Skip to main content

The Black Mirror: What Your Mobile Phone Number Reveals About You

  • Conference paper
  • First Online:
Business Information Systems (BIS 2020)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 389))

Included in the following conference series:

Abstract

In the present era of pervasive mobile technologies, interconnecting innovations are increasingly prevalent in our lives. In this evolutionary process, mobile and social media communication systems serve as a backbone for human interactions. When assessing privacy risks related to this, privacy scoring models (PSM) can help quantifying the personal information risks. This paper uses the mobile phone number itself as a basis for privacy scoring. We tested 1,000 random phone numbers for their matching to social media accounts. The results raise concerns how network and communication layers are predominately connected. PSMs will support future organizational sensitivity for data linkability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See https://www.onlinestatusmonitor.com, last accessed 2019/12/01.

  2. 2.

    The prototype can be accessed via https://github.com/swingingcode/bis2020_blackmirror.

  3. 3.

    An example of such a search engine is http://shodan.io, last accessed 2019/12/07.

References

  1. Agudelo-Serna, C.A., Ahmad, A., Bosua, R., et al.: Strategies to mitigate knowledge leakage risk caused by the use of mobile devices: a preliminary Study. In: ICIS 2017: Transforming Society with Digital Innovation, pp. 1–19. Seoul (2017)

    Google Scholar 

  2. Holland, M.: WhatsApp ermöglicht weiterhin Überwachung beliebiger Nutzer. https://www.heise.de/newsticker/meldung/WhatsApp-ermoeglicht-weiterhin-Ueberwachung-beliebiger-Nutzer-3857506.html. Accessed 07 Dec 2019

  3. Dwyer, C., Hiltz, S.R., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. Am. Conf. Inf. Syst. 123, 339–350 (2007)

    Google Scholar 

  4. Bundesnachrichtendienst: OSINT. http://www.bnd.bund.de/DE/Auftrag/Informations-gewinnung/OSINT/-osint_node.html. Accessed 07 Dec 2019

  5. Europol: Cyber Intelligence. https://www.europol.europa.eu/activities-services/services-support/intelligence-analysis/cyber-intelligence. Accessed 07 Dec 2019

  6. Meffert, H., Burmann, C., Kirchgeorg, M.: Marketing. Grundlagen Marktorientierter Unternehmensführung. Springer, Wiesbaden (2012)

    Google Scholar 

  7. Kunz, T., Fuchs, M.: Pre-call validation of RDD cell phone numbers. A field experiment. In: JSM Proceedings (2011)

    Google Scholar 

  8. T-Systems International GmbH: Den Überblick über die wichtigen Orte haben. https://www.t-systems.com/blob/384750/cdfde6863685cf0f08068a53e9e18a84/DL_Flyer_Motionlogic.pdf. Accessed 07 Dec 2019

  9. Bélanger, F., Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 35(4), 1017–1041 (2011)

    Article  Google Scholar 

  10. Petkos, G., Papadopoulos, S., Kompatsiaris, Y.: PScore: a framework for enhancing privacy awareness in online social networks. In: 10th International Conference on Availability, Reliability and Security, pp. 592–600 (2015)

    Google Scholar 

  11. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5(1), 1–30 (2010)

    Article  Google Scholar 

  12. Vidyalakshmi, B.S., Wong, R.K., Chi, C.H.: Privacy scoring of social network users as a service. In: Proceedings - 2015 IEEE International Conference on Services Computing, SCC 2015, New York, pp. 218–225, New York (2015)

    Google Scholar 

  13. Hamed, A., Ayed, H.K.B.: Privacy scoring and users’ awareness for Web tracking. In: 6th International Conference on Information and Communication Systems, pp. 100–105. Fort Worth (2015)

    Google Scholar 

  14. Kaffel, H., Ayed, B.: Privacy risk assessment for web tracking. In: 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Vancouver (2016)

    Google Scholar 

  15. Fife, E., Orjuela, J.: Mobile phones and user perceptions of privacy and security. In: International Conference on Mobile Business, p. 23, Delft (2012)

    Google Scholar 

  16. Rechert, K., Meier, K., Wehrle, D., et al.: Location privacy in mobile telephony networks – conflict of interest between safety, security and privacy. In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing, pp. 508–513. Dalian (2011)

