Proceedings of the 11th International Conference on Security of Information and Networks 2018
DOI: 10.1145/3264437.3264477
|View full text |Cite
|
Sign up to set email alerts
|

How Dangerous Permissions are Described in Android Apps' Privacy Policies?

Abstract: Google requires Android apps which handle users' personal data such as photos and contacts information to post a privacy policy which describes comprehensively how the app collects, uses and shares users' information. Unfortunately, while knowing why the app wants to access specific users' information is considered very useful, permissions screen in Android does not provide such pieces of information. Accordingly, users reported their concerns about apps requiring permissions that seem to be not related to the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The order of requested dangerous permissions is almost the same. Data transmission with external storage, get phone status information, access to the location and read contacts list are ordinary the most frequent dangerous permissions in these studies [12,13].…”
Section: Discussionmentioning
confidence: 99%
“…The order of requested dangerous permissions is almost the same. Data transmission with external storage, get phone status information, access to the location and read contacts list are ordinary the most frequent dangerous permissions in these studies [12,13].…”
Section: Discussionmentioning
confidence: 99%
“…e root source of code alteration and rebranding assaults is eliminated with this strategy. Another study is presented with documents the vocabulary used in Android app privacy policies to characterize the use of potentially harmful permissions [70]. e semi-automated approach uses NLP and IE approaches to link privacy policies' terminology to dangerous Android permissions.…”
Section: Analyzing the Existing State-of-the-art Research Work Based On Popular Librariesmentioning
confidence: 99%
“…This is captured by the "geolocation information" governor dependent pair. Furthermore, the study in Baalous and Poet (2018) showed how dangerous permissions are described in Android App's privacy policies. For example, their study showed that privacy policies often use the terms: "address book" and "device's phonebook" to describe that they are using the "Contacts" permissions.…”
Section: Sources Of App Textual Descriptionsmentioning
confidence: 99%