Review of Mobile Apps Permissions and Associated Intrusive Privacy Threats

04/17/2018
by   Akosua Boakyewaa Teye, et al.
0

The age of technology has created a huge market for smartphones and Apps usage and a new generation has been created based on knowledge sharing. Now knowledge has been made easily accessible by Apps but; are users even aware of the permissions that these Apps require and the privacy issues involved? The study was conducted on the basis of how users make use of Apps. It was conducted through the assessment of permissions required by various Apps through carefully selected third-party Apps and the devices settings and also a review of existing literature that has been conducted in fields within Apps and privacy. It will be unearthed that a many different but exhaustive lists of permission are sought by each App installed and the device it is installed on can quite give the user the information. Also not all permissions sought were found to be risky but some just created a path or a vulnerable point for other malicious programs to take advantage of.

READ FULL TEXT

page 3

page 4

research
10/11/2020

An Empirical Study on User Reviews Targeting Mobile Apps' Security Privacy

Application markets provide a communication channel between app develope...
research
11/27/2019

DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference

In this paper, we propose to identify compromised mobile devices from a ...
research
12/27/2022

A systematic literature review on the development and use of mobile learning (web) apps by early adopters

Surveys in mobile learning developed so far have analysed in a global wa...
research
10/10/2022

Systematic Evaluation and User Study of Privacy of Default Apps in Apple's Mobile Ecosystem

Users need to configure default apps when they first start using their d...
research
07/08/2020

Are PETs (Privacy Enhancing Technologies) Giving Protection for Smartphones? – A Case Study

With smartphone technologies enhanced way of interacting with the world ...
research
04/22/2023

Linguistic Dead-Ends and Alphabet Soup: Finding Dark Patterns in Japanese Apps

Dark patterns are deceptive and malicious properties of user interfaces ...

Please sign up or login with your details

Forgot password? Click here to reset