IEEE Technology and Society Magazine - Winter 2014 - 56

frequency of privacy protection
application downloads, were also
considered as independent variables.
It was found that users' skills,
in addition to the developed market
and the wealth of the country are key
factors when it comes to understanding and recognizing privacy threats,
such as monitoring, interception,
and content blocking. The majority
of advanced and intermediate users
in the sample come from the countries with high mobile service penetration and high GNI. These users
are much more aware of blocking
and monitoring activities than less
skilled users from the less developed
and poorer markets. Advanced users
are also much more aware that the
communication monitoring activities are performed by state agencies,
compared to the beginner and intermediate users. Correlation between
religion and users' trust in the state
agencies (measured as a percentage of the Muslim citizenship) has
shown that this correlation is very
probable, which explains why in
the three wealthy Muslim countries
(Oman, Saudi Arabia, and to less
extend but significantly Azerbaijan)
users are more tolerant to censorship
and trust state agencies. China is an
exception, but this is explained by
market level development and the
affordability of the technology, as
China is the only country from those
studied with its own mobile technology manufacturers.

Greater Availability May
Correlate with User
Acceptance of ReligionBased Restrictions
With the results obtained from this
study we were able to conclude that
in countries where modern mobile
technology is affordable and is
freely offered to the citizens, some
strong restrictions and regulations
implemented by governments in
order to control Internet content and
traffic are more acceptable to users
when this is aligned with the dominant religion. In this situation, users

56

|

do not perceive the censorship as a
great evil and they believe that the
implemented regulation has protective purpose. On the contrary, in
slow-developing countries, where
modern technology is less affordable, the mobile market is strongly
controlled - if the regime adopts
strong traffic and content regulation,
the user community is not tolerant,
and faith in the state agencies is lost.
It should also be noted that in
countries where mobile markets are
strongly regulated, mobile handset
user security and safety strategies
are a challenging and complicated
issue. First, assessment of the most
popular handsets has shown that
security and privacy protection features are not present by default.
Recent reports in the media, after
the disclosure of the PRISM program, have shown that manufacturers have intentionally left some open
doors and various loopholes in the
IETF standards, allowing unnoticed
entrance of interception tools [13].
The disclosure of the privacy abuse
has consequences for a handset owner's habits, as they are aware of the
fact that their communication can
be seen/heard and recorded by nonbenevolent third parties. Privacy
protection becomes a difficult task
for the less-skilled handset owners.
Our study underlined several
similarities between the analyzed
regions and some cases in the EU
and the U.S. after the disclosure
of the PRISM activities. Skilled
and wealthier users from developed markets are better informed
about privacy threats, and in such
situations they normally demand
changes to existing regulations.
However, the level of trust
enjoyed by state owned agencies
differs from one region to another,
and such is the case with users
from Saudi Arabia, the Sultanate of
Oman, Azerbaijan, and China. as
users in those countries trust their
state agencies and have more faith in
existing regulations. This is possibly
a matter of culture and religion.

Author Information
Cormac Callanan is with Aconite
Internet Solutions, Dublin, Ireland;
e-mail: cc@aconite.com.
Borka Jerman-Blažicˇ is with
Josef Stefan International Postgraduate School, Slovenia; Email:
borka@e5.ijs.si.

Acknowledgment
Assistance in collecting expert data
was provided by Freedom House
(FH) and the Broadcasting Board
of Governors (BBG). They had no
part in the preparation of this article or in the decision to submit this
article for publication.

References

[1] ITU, Measuring the Information Society Report, 2013;, http://www.itu.int/, accessed Feb. 8,
2014.
[2] C. Callanan and H. Dries-Ziekenheiner,
"Safety on the line," Dec. 2012.
[3] C. Callanan, B. Jerman-Blažicˇ, and H.
Dries-Ziekenheiner, "Empirical assessment of
data protection and circumvention tools availability in mobile networks," in Proc. Second
Int. Conf. Cyber Security, Cyber Peacefare
and DigitalForensic, CyberSec2013 (Kuala
Lumpur), Asia Pacific University of Technology and Innovation, 2013, pp. 206-220.
[4] C. Guo, H.J. Wang, and W. Zhu, "Smart
phone attacks and defenses," in Proc. Third
ACM Workshop on Hot Topics in Networks
(HotNets-III), 2004.
[5] J. Jamaluddin, N. Zotou, and P. Coulton,
"Mobile phone vulnerabilities: A new generation of malware," in Proc. IEEE Int. Symp.
Consumer Electronics," 2004, pp. 199-202.
[6] N. Feamster, M. Balazinska, and G. Harfst,
"Infranet: Circumventing web censorship and
surveillance," in Proc. 11th USENIX Security
Symp., 2002.
[7] "Orbot: Proxy with Tor," Google play,
2012;
https://play.google.com/store/apps/
details?id=org.torproject.android&hl=en, accessed May 2013.
[8] B. N. Levine and C. Shields Hordesk, "A
multicast-based protocol for anonymity," J. Computer Security, vol. 10, no. 3, pp. 213-240, 2002.
[9] "Mobile apps and code you can trust,"
GuardianProject, 2012; https://guardianproject.info/, accessed May 2013.
[10] RIM, Research in Motion/Blackberry,
2012; http://www.blackberry.com.
[11] A. Puder and O. Antebi, "Cross-compiling
Android Applications to iOS and Windows
phone," Mobile Networks and Applications,
vol. 18, pp. 3-21, 2013.
[12] "Global stats," Statcounter, 2012; http://
gs.statcounter.com/, accessed May 2013.
[13] P. Rosenzweig, "The continuing struggle
for control of cyberspace-And the deterioration of western influence," New York Times,
Jan. 13, 2014.

