Howdo Smartphones Leak Users’ Privacy?
Abstract
Keywords
Full Text:
PDFReferences
[1] Popal, Nabila. “IDC - Smartphone Market Share - OS.” IDC: The Premier Global Market Intelligence Company, 28 Oct. 2021, www.idc.com/promo/smartphone-market-share.
[2] Elish, K. O., Yao, D., & Ryder, B. G. (2015). On the need of precise inter-app ICC classification for detecting android malware collusions. Paper presented at the Proceedings of IEEE Mobile Security Technologies (MoST), in Conjunction with the IEEE Symposium on Security and Privacy,
[3] Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B., Cox, L. P., . . . Sheth, A. N. (2014).Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 1-29.
[4] AG, G. DATA CyberDefense. “Guidebook.” Www.gdatasoftware.com, 11 Feb. 2022, www.gdatasoftware.com/securitylabs/statistics. Accessed 11 Apr. 2022.
[5] Di, M., Nazir, S., & Deng, F. (2021). Influencing user’s behavior concerning android privacy policy: An overview. Mobile Information Systems, 2021, 1-19. doi:10.1155/2021/3452700
[6] Alzaidi, A., Alshehri, S., & Buhari, S. M. (2019). DroidRista: A highly precise static data flow analysis framework for android applications. International Journal of Information Security, 19(5), 523-536. doi:10.1007/s10207-019-00471-w
[7] Cha, Y., & Pak, W. (2018). Protecting contacts against privacy leaks in smartphones. PloS One; PLoS One, 13(7), e0191502. doi:10.1371/journal.pone.0191502
[8] Eze, C., Nurse, J. R. C., & Happa, J. (2016). Using visualizations to enhance users’ understanding of app activities on android devices. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 7(1), 39-57.
[9] Furini, M., Mirri, S., Montangero, M., & Prandi, C. (2020). Privacy perception when using smartphone applications.Mobile Networks and Applications, 25(3), 1055-1061. doi:10.1007/s11036-020-01529-z
[10] Bhandari, S., Jaballah, W. B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M. S., Mosbah, M., & Conti, M. (2017). Android inter-app communication threats and detection techniques. Computers & Security, 70, 392-421. doi:10.1016/j.cose.2017.07.002
[11] Yao, J., & Cao, X. (2017). The balancing mechanism of social networking overuse and rational usage. Computers in Human Behavior, 75, 415-422. doi:https://doi.org/10.1016/j.chb.2017.04.055
[12] Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26(3), 406-418. doi:https://doi.org/10.1016/j.chb.2009.11.012
[13] Bal, G., Rannenberg, K., & Hong, J. I. (2015a). Styx: Privacy risk communication for the Android smartphone platform based on apps’ data-access behavior patterns. Computers & Security, 53, 187–202. https://doi.org/10.1016/j.cose.2015.04.004
[14] Gao, W., Liu, Z., Guo, Q., & Li, X. (2018). The dark side of ubiquitous connectivity in smartphone-based SNS: An integrated model from information perspective. Computers in Human Behavior, 84, 185-193. doi:10.1016/j.chb.2018.02.023
DOI: http://dx.doi.org/10.18686/ahe.v9i6.14319
Refbacks
- There are currently no refbacks.





