2016
DOI: 10.1155/2016/6804379
|View full text |Cite
|
Sign up to set email alerts
|

How Dangerous Are Your Smartphones? App Usage Recommendation with Privacy Preserving

Abstract: With the rapid proliferation of mobile devices, explosive mobile applications (apps) are developed in the past few years. However, the functions of mobile apps are varied and the designs of them are not well understood by end users, especially the activities and functions related to user privacy. Therefore, understanding how much danger of mobile apps with respect to privacy violation to mobile users is becomes a critical issue when people use mobile devices. In this paper, we evaluate the mobile app privacy v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…From the detection of bank robberies to the management of crowds in public spaces, the geolocation of individuals via social media and smart phones has become a routine part of police work (Ferguson 2017; Zhu et al . 2016). Social networking theory informs analysis of social media relationships in efforts to identify individuals at risk of becoming engaged in gang‐related crime, indicating that crime prevention strategies can also utilise online activity (Joh 2014).…”
Section: Offending Perpetrators and The Spatial Imaginarymentioning
confidence: 99%
“…From the detection of bank robberies to the management of crowds in public spaces, the geolocation of individuals via social media and smart phones has become a routine part of police work (Ferguson 2017; Zhu et al . 2016). Social networking theory informs analysis of social media relationships in efforts to identify individuals at risk of becoming engaged in gang‐related crime, indicating that crime prevention strategies can also utilise online activity (Joh 2014).…”
Section: Offending Perpetrators and The Spatial Imaginarymentioning
confidence: 99%
“…There are also several recommendation systems that take other factors into consideration. For example, Zhu et al [8] combine both the user preference to mobile Apps and the privacy risk of Apps and propose a mobile App usage recommendation method named AppURank to recommend the secure Apps for users. Ge et al [9] provide two costaware latent factor models to recommend travel packages by considering both the travel cost and the tourists interests and design a cPMF model that models the tourists cost with a 2-dimensional vector and a GcPMF model where the Gaussian prior is used to express the uncertainty of the travel cost.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, we use the data set which is introduced in our previous work [8] for analysis. In order to obtain such data, we designed a mobile App named AntTest (http://www.wandoujia.com/apps/edu.bupt.anttest) on Android platform.…”
Section: Data Setmentioning
confidence: 99%
“…Mobile devices have to face a number of issues due to the resource constraints (performance issue [1,2], e.g.) and also security issues (data leakage [3,4], privacy concern [5,6], etc.). In particular, the latter may be affected by the applications installed.…”
Section: Introductionmentioning
confidence: 99%