Influencing User’s Behavior Concerning Android Privacy Policy: An Overview

Author:

Di Ming12ORCID,Nazir Shah3ORCID,Deng Fucheng2

Affiliation:

1. School of Journalism and Communication, Wuhan University, Wuhan 430072, China

2. School of Information Management, Wuhan University, Wuhan 430072, China

3. Department of Computer Science, University of Swabi, Swabi, K.P., Pakistan

Abstract

The wide-ranging implementation of Android applications used in various devices, from smartphones to intelligent television, has made it thought-provoking for developers. The permission granting mechanism is one of the defects imposed by the developers. Such assessing of defects does not allow the user to comprehend the implication of privacy for granting permission. Mobile applications are speedily easily reachable to typical users of mobile. Despite possible applications for improving the affordability, availability, and effectiveness of delivering various services, it handles sensitive data and information. Such data and information carry considerable security and privacy risks. Users are usually unaware of how the data can be managed and used. Reusable resources are available in the form of third-party libraries, which are broadly active in android apps. It provides a diversity of functions that deliver privacy and security concerns. Host applications and third-party libraries are run in the same process and share similar permissions. The current study has presented an overview of the existing approaches, methods, and tools used for influencing user behavior concerning android privacy policy. Various prominent libraries were searched, and their search results were analyzed briefly. The search results were presented in diverse perspectives for showing the details of the work done in the area. This will help researchers to offer new solutions in the area of the research.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Computer Science Applications

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator;2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2023-06

2. Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05

3. High level browser security in cloud computing services from cross site scripting attacks;Journal of Discrete Mathematical Sciences and Cryptography;2022-05-19

4. IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices;Journal of Discrete Mathematical Sciences and Cryptography;2022-05-19

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3