Benjamin Henne

Learn More
The amount of media uploaded to the Web is still rapidly expanding. The ease-of-use of modern smartphones in combination with the proliferation of high-speed mobile networks facilitates a culture of spontaneous and often carefree sharing of user-generated content, especially photos and videos. An increasing number of modern devices are capable of embedding(More)
—While mobile malware has played a relatively small role compared to the behemoth of desktop malware, the changes both in the capability as well as in the proliferation of the mobile devices will steadily increase the attractiveness of mobile devices as resources to be attacked. The increased usage and connectivity of mobile devices opens up a much larger(More)
Many privacy issues concerning photos on the Web and particularly the social Web have been discussed in the past. However, much of this discussion is based on anecdotal evidence and has focused on media uploaded by users themselves. We present the results of a survey conducted with 414 participants that studies user awareness of privacy issues concerning(More)
—Currently, location privacy settings of mobile operating systems are limited to the option of enabling or disabling the use of location completely or on a per-app basis. When location use is allowed, users always reveal their location in full precision even to apps that do not need it. For instance, weather forecast apps and navigation apps both get the(More)
The privacy problems associated with disclosing location information have repeatedly been the subject of research during the past decade. Yet, only the increasing adoption of smartphones today unveils real world implications, since a large number of users currently use location-based services and GPS-enabled devices for a multitude of purposes. Recently,(More)
The mobile computing world is undergoing major changes both in the capability as well as in the proliferation of mobile devices. While, up to now, mobile malware has played a relatively small role compared to the behemoth of desktop malware, the changing environment is steadily increasing the attractiveness of mobile devices as exploitable resources. The(More)
  • 1