Authors: Stefanović, Tamara
Ghilezan, Silvia 
Affiliations: Mathematics 
Mathematical Institute of the Serbian Academy of Sciences and Arts 
Title: Preserving Privacy in Caller ID Applications
Series/Report no.: IFIP Advances in Information and Communication Technology
First page: 151
Last page: 168
Related Publication(s): Privacy and Identity Management
Conference: IFIP International Summer School on Privacy and Identity Management
Issue Date: 1-Apr-2021
Rank: M33
ISBN: 978-3-030-72465-8
ISSN: 1868-4238
DOI: 10.1007/978-3-030-72465-8_9
Caller identification (or Caller ID) is a telephone service that transmits a caller’s phone number to a receiving party’s telephony equipment when the call is being set up. Besides the telephone number, the Caller ID service may transmit a name associated with the calling telephone number. The appearance of the first Caller ID devices caused suspicion among the users and the public because of the potential security and privacy issues that the caller identification may cause. Privacy issues apply to users of the Caller ID applications, but also to non-users whose phone numbers are stored in the database of some Caller ID application. The emergence of the data privacy laws has led discussions on the privacy policies of Caller ID applications and their compliance with the law. In this paper we investigate two Caller ID applications, Truecaller and Everybody, and compliance of their privacy policies with the data privacy laws, especially the GDPR, the ePrivacy Directive and the ePrivacy Regulation. Further, we deal in more detail with the data privacy problem of non-users and we give the connection between those problems, and the inverse privacy problem. In order to solve the privacy problem of non-users, we develop the mathematical model based on the notions of privacy variables and sensitivity function. Finally, we discussed open questions related to the identity protection of Caller ID app users and non-users, and their trust in Caller ID apps.
Keywords: Caller ID applications | GDPR | Inverse privacy | Name sensitivity | Privacy policy | Privacy variables
Publisher: Springer Link
Project: Advanced artificial intelligence techniques for analysis and design of system components based on trustworthy BlockChain technology - AI4TrustBC 

Show full item record

Page view(s)

checked on May 9, 2024

Google ScholarTM




Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.