SlideShare a Scribd company logo
1 of 3
Download to read offline
Min-Hyeok Lee. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.71-73
www.ijera.com DOI: 10.9790/9622- 0702057173 71 | P a g e
A Study on the Analysis of the Child Personal Information
Processing Status in Mobile Apps : Focused on mobile apps
served in Korea
Min-Hyeok Lee, Ji-Yeon Yoo
(Department of Information and Security Management Sangmyung University, Republic of Korea)
ABSTRACT
This study aims to empirically examine the reality that a child's personal information can be easily exposed
through an app service. As a result of surveying 100 child-targeted apps in the Apple and Google Play App
Stores, we collected on average 12 personal information of individuals that included social security numbers and
location information that were not collected and clarified for the purpose of collection.
Keywords - Child Personal Information, Mobile Apps, Korea's Act on Promotion of Information and
Communications Network Utilization and Information Protection, etc(APICNUIP)
I. INTRODUCTION
As digital society progresses, various online
activities are performed and at the same time,
utilization and exposure of personal information is
increasing. Especially, as the usage of smartphone
apps is becoming more prevalent, the terms required
for downloading the apps require excessive personal
information that are not related to the function of the
app such as contacts, call history, mobile device
information--wherein installation of the apps
commences only when you agree to the terms [1].
Children are required to provide a variety of
personal information about themselves, as much as
adults, by actively engaging in online activities.
Children have been treated as vulnerable
subjects to be specifically protected by law and
policy due to their lack of analytical skills and
judgment [2]. The criteria for children dictates the
age of under 14 years old in Korea's Act on
Promotion of Information and Communications
Network Utilization and Information Protection,
etc(APICNUIP), but the reason for this is unclear.
The criminal underage regulation (Criminal Law
Article 9) of the United States, Japan, and Korea is
set at under 14 years old at that time, and it is
explained that it is applied, but not confirmed.
Children are immature in their ability to judge
and evaluate the authenticity of information
compared to adults--they are treated indiscriminately
without any judgment on the collection, use, or
provision of personal information. Children view the
Internet as a place of play and socialization, but
much of the Internet is related to commercial
activities and allows children to be exposed to a
variety of information [2] [3]. However, children
generally do not understand the consequences of
disclosing personal information [3]. The information
of these exposed children is likely to be used for a
lifetime of exposure and subjects them to an unsafe
environment.
For example, in an app marketplace, when you
enter an obscene search term that is considered taboo
on the Internet, thousands of apps are searched and
you can download them at any time, regardless of
age. Only one out of ten apps are certified by an
adult, for example, an app called "energetic
measurement" appears to be at least four years of
age [4].
The purpose of this study is to grasp the status
of collecting personal information and confirming a
legal representative's consent in order to identify the
risk of personal information gathering in mobile
apps for children.
II. ANALYSIS OF PERSONAL INFORMATION
COLLECTION STATUS IN MOBILE APPS FOR
CHILDREN
2.1 Survey Outline
A survey to analyze the status of personal
information gathering in mobile apps for children-
targeted apps that are child-grade within the game
categories of Apple Appstore and Google Play Store.
There were monthly utilization rankings for each
app market by analyzing 100 apps from May 5th to
10th, 2014 for six days, excluding 1 ~ 70th ranked
apps. The reasons for selecting the apps to be
surveyed are as follows: "Game/entertainment
(77.5%)" was the main application category of
children's ages [5] App selection was easy.
The items to be surveyed are the personal
information items to be collected, the purpose of
collecting personal information, and the agreement
of the legal representative.
RESEARCH ARTICLE OPEN ACCESS
Min-Hyeok Lee. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.71-73
www.ijera.com DOI: 10.9790/9622- 0702057173 72 | P a g e
2.2 Survey Analysis and Results
The survey analysis is as follows. It is the first
personal information item collected from the child
and the items of personal information collected
based on the principle of restriction of collection of
personal information specified in Article 23 of the
Act on Promotion of Information and
Communication Network Utilization and
Information Protection (hereinafter referred to as the
"Information and Communication Network Act").
Second, it is the collection of a resident registration
number when the child collects personal
information. This is based on the restriction of use of
the resident registration number 2 of Article 23 of
the Act on Promotion of Information and
Communications Network Utilization and
Information Protection, etc(APICNUIP). Third, we
examined the process of confirming the consent of
the legal representative required for the provision of
personal information of the child and the related
process. According to Article 31 of the Information
and Communication Network Act, the consent of the
legal representative is required to collect the child's
personal information. We investigated how the
personal information of statutory agents collected at
this time is handled [6].
In order to systematically organize survey
analysis, personal information collection items in
mobile apps are adjusted and arranged based on the
user information classification standard used in the
smartphone presented in the Privacy Initiative of
Japan’s Ministry of Internal Affairs and
Communications [7].
First of all, the most important categories are
"user identification," "third party information,"
