2015
DOI: 10.1016/j.cose.2015.04.004
|View full text |Cite
|
Sign up to set email alerts
|

Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Different methods are used to validate the working and behaviors of Android apps to prevent them from misbehaving or risking user privacy and device security. Misalignments in their descriptions and permission requirements, unnecessary use of Android permissions and sensitive Application Programming Interfaces (APIs), app collusions, and use of framing effect are some of the known indicators for intrusive apps [31,[39][40][41][42][43][44][45][46][47]. Apps should also put adequate privacy protection and security controls in place [48].…”
Section: Transparency and Accountability In Android Appsmentioning
confidence: 99%
See 1 more Smart Citation
“…Different methods are used to validate the working and behaviors of Android apps to prevent them from misbehaving or risking user privacy and device security. Misalignments in their descriptions and permission requirements, unnecessary use of Android permissions and sensitive Application Programming Interfaces (APIs), app collusions, and use of framing effect are some of the known indicators for intrusive apps [31,[39][40][41][42][43][44][45][46][47]. Apps should also put adequate privacy protection and security controls in place [48].…”
Section: Transparency and Accountability In Android Appsmentioning
confidence: 99%
“…App permissions are central to many risk evaluation models. For example, the authors of [39,[44][45][46] used app permissions to determine its access to sensitive user data and critical device features for calculating app risks. As Android uses a privacy self-management model and users grant or deny different permissions to an app after evaluating the costs and benefits of a function that the app is offering, users are supposed to be familiar with the sensitivity of different permissions [64].…”
Section: Designmentioning
confidence: 99%
“…The analyses shows that two-third of the apps show suspicious handling of sensitive data and that 15 of them reported users' location to remote advertising servers. Styx [35] is the name of a conceptual model which is based on TaintDroid. Styx is aimed to efficiently communicate the privacy impacts of smartphone apps to its users.…”
Section: Smartphone Application Behavior Analysismentioning
confidence: 99%
“…The issue of defining a better way to communicate privacy-related information to assist users' decision-making is addressed in Bal et al [4,5]. Reflecting upon "privacy consequences" and echoing the problematic nature of "second-order privacy risks" with the aforementioned Keith et al [24], the researchers argue that communicating privacy outcomes from privacy-related actions to mobile users should facilitate better decisions.…”
Section: Achievementsmentioning
confidence: 99%
“…In order to include various effects of internal and external factors influencing decisionmaking 5 , as well as different interdependencies, we can try a broader model of cognitionone that simulates dynamic cognitive processes as functions in a system, consisting of input and data acquisition, memory, attention, decision-making, and output generation. The modelling of complex cognitive phenomena is widely and rigorously addressed in cognitive architectures.…”
Section: Opportunity For Future Research: Cognitive Architecturesmentioning
confidence: 99%