2020
DOI: 10.1007/978-3-030-50309-3_35
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Apps for Smartphones: An Assessment of Users’ Preferences and Limitations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…user interface (UI) design(Alqahtani and Orji 2019;Sharma and Bashir 2020;Franzmann et al 2020) and capturing design rationale(Groen et al 2017;Kurtanović and Maalej 2017;Kurtanovic and Maalej 2018;Jha and Mahmoud 2019;Kunaefi and Aritsugi 2020).…”
mentioning
confidence: 99%
“…user interface (UI) design(Alqahtani and Orji 2019;Sharma and Bashir 2020;Franzmann et al 2020) and capturing design rationale(Groen et al 2017;Kurtanović and Maalej 2017;Kurtanovic and Maalej 2018;Jha and Mahmoud 2019;Kunaefi and Aritsugi 2020).…”
mentioning
confidence: 99%
“…Attempts to understand the relationship between online reviews and downloads are not been made within a regulatory framework. The present study adds to the existing literature by providing a new view of the quality of apps that is linked directly to the user experience, which is mediated through online reviews and downloads [60]. The following objectives are proposed in order to achieve the general purpose of this study: (1) verify if there are any significant differences between certified and non-certified apps; and (2) determine if the apps' quality label affects the user experience, according to the type of applications (certified and non-certified).…”
Section: Online User Reviewsmentioning
confidence: 99%
“…Several previous studies have shown the prevalence of smartphone privacy concerns and security threats around android permissions that can take place via privilege escalation attack that allows a malicious application to gain more capabilities leaked from a benign application [6], web API where message passing is also a medium of attack surface while providing availing inter-application collaboration. Adversarial can sniff, modify, steal or replace content with compromising user privacy [7], [19]. Again, malicious application can inject malicious messages/code which can lead to users' data breaches.…”
Section: Introductionmentioning
confidence: 99%