"communication service usage related items." The
"user identification" item is divided into
"identification information," "information required
for login" "information generated using cookie
technology," and "contractor unique ID." "Third
party information" was defined as "information of a
legal representative." In addition, "Information
related to the use of communication service" is
divided into "Paid service utilization information,"
"Social information," and "Location information."
Table 1 shows the results of analyzing children's
mobile apps collecting personal information items
according to the classification criteria.
Table 1. An analysis of collection items of personal
information for mobile applications for children
Division
Type of
information
Information
included
Applicable
number
Ratio
(%)
User
identification
Identification
information
Name 61 68%
Gender 35 39%
Date of birth 26 29%
Division
Type of
information
Information
included
Applicable
number
Ratio
(%)
Phone number 46 51%
Mobile phone
number
50 56%
E-mail 71 79%
Zip code 8 9%
Address 57 63%
Social security
numbers
(Korea’s
resident
registration
number)
19 21%
Information
required to log
in ID
ID 41 46%
Password 25 28%
Nickname 39 43%
Information
generated
using cookie
technology
Cookie 27 30%
Visit date and
time
9 10%
Access log 48 53%
Service usage
history
51 57%
Bad record 14 16%
Contractor
unique ID
Terminal
information
68 76%
IP address 40 44%
IEMI (Device
ID)
18 20%
Third party
information
Legal
Representative
Information
Legal
Representative
Information
48 53%
Information
related to use
of
communication
service
Paid service
usage
information
Card mission 39 43%
Card number 39 43%
Name of bank 5 6%
Account
number
5 6%
Account
holder
5 6%
Payment
record
49 54%
Social
information
SNS
information
30 33%
Location
information
GPS location
information
30 33%
Base station
location
information
4 4%
About WIFI-
AP
4 4%
Min-Hyeok Lee. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.71-73
www.ijera.com DOI: 10.9790/9622- 0702057173 73 | P a g e
As a result, the average amount of personal
information collected by mobile apps for children
was 12.2, and some apps collected up to 24 items.
When looking at the personal information items
to be collected, e-mail (79%) was the most common,
and information on the handset (76%), name (68%),
address (63% ), access logs (53%), and telephone
numbers (51%). Most of the purpose of collecting
these personal information is not clearly shown.
Other identification information, social information,
location information, and the like were collected.
In the case of the mobile game app, "login
information" and "information generated by using
cookie technology," which are generated during the
service use, however, in the case of a mobile app to
be surveyed, it is defined as "ID," "representative
nickname," "password," "phone number (or one of
mobile phone number)," "e-mail."
In particular, 21% of apps collecting resident
registration numbers are restricted from collection
and use.
Only 48% of the apps that confirm and deal
with the legal representative's consent were found
and companies that did not specify the process of
personal information processing of a legal
representative were also found.
III. CONCLUSION
This study investigates personal information
items collected by mobile apps for children. The
purpose of this study is to clarify whether the
purpose of collecting personal information is clear
and to check whether the consent of the legal
representative is confirmed.
As a result of the analysis, more personal
information items were collected than necessary and
the purpose of collection was not revealed. In
particular, it appears that there is a mobile app that
collects the child's social security number without
clearly identifying the purpose of the collection.
Also, it has been found that the procedure of
confirming consent of the legal representative is not
performed properly.
Personal information of a child whose judgment
is inexperienced should be protected socially until
the child becomes an adult who can self-judge,
expose, and provide his/her personal information
under mature circumstances. Although the
institutional apparatus for this is provided as the
right of the legal representative in the Article 31 of
the Act on Promotion of Information and
Communications Network Utilization and
Information Protection, etc(APICNUIP), a reality
check on the confirmation of the legal
representative's consent must be made and the way
of limiting the personal information of the child that
can be collected through the legal representative
does exactly this. In addition, it is necessary to
discuss in detail the "right to be forgotten" regarding
a child's personal information.
There are two major drawbacks to this study.
First, it was only a survey of personal information.
In addition to collection, the use of personal
information according to purpose and the empirical
analysis related to this were not done. For this
reason, I would like to carry out this study by
continuing to make an empirical analysis and an
analysis on the parent of the child, as well as to
investigate the risks and related cases of collecting
personal information of children.
REFERENCES
[1] Seoul Economic, [Inside the Issues] Requires a
one-sided consent on the use of personal
information... privacy concerns, Jan 13, 2013.
[2] FTC, Staff report: public workshop on
consumer privacy on the global information
infrastructure, 1996.
[3] Office of the Ombudsman, There ought to be a
law: protecting children’s online privacy in the
21st century, A Discussion paper for Canadians
by the Working Group of Canadian Privacy
Commissioners and Child and Youth
Advocates, 2009.
[4] JoongAng Ilbo, Elementary school students see
the AO(Adults Only) application... shock, Oct
17, 2012.
[5] Korea Internet & Security Agenc, Survey on
the mobile internet usage in the 2013, 2013.
[6] Korea Communication Commission, Act on
Promotion of Information and Communications
Network Utilization and Information
Protection, etc(APICNUIP), 1986.
[7] Japan ’ s Ministry of Internal Affairs and
Communications, Smartphone privacy
initiative, 2012.

