Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering 2015
DOI: 10.1145/2745802.2745819
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing confidentiality and privacy concerns

Abstract: Context: Post-release user feedback plays an integral role in improving software quality and informing new features. Given its growing importance, feedback concerning security enhancements is particularly noteworthy. In considering the rapid uptake of Android we have examined the scale and severity of Android security threats as reported by its stakeholders. Objective: We systematically mine Android issue logs to derive insights into stakeholder perceptions and experiences in relation to certain Android securi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 19 publications
1
3
0
Order By: Relevance
“…3), suggesting that some releases were more problematic than others. In fact, our earlier work also detected this pattern for issues logged overall and for security issues [21]. In contrast here, however, and as noted above, developers did not always respond to the most pressing issues.…”
Section: B Rq2 How Are End-users' Requests Addressed Overtime?supporting
confidence: 61%
See 1 more Smart Citation
“…3), suggesting that some releases were more problematic than others. In fact, our earlier work also detected this pattern for issues logged overall and for security issues [21]. In contrast here, however, and as noted above, developers did not always respond to the most pressing issues.…”
Section: B Rq2 How Are End-users' Requests Addressed Overtime?supporting
confidence: 61%
“…Given that device manufacturers have been shown to delay upgrading their hardware with recent Android OS releases [25], there is a possibility that some issues reported between specific releases were in fact related to earlier releases. However, this misalignment was not detected during our previous contextual analysis [21], suggesting that our approach appropriately classified issues.…”
Section: Threats To Validtymentioning
confidence: 76%
“…Although not visible in the sample, it should be emphasized that the reluctance was presumably also explained by business and related factors. This presumption is backed by observations that security issues can have a negative impact upon quality perceptions (Licorish et al, 2015), and even affect firms' stock prices (Spanos and Angelis, 2016). The following key result points out more practical problems:…”
Section: Key Resultsmentioning
confidence: 99%
“…One extremely large and successful community that has received considerable text mining attention is that of the Android OS. Studies have examined where bugs are most prevalent in the Android architecture [14], the quality of various types of bug reports [15], top user concerns and the attention they receive from the Android community [6], and the scale and severity of Android security threats as reported by its stakeholders [16]. With Android devices now leading mobile device sales [17], it is fitting that the text mining community would look to understand this platform and provide improvement advice.…”
Section: Introductionmentioning
confidence: 99%