70 likes | 84 Views
This summary discusses the security risks posed by ads in mobile apps, including potential harm to devices and ethical considerations. Dr. Xuxian Jiang highlights the risk of 'root exploit' attacks through malicious ad libraries. The 8-step ethical decision-making process suggests solutions like avoiding ads, app makers choosing ads, or Google and Apple providing ad-isolation mechanisms. Solution 3 is recommended as the best ethical approach. This solution balances the interests of all parties involved and aligns with ACM Code guidelines to avoid harm, be honest, respect privacy, and honor confidentiality.
E N D
By: Lucas Clarkson Security of Ads in Mobile Apps
Summary • “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. XuxianJiang • Ads use GPS, call logs, phone numbers, list of apps. • App may be harmless, but “the app’s ad library may download harmful or invasive code after installation.”
8-step ethical decision-making process • The ethical issue is that these ad libraries might harm mobile devices. • The app user doesn’t want their mobile device harmed. The app maker doesn’t want to harm your mobile device. The ad maker wants to harm your mobile device. • Solution 1: No adsSolution 2: App makers choose adsSolution 3: Google & Apple provide ad-isolation mechanisms (best)
8-step ethical decision-making process (cont.) • Solution 3 is best for all ethical parties involved, and every ad should be looked at. • This solution would be effective and not farfetched. It is equally balanced between excessive and deficient. • The majority of the people involved would choose this solution.
8-step ethical decision-making process (cont.) 7. I feel most committed to this solution in my own conscience even though it does affect me. This choice was autonomous and without the influence of others. 8. This follows the Realist philosophy because this solution allows ads to be what they naturally are.
ACM Code Applied This ethical issue violates the following ACM Code guidelines: • (1.2) Avoid harm to others. • (1.3) Be honest and trustworthy. • (1.7) Respect the privacy of others. • (1.8) Honor confidentiality.
The End Thank You