More Related Content

What's hot

E-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in NigeriaE-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in Nigeriainventionjournals
 
P37117124
P37117124P37117124
P37117124aijbm
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 
Consumer awareness and usage of e
Consumer awareness and usage of eConsumer awareness and usage of e
Consumer awareness and usage of eajeccleton
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMIAEME Publication
 
Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...
Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...
Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...IJRTEMJOURNAL
 
Phishing: A Field Experiment
Phishing: A Field ExperimentPhishing: A Field Experiment
Phishing: A Field ExperimentCSCJournals
 
Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...
Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...
Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...DikeIbegbulemLLMNig
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...AIRCC Publishing Corporation
 
An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...Alexander Decker
 
Consumer acceptance of online banking an extension of the technology accepta...
Consumer acceptance of online banking  an extension of the technology accepta...Consumer acceptance of online banking  an extension of the technology accepta...
Consumer acceptance of online banking an extension of the technology accepta...OUM SAOKOSAL
 

What's hot (13)

E-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in NigeriaE-Voting and Credible Elections in Nigeria
E-Voting and Credible Elections in Nigeria
 
P37117124
P37117124P37117124
P37117124
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
Consumer awareness and usage of e
Consumer awareness and usage of eConsumer awareness and usage of e
Consumer awareness and usage of e
 
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEMA DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
A DECISION-MAKING MODEL FOR REINFORCING A CORPORATE INFORMATION SECURITY SYSTEM
 
Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...
Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...
Impacts of Perceived Risks on Internet Purchasing Intention: In case of Mongo...
 
Phishing: A Field Experiment
Phishing: A Field ExperimentPhishing: A Field Experiment
Phishing: A Field Experiment
 
Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...
 
