at the same rapid pace as technology platforms, we used social big data to develop an ontology for cyber violence victimization in South Korea. Following the seven-stage ontology development process, we extracted keywords from 3,075 social media data sources including online articles, comments, and blogs. Focus group interview data was also obtained from 40 adolescents and 5 cyber violence experts. The analysis identified domains for (1) participants subdivided by age, school level, sex, form, and relationship; (2) protective and risk factors by individuals, family, friends, school, community, and online systems; (3) types by form and method of violence; (4) characteristics by media and distinct features; (5) outcomes by individual and relational/social; and (6) interventions and policies by personal coping strategies, services/interventions, and laws/policies. These findings provide a multi-faceted perspective on cyber violence victimization experiences in South Korea. In addition, the results elucidate the newest types of cyber violence in real-life terms

    Cyberbullying Victimisation and School Dropout Intention among South Korean Adolescents: The Moderating Role of Peer/Teacher Support

    No full text
    10.1080/02185385.2020.1774409Asia Pacific Journal of Social Work and Development303195-21

    A Social-Ecological Approach to Understanding the Relationship between Cyberbullying Victimization and Suicidal Ideation in South Korean Adolescents: The Moderating Effect of School Connectedness

    No full text
    Background: Cyberbullying victimization and suicidal ideation are both ongoing deleterious social problems in South Korea. Using the social-ecological approach, this study examined the association between cyberbullying victimization and suicidal ideation as well as the buffering role of school connectedness in this relationship. Methods: A nationally representative sample of 7333 adolescents from the 2016 Korean Children and Youth Right Study participated in the study. Data were analyzed using descriptive statistics, Wald chi-square test, bivariate correlations, and multivariate logistic regression analyses. Results: Nearly 17.7% of adolescents were cyberbullied, and 28.4% had suicidal ideation in the past 12 months. Cyberbullying victims were at an increased risk of suicidal ideation. The results also found that parental abuse, family dysfunction, and perceived peer relationship stress were positively associated with suicidal ideation, while parental support for autonomy was negatively associated with suicidal ideation. Further, school connectedness moderated on the relationship between cyberbullying victimization and adolescent suicidal ideation. Conclusions: These findings suggest that various stakeholders should consider interventions and preventive programs that address school connectedness when working with adolescents who are victims of cyberbullying and exhibit suicidal behavior

    Information flows as a permission mechanism

    No full text
    This paper proposes Flow Permissions, an extension to the Android permission mechanism. Unlike the existing permis-sion mechanism, our permission mechanism contains seman-tic information based on information flows. Flow Permis-sions allow users to examine and grant per-app information flows within an application (e.g., a permission for reading the phone number and sending it over the network) as well as cross-app information flows across multiple applications (e.g., a permission for reading the phone number and send-ing it to another application already installed on the user’s phone). Our goal with Flow Permissions is to provide visi-bility into the holistic behavior of the applications installed on a user’s phone. In order to support Flow Permissions on Android, we have developed a static analysis engine that detects flows within an Android application. We have also modified Android’s existing permission mechanism and in-stallation procedure to support Flow Permissions. We evalu-ate our prototype with 2,992 popular applications and 1,047 malicious applications and show that our design is practical and effective in deriving Flow Permissions. We validate our cross-app flow generation and installation procedure on a Galaxy Nexus smartphone
    corecore