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

|

WINTER 2014


http://www.itu.int/ https://play.google.com/store/apps/ https://guardianpro http://www.ject.info/ http://www.blackberry.com http://http:// http://gs.statcounter.com/

Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Winter 2014

IEEE Technology and Society Magazine - Winter 2014 - Cover1
IEEE Technology and Society Magazine - Winter 2014 - Cover2
IEEE Technology and Society Magazine - Winter 2014 - 1
IEEE Technology and Society Magazine - Winter 2014 - 2
IEEE Technology and Society Magazine - Winter 2014 - 3
IEEE Technology and Society Magazine - Winter 2014 - 4
IEEE Technology and Society Magazine - Winter 2014 - 5
IEEE Technology and Society Magazine - Winter 2014 - 6
IEEE Technology and Society Magazine - Winter 2014 - 7
IEEE Technology and Society Magazine - Winter 2014 - 8
IEEE Technology and Society Magazine - Winter 2014 - 9
IEEE Technology and Society Magazine - Winter 2014 - 10
IEEE Technology and Society Magazine - Winter 2014 - 11
IEEE Technology and Society Magazine - Winter 2014 - 12
IEEE Technology and Society Magazine - Winter 2014 - 13
IEEE Technology and Society Magazine - Winter 2014 - 14
IEEE Technology and Society Magazine - Winter 2014 - 15
IEEE Technology and Society Magazine - Winter 2014 - 16
IEEE Technology and Society Magazine - Winter 2014 - 17
IEEE Technology and Society Magazine - Winter 2014 - 18
IEEE Technology and Society Magazine - Winter 2014 - 19
IEEE Technology and Society Magazine - Winter 2014 - 20
IEEE Technology and Society Magazine - Winter 2014 - 21
IEEE Technology and Society Magazine - Winter 2014 - 22
IEEE Technology and Society Magazine - Winter 2014 - 23
IEEE Technology and Society Magazine - Winter 2014 - 24
IEEE Technology and Society Magazine - Winter 2014 - 25
IEEE Technology and Society Magazine - Winter 2014 - 26
IEEE Technology and Society Magazine - Winter 2014 - 27
IEEE Technology and Society Magazine - Winter 2014 - 28
IEEE Technology and Society Magazine - Winter 2014 - 29
IEEE Technology and Society Magazine - Winter 2014 - 30
IEEE Technology and Society Magazine - Winter 2014 - 31
IEEE Technology and Society Magazine - Winter 2014 - 32
IEEE Technology and Society Magazine - Winter 2014 - 33
IEEE Technology and Society Magazine - Winter 2014 - 34
IEEE Technology and Society Magazine - Winter 2014 - 35
IEEE Technology and Society Magazine - Winter 2014 - 36
IEEE Technology and Society Magazine - Winter 2014 - 37
IEEE Technology and Society Magazine - Winter 2014 - 38
IEEE Technology and Society Magazine - Winter 2014 - 39
IEEE Technology and Society Magazine - Winter 2014 - 40
IEEE Technology and Society Magazine - Winter 2014 - 41
IEEE Technology and Society Magazine - Winter 2014 - 42
IEEE Technology and Society Magazine - Winter 2014 - 43
IEEE Technology and Society Magazine - Winter 2014 - 44
IEEE Technology and Society Magazine - Winter 2014 - 45
IEEE Technology and Society Magazine - Winter 2014 - 46
IEEE Technology and Society Magazine - Winter 2014 - 47
IEEE Technology and Society Magazine - Winter 2014 - 48
IEEE Technology and Society Magazine - Winter 2014 - 49
IEEE Technology and Society Magazine - Winter 2014 - 50
IEEE Technology and Society Magazine - Winter 2014 - 51
IEEE Technology and Society Magazine - Winter 2014 - 52
IEEE Technology and Society Magazine - Winter 2014 - 53
IEEE Technology and Society Magazine - Winter 2014 - 54
IEEE Technology and Society Magazine - Winter 2014 - 55
IEEE Technology and Society Magazine - Winter 2014 - 56
IEEE Technology and Society Magazine - Winter 2014 - 57
IEEE Technology and Society Magazine - Winter 2014 - 58
IEEE Technology and Society Magazine - Winter 2014 - 59
IEEE Technology and Society Magazine - Winter 2014 - 60
IEEE Technology and Society Magazine - Winter 2014 - 61
IEEE Technology and Society Magazine - Winter 2014 - 62
IEEE Technology and Society Magazine - Winter 2014 - 63
IEEE Technology and Society Magazine - Winter 2014 - 64
IEEE Technology and Society Magazine - Winter 2014 - 65
IEEE Technology and Society Magazine - Winter 2014 - 66
IEEE Technology and Society Magazine - Winter 2014 - 67
IEEE Technology and Society Magazine - Winter 2014 - 68
IEEE Technology and Society Magazine - Winter 2014 - 69
IEEE Technology and Society Magazine - Winter 2014 - 70
IEEE Technology and Society Magazine - Winter 2014 - 71
IEEE Technology and Society Magazine - Winter 2014 - 72
IEEE Technology and Society Magazine - Winter 2014 - 73
IEEE Technology and Society Magazine - Winter 2014 - 74
IEEE Technology and Society Magazine - Winter 2014 - 75
IEEE Technology and Society Magazine - Winter 2014 - 76
IEEE Technology and Society Magazine - Winter 2014 - 77
IEEE Technology and Society Magazine - Winter 2014 - 78
IEEE Technology and Society Magazine - Winter 2014 - 79
IEEE Technology and Society Magazine - Winter 2014 - 80
IEEE Technology and Society Magazine - Winter 2014 - Cover3
IEEE Technology and Society Magazine - Winter 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com