Jiwon disc
Jiwon discJiwon disc
Jiwon disc
 
Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...
Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...
Appraising Nigeria’s new Federal Competition and Consumer Protection Act thro...
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...
 
An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...
 
Consumer acceptance of online banking an extension of the technology accepta...
Consumer acceptance of online banking  an extension of the technology accepta...Consumer acceptance of online banking  an extension of the technology accepta...
Consumer acceptance of online banking an extension of the technology accepta...
 

Viewers also liked

Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...IJERA Editor
 
Role of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic PrecedentsRole of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic PrecedentsIJERA Editor
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemIJERA Editor
 
Electrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferritesElectrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferritesIJERA Editor
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Post Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound BreakwaterPost Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound BreakwaterIJERA Editor
 
Preparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferritesPreparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferritesIJERA Editor
 
On Simple Ternary 횪-Semiring
On Simple Ternary 횪-SemiringOn Simple Ternary 횪-Semiring
On Simple Ternary 횪-SemiringIJERA Editor
 
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...IJERA Editor
 
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...IJERA Editor
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingIJERA Editor
 
Solvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value ProblemSolvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value ProblemIJERA Editor
 
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...IJERA Editor
 
Employee on Boarding Process Automation
Employee on Boarding Process Automation Employee on Boarding Process Automation
Employee on Boarding Process Automation IJERA Editor
 
A Modular Instant Messaging System
A Modular Instant Messaging SystemA Modular Instant Messaging System
A Modular Instant Messaging SystemIJERA Editor
 
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...IJERA Editor
 
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...IJERA Editor
 
A 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference CircuitA 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference CircuitIJERA Editor
 
Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – FerritesSynthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – FerritesIJERA Editor
 
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...IJERA Editor
 

Viewers also liked (20)

Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
Numerical Investigation of Turbulent Flow over a Rotating Circular Cylinder u...
 
Role of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic PrecedentsRole of Additives in Mortars: Historic Precedents
Role of Additives in Mortars: Historic Precedents
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher System
 
Electrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferritesElectrical properties of Ni0.4Mg0.6Fe2O4 ferrites
Electrical properties of Ni0.4Mg0.6Fe2O4 ferrites
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Post Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound BreakwaterPost Earthquack Slope Stability Analysis of Rubble Mound Breakwater
Post Earthquack Slope Stability Analysis of Rubble Mound Breakwater
 
Preparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferritesPreparation and characterization of Al doped nano crystalline Ni ferrites
Preparation and characterization of Al doped nano crystalline Ni ferrites
 
On Simple Ternary 횪-Semiring
On Simple Ternary 횪-SemiringOn Simple Ternary 횪-Semiring
On Simple Ternary 횪-Semiring
 
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
Experimental Evaluation of Metal Composite Multi Bolt Radial Joint on Laminat...
 
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
Technology and Key Strategy of IE4 Permanent Magnet Brushless DC Motor Drive ...
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud ComputingSecured Authorized Data Using Hybrid Encryption in Cloud Computing
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
 
Solvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value ProblemSolvability of a Four Point Nonlinear Boundary Value Problem
Solvability of a Four Point Nonlinear Boundary Value Problem
 
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: S...
 
Employee on Boarding Process Automation
Employee on Boarding Process Automation Employee on Boarding Process Automation
Employee on Boarding Process Automation
 
A Modular Instant Messaging System
A Modular Instant Messaging SystemA Modular Instant Messaging System
A Modular Instant Messaging System
 
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
Abhijeetsinh v Makwana1 , Dhruv patel2 , Darshan patel3 ,Henil patel4 , Akhil...
 
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
Multi Response Optimization of Friction Stir Lap Welding Process Parameters U...
 
A 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference CircuitA 0.6-V 2-nA CMOS Current Reference Circuit
A 0.6-V 2-nA CMOS Current Reference Circuit
 
Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – FerritesSynthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites
 
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
Numerical Modelling of Waterlogging Problem in New Urbanized Communities in A...
 