    Google Scholar 

  17. European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC, Official Journal of the European Union, pp. 1–88 (2018)

    Google Scholar 

  18. Deswarte, Y., Aguilar Melchor, C.: Current and future privacy enhancing technologies for the Internet. Ann. Telecommun. 61, 399–417 (2006)

    Article  Google Scholar 

  19. Herrmann, D.: Privacy issues in the domain name system and techniques for self-defense. IT-Inf. Technol. 57(6), 388–393 (2015)

    Google Scholar 

  20. Lowry, P.B., Cao, J., Everard, A.: Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures. J. Manag. Inf. Syst. 27(4), 163–200 (2011)

    Article  Google Scholar 

  21. Külcü, Ö., Henkoglu, T.: Privacy in social networks: an analysis of Facebook. Int. J. Inf. Manag. 34, 761–769 (2014)

    Article  Google Scholar 

  22. Lankton, N.K., McKnight, D.H., Tripp, J.F.: Understanding the antecedents and outcomes of Facebook privacy behaviors: an integrated model. IEEE Trans. Eng. Manag. 1–15 (2019)

    Google Scholar 

  23. Kesdogan, D., Fouletier, X.: Power control in cellular radio systems. In: IEEE Wireless Communication System Symposium, pp. 35–40, London (1995)

    Google Scholar 

  24. Palat, S.K., Andresen, S.: User profiles and their replication for reduction of HLR accesses and signalling load. In: Proceedings of ICUPC 5th International Conference on Universal Personal Communications, IEEE, pp. 865–869, Cambridge (1996)

    Google Scholar 

  25. Arapinis, M., Ilaria Mancini, L., Ritter, E., et al.: Analysis of privacy in mobile telephony systems verifying interoperability requirements in pervasive systems. Int. J. Inf. Secur. 16(5), 491–523 (2016)

    Article  Google Scholar 

  26. Eren, E., Detken, K.-O.: Mobile Security. Risiken mobiler Kommunikation und Lösungen zur mobilen Sicherheit. Carl Hanser Verlag, München, Wien (2006)

    Google Scholar 

  27. Costin, A., Isacenkova, J., Balduzzi, M., et al.: The role of phone numbers in understanding cyber-crime schemes. In: 11th Annual Conference on Privacy, Security and Trust, pp. 213–222, Tarragona (2013)

    Google Scholar 

  28. Bundesnetzagentur: Numbering plan for the numbering space for public telecommunications. https://www.bundesnetzagentur.de/SharedDocs/Downloads/EN/Areas/Telecommunications/Companies/NumberManagement/numbering_space/NP_numbering_space_2016.pdf?blob=publicationFile&v=1. Accessed 07 Dec 2019

  29. Abramova, O., Krasnova, H., Tan, C.-W.: How much will you pay? Understanding the value of information cues in the sharing economy. In: ECIS 2017 Proceedings, pp. 1011–1028, Guimarães (2017)

    Google Scholar 

  30. Baden-Württemberg, Kultusministerium.: Kommunikationsplattformen am Beispiel WhatsApp. https://it.kultus-bw.de/,Lde_DE/Startseite/IT-Sicherheit/Kommunikations-plattformen?QUERYSTRING=whatsapp. Accessed 07 Dec 2019

  31. Karaboga, M., Masur, P., Matzner, T., et al.: Selbstdatenschutz. In: Schütz et al. (ed.) Schriftenreihe Forum Privatheit und selbstbestimmtes Leben in der digitalen Welt, Fraunhofer-Institut für System- und Innovationsforschung ISI, Karlsruhe (2014)

    Google Scholar 

  32. Frischmann, B., Selinger, E.: Re-Engineering Humanity. Cambridge University Press, Cambridge (2018)

    Book  Google Scholar 

  33. Stibe, A., Cugelman, B.: Social influence scale for technology design and transformation. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11748, pp. 561–577. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-29387-1_33

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicolai Krüger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krüger, N., Stibe, A., Teuteberg, F. (2020). The Black Mirror: What Your Mobile Phone Number Reveals About You. In: Abramowicz, W., Klein, G. (eds) Business Information Systems. BIS 2020. Lecture Notes in Business Information Processing, vol 389. Springer, Cham. https://doi.org/10.1007/978-3-030-53337-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-53337-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-53336-6

  • Online ISBN: 978-3-030-53337-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics