Direkt zur zweiten Navigationsebene, fallls vorhanden.Direkt zum Seiteninhalt
www.m-chair.de | twitter@mchair | Imprint | Privacy Policy | Sitemap
Logo - Johann Wolfgang Goethe University Frankfurt
Deutsche Telekom Chair of Mobile Business & Multilateral SecurityDeutsche TelekomDeutsche Telekom Chair of Mobile Business & Multilateral Security

Seminar: User Privacy in New Technologies

Basic Information

Type of Lecture:
Credit Points:
Summer 2020
Content of the Course

Please note: The kick-off session has been moved to 4 May 2020, 10am-6pm due to new requirements by the examination office. We will start at 10:15am. It will be held online, login credentials have been sent to the students via mail. 


Smartphone apps provide utility to their users by providing personalized and context-sensitive services. To achieve this, smartphone platforms provide those apps with access to a multiplicity of sensitive resources on the device e.g., device information, geolocation data, and user behavior information obtained from sensors. This capability however, poses important risks in regard to user privacy, especially considering that apps do not provide an appropriate level of transparency related to sensitive-information processing.


The objective of this seminar is to perform an extensive analysis of the state of the art in which privacy threats and the implementation of counter-measures will be analysed.



In order to successfully pass this module, you need to write a paper (60%) and make a presentation (40%). Each partial requirement needs to be passed with a grade of 4.0 or better.

Topics are in the area of:

  1. Privacy threats in the Smartphone Ecosystem
  2. Privacy enhancing technologies (PETs) in the Smartphone Ecosystem
  3. Transparency enhancing technologies (TETs) in the Smartphone Ecosystem
  4. Educational measures on privacy in the Smartphone Ecosystem
  5. User perceptions on privacy and privacy supporting technologies
  6. Privacy in infection control smartphone apps

Specific topics will be provided during the kick-off session before the registration. The methodologies will be presented and discussed in the group before the allocation of the topics.

Students are still required to work through the methodology of their topic carefully.


Learning Goals

  • Basic understanding of privacy threats and privacy enhancing technologies in the Smartphone Ecosystem (LGBWL-1)
  • Basic understanding of user perceptions of privacy (LGBWL-1)
  • Basic understanding of user privacy in infection control apps (LGBWL-1)
  • Communication of the obtained results in a clear and comprehensible manner (LGBWL-4)
  • Critical discussion of all results in the group (LGBWL-4)



 Kick-Off Slides
  1. P. Murmann and S. Fischer-Hübner. Tools for Achieving Usable Ex Post Transparency: A Survey.  IEEE Access, Vol. 5, 2017, Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8078167.
  2. J. P. Janic, P. Wijbenga, and T. Veugen, ‘‘Transparency enhancing tools(TETs): An overview,’’ in Proc. 3rd Workshop Socio-Tech. Aspects Secur. Trust, Jun. 2013, pp. 18–25
  3. H. Hedbom, ‘‘A survey on transparency tools for enhancing privacy,’’in The Future of Identity in the Information Society, Berlin, Germany: Springer, 2009, pp. 67–82, Available: http://opendl.ifip-tc6.org/db/conf/ifip9-6/fidis2008/Hedbom08.pdf.
  4. S. Patrick and S. Kenny, ‘‘From privacy legislation to interface design: Implementing information privacy in human-computer interactions,’’ in Proc. Int. Workshop Privacy Enhancing Technol., 2003, pp. 107–124, Available: https://andrewpatrick.ca/legint/pet-workshop-patrick-kenny.pdf.
  5. P. Murmann and S. Fischer-Hübner, ‘‘Usable transparency enhancing tools: A literature review,’’ Dept. Math. Comput. Sci., Karlstad Univ., Karlstad, Sweden, Tech. Rep., Jul. 2017, Available: https://www.diva-portal.org/smash/get/diva2:1119515/FULLTEXT02.pdf.
  6. F. Karegar, T. Pulls, and S. Fischer-Hübner, ‘‘Visualizing exports of personal data by exercising the right of data portability in the data track — Are people ready for this?’’ in Privacy and Identity Management. Facing up to Next Steps. Springer, 2016, pp. 164–18, Available: http://www.diva-portal.org/smash/get/diva2:1149533/FULLTEXT01.pdf.