Similar to A Study on the Analysis of the Child Personal Information Processing Status in Mobile Apps : Focused on mobile apps served in Korea

Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016) Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016) ICT Watch
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfDaviesParker
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET Journal
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...Hamed Raza
 
IRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET Journal
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
 
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanConsumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanIOSRJBM
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
 
A Study Of Mobile Application Preferences Of Youth And Future Scope
A Study Of Mobile Application Preferences Of Youth And Future ScopeA Study Of Mobile Application Preferences Of Youth And Future Scope
A Study Of Mobile Application Preferences Of Youth And Future ScopeDaniel Wachtel
 

Similar to A Study on the Analysis of the Child Personal Information Processing Status in Mobile Apps : Focused on mobile apps served in Korea (20)

Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016) Indonesia Netizen Facts (October - December 2016)
Indonesia Netizen Facts (October - December 2016)
 
A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...A priest’s phone location data outed his private life. It could happen to any...
A priest’s phone location data outed his private life. It could happen to any...
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Report_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdfReport_PrivacyAmongChildren.pdf
Report_PrivacyAmongChildren.pdf
 
Mobile apps for kids
Mobile apps for kidsMobile apps for kids
Mobile apps for kids
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
Appling tracking game system to measure user behavior toward cybersecurity p...
Appling tracking game system to measure user behavior toward  cybersecurity p...Appling tracking game system to measure user behavior toward  cybersecurity p...
Appling tracking game system to measure user behavior toward cybersecurity p...
 
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
 
presentation
presentationpresentation
presentation
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
 
IRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET- Review on Cyber Security Situational Awareness among Parents
IRJET- Review on Cyber Security Situational Awareness among Parents
 
Analysis of Financial Behavior on Peer To Peer Lending Application in Measuri...
Analysis of Financial Behavior on Peer To Peer Lending Application in Measuri...Analysis of Financial Behavior on Peer To Peer Lending Application in Measuri...
Analysis of Financial Behavior on Peer To Peer Lending Application in Measuri...
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive Analysis
 
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanConsumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
A Study Of Mobile Application Preferences Of Youth And Future Scope
A Study Of Mobile Application Preferences Of Youth And Future ScopeA Study Of Mobile Application Preferences Of Youth And Future Scope
A Study Of Mobile Application Preferences Of Youth And Future Scope
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

A Study on the Analysis of the Child Personal Information Processing Status in Mobile Apps : Focused on mobile apps served in Korea

