2020
DOI: 10.1007/978-3-030-62974-8_13
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Estimating Privacy Risk Scores of Mobile Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…In formula (12), f max (C i ) is the maximum trust risk frequency level of indicator C i , f upper (C i ) is the maximum risk frequency level of indicator C i , f lower (C i ) is the minimum risk frequency level of indicator C i . l max (C i ) is the maximum trust risk loss level of indicator C i , l upper (C i ) is the maximum risk loss level of indicator C i , and l lower (C i ) is the minimum risk loss level of indicator C i .…”
Section: Representation Of the Assessment Results Based On Fuzzymentioning
confidence: 99%
See 1 more Smart Citation
“…In formula (12), f max (C i ) is the maximum trust risk frequency level of indicator C i , f upper (C i ) is the maximum risk frequency level of indicator C i , f lower (C i ) is the minimum risk frequency level of indicator C i . l max (C i ) is the maximum trust risk loss level of indicator C i , l upper (C i ) is the maximum risk loss level of indicator C i , and l lower (C i ) is the minimum risk loss level of indicator C i .…”
Section: Representation Of the Assessment Results Based On Fuzzymentioning
confidence: 99%
“…Dehling et al [11] assessed the "medical" and "health and fitness" applications on IOS and Android and evaluated the impact on information security and privacy according to the potential damage of information leakage, the potential damage of information loss, and the potential value of information to third parties. Chang et al [12] realized the effective assessment of mobile applications privacy risk by setting a special data set. Belani et al [13,14] analyzed the "intention" of mobile applications and its impact on user privacy and proposed effective verification methods to help users reasonably select and install secure applications.…”
Section: Related Researchmentioning
confidence: 99%
“…Through SNA, organizations can assess the degree of compliance with internal security policies and regulations. Additionally, by gauging information security awareness levels, organizations can make informed decisions to strengthen or adapt their security policies [9]. These methods empower organizations to enhance and manage security in a more natural and effective manner.…”
Section: Social Network Analysismentioning
confidence: 99%
“…Examples of collected attributes to calculate personal information leakage risk in literature reviews[1,9,10] …”
mentioning
confidence: 99%
“…They tested their proposed method for the advertisement domain. A risk score generation approach for android apps based on their permissions and risky privacy policies is discussed in Chang et al (2020). A comprehensive survey on privacy issues related to data collection in mobile recommendation is discussed in Sandhu et al (2019).…”
Section: Threats To Validity (Ttv)mentioning
confidence: 99%