  • 1. Min-Hyeok Lee. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.71-73 www.ijera.com DOI: 10.9790/9622- 0702057173 71 | P a g e A Study on the Analysis of the Child Personal Information Processing Status in Mobile Apps : Focused on mobile apps served in Korea Min-Hyeok Lee, Ji-Yeon Yoo (Department of Information and Security Management Sangmyung University, Republic of Korea) ABSTRACT This study aims to empirically examine the reality that a child's personal information can be easily exposed through an app service. As a result of surveying 100 child-targeted apps in the Apple and Google Play App Stores, we collected on average 12 personal information of individuals that included social security numbers and location information that were not collected and clarified for the purpose of collection. Keywords - Child Personal Information, Mobile Apps, Korea's Act on Promotion of Information and Communications Network Utilization and Information Protection, etc(APICNUIP) I. INTRODUCTION As digital society progresses, various online activities are performed and at the same time, utilization and exposure of personal information is increasing. Especially, as the usage of smartphone apps is becoming more prevalent, the terms required for downloading the apps require excessive personal information that are not related to the function of the app such as contacts, call history, mobile device information--wherein installation of the apps commences only when you agree to the terms [1]. Children are required to provide a variety of personal information about themselves, as much as adults, by actively engaging in online activities. Children have been treated as vulnerable subjects to be specifically protected by law and policy due to their lack of analytical skills and judgment [2]. The criteria for children dictates the age of under 14 years old in Korea's Act on Promotion of Information and Communications Network Utilization and Information Protection, etc(APICNUIP), but the reason for this is unclear. The criminal underage regulation (Criminal Law Article 9) of the United States, Japan, and Korea is set at under 14 years old at that time, and it is explained that it is applied, but not confirmed. Children are immature in their ability to judge and evaluate the authenticity of information compared to adults--they are treated indiscriminately without any judgment on the collection, use, or provision of personal information. Children view the Internet as a place of play and socialization, but much of the Internet is related to commercial activities and allows children to be exposed to a variety of information [2] [3]. However, children generally do not understand the consequences of disclosing personal information [3]. The information of these exposed children is likely to be used for a lifetime of exposure and subjects them to an unsafe environment. For example, in an app marketplace, when you enter an obscene search term that is considered taboo on the Internet, thousands of apps are searched and you can download them at any time, regardless of age. Only one out of ten apps are certified by an adult, for example, an app called "energetic measurement" appears to be at least four years of age [4]. The purpose of this study is to grasp the status of collecting personal information and confirming a legal representative's consent in order to identify the risk of personal information gathering in mobile apps for children. II. ANALYSIS OF PERSONAL INFORMATION COLLECTION STATUS IN MOBILE APPS FOR CHILDREN 2.1 Survey Outline A survey to analyze the status of personal information gathering in mobile apps for children- targeted apps that are child-grade within the game categories of Apple Appstore and Google Play Store. There were monthly utilization rankings for each app market by analyzing 100 apps from May 5th to 10th, 2014 for six days, excluding 1 ~ 70th ranked apps. The reasons for selecting the apps to be surveyed are as follows: "Game/entertainment (77.5%)" was the main application category of children's ages [5] App selection was easy. The items to be surveyed are the personal information items to be collected, the purpose of collecting personal information, and the agreement of the legal representative. RESEARCH ARTICLE OPEN ACCESS
  • 2. Min-Hyeok Lee. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.71-73 www.ijera.com DOI: 10.9790/9622- 0702057173 72 | P a g e 2.2 Survey Analysis and Results The survey analysis is as follows. It is the first personal information item collected from the child and the items of personal information collected based on the principle of restriction of collection of personal information specified in Article 23 of the Act on Promotion of Information and Communication Network Utilization and Information Protection (hereinafter referred to as the "Information and Communication Network Act"). Second, it is the collection of a resident registration number when the child collects personal information. This is based on the restriction of use of the resident registration number 2 of Article 23 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc(APICNUIP). Third, we examined the process of confirming the consent of the legal representative required for the provision of personal information of the child and the related process. According to Article 31 of the Information and Communication Network Act, the consent of the legal representative is required to collect the child's personal information. We investigated how the personal information of statutory agents collected at this time is handled [6]. In order to systematically organize survey analysis, personal information collection items in mobile apps are adjusted and arranged based on the user information classification standard used in the smartphone presented in the Privacy Initiative of Japan’s Ministry of Internal Affairs and Communications [7]. First of all, the most important categories are "user identification," "third party information," "communication service usage related items." The "user identification" item is divided into "identification information," "information required for login" "information generated using cookie technology," and "contractor unique ID." "Third party information" was defined as "information of a legal representative." In addition, "Information related to the use of communication service" is divided into "Paid service utilization information," "Social information," and "Location information." Table 1 shows the results of analyzing children's mobile apps collecting personal information items according to the classification criteria. Table 1. An analysis of collection items of personal information for mobile applications for children Division Type of information Information included Applicable number Ratio (%) User identification Identification information Name 61 68% Gender 35 39% Date of birth 26 29% Division Type of information Information included Applicable number Ratio (%) Phone number 46 51% Mobile phone number 50 56% E-mail 71 79% Zip code 8 9% Address 57 63% Social security numbers (Korea’s resident registration number) 19 21% Information required to log in ID ID 41 46% Password 25 28% Nickname 39 43% Information generated using cookie technology Cookie 27 30% Visit date and time 9 10% Access log 48 53% Service usage history 51 57% Bad record 14 16% Contractor unique ID Terminal information 68 76% IP address 40 44% IEMI (Device ID) 18 20% Third party information Legal Representative Information Legal Representative Information 48 53% Information related to use of communication service Paid service usage information Card mission 39 43% Card number 39 43% Name of bank 5 6% Account number 5 6% Account holder 5 6% Payment record 49 54% Social information SNS information 30 33% Location information GPS location information 30 33% Base station location information 4 4% About WIFI- AP 4 4%
  • 3. Min-Hyeok Lee. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 2, ( Part -5) February 2017, pp.71-73 www.ijera.com DOI: 10.9790/9622- 0702057173 73 | P a g e As a result, the average amount of personal information collected by mobile apps for children was 12.2, and some apps collected up to 24 items. When looking at the personal information items to be collected, e-mail (79%) was the most common, and information on the handset (76%), name (68%), address (63% ), access logs (53%), and telephone numbers (51%). Most of the purpose of collecting these personal information is not clearly shown. Other identification information, social information, location information, and the like were collected. In the case of the mobile game app, "login information" and "information generated by using cookie technology," which are generated during the service use, however, in the case of a mobile app to be surveyed, it is defined as "ID," "representative nickname," "password," "phone number (or one of mobile phone number)," "e-mail." In particular, 21% of apps collecting resident registration numbers are restricted from collection and use. Only 48% of the apps that confirm and deal with the legal representative's consent were found and companies that did not specify the process of personal information processing of a legal representative were also found. III. CONCLUSION This study investigates personal information items collected by mobile apps for children. The purpose of this study is to clarify whether the purpose of collecting personal information is clear and to check whether the consent of the legal representative is confirmed. As a result of the analysis, more personal information items were collected than necessary and the purpose of collection was not revealed. In particular, it appears that there is a mobile app that collects the child's social security number without clearly identifying the purpose of the collection. Also, it has been found that the procedure of confirming consent of the legal representative is not performed properly. Personal information of a child whose judgment is inexperienced should be protected socially until the child becomes an adult who can self-judge, expose, and provide his/her personal information under mature circumstances. Although the institutional apparatus for this is provided as the right of the legal representative in the Article 31 of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc(APICNUIP), a reality check on the confirmation of the legal representative's consent must be made and the way of limiting the personal information of the child that can be collected through the legal representative does exactly this. In addition, it is necessary to discuss in detail the "right to be forgotten" regarding a child's personal information. There are two major drawbacks to this study. First, it was only a survey of personal information. In addition to collection, the use of personal information according to purpose and the empirical analysis related to this were not done. For this reason, I would like to carry out this study by continuing to make an empirical analysis and an analysis on the parent of the child, as well as to investigate the risks and related cases of collecting personal information of children. REFERENCES [1] Seoul Economic, [Inside the Issues] Requires a one-sided consent on the use of personal information... privacy concerns, Jan 13, 2013. [2] FTC, Staff report: public workshop on consumer privacy on the global information infrastructure, 1996. [3] Office of the Ombudsman, There ought to be a law: protecting children’s online privacy in the 21st century, A Discussion paper for Canadians by the Working Group of Canadian Privacy Commissioners and Child and Youth Advocates, 2009. [4] JoongAng Ilbo, Elementary school students see the AO(Adults Only) application... shock, Oct 17, 2012. [5] Korea Internet & Security Agenc, Survey on the mobile internet usage in the 2013, 2013. [6] Korea Communication Commission, Act on Promotion of Information and Communications Network Utilization and Information Protection, etc(APICNUIP), 1986. [7] Japan ’ s Ministry of Internal Affairs and Communications, Smartphone privacy initiative, 2012.