Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Keywords: Android
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
To sell, or not to sell: social media data-breach in second-hand Android devices
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2022) 30 (1): 117–136.
Published: 19 August 2021
...Oussama BenRhouma; Ali AlZahrani; Ahmad AlKhodre; Abdallah Namoun; Wasim Ahmad Bhat Purpose The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android devices. Design...
Journal Articles
Bayesian evaluation of privacy-preserving risk communication for user android app preferences
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2021) 29 (4): 680–693.
Published: 22 June 2021
... with N = 60 participants, where they asked them to select applications on Android tablets with accurate real-time marketplace data. Findings In the aggregate, the authors found that app selections changed to be more risk-averse in the presence of a user-centered multi-level warning system using...
Journal Articles
AppAware: a policy visualization model for mobile applications
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2020) 28 (1): 116–132.
Published: 23 January 2020
... the difficulty to read privacy policies and android’s obscure permission set with a new privacy policy visualization model. Thus, we propose AppAware parser, a mobile add-on that acts complementary with AppAware and helps mobile device users to monitor the applications they installed to their smart device...
Journal Articles
Consumer trust in Google’s top developers’ apps: an exploratory study
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2016) 24 (5): 474–495.
Published: 14 November 2016
... to have access to this restricted information, it must be granted permission by the consumer. Prior to Android version 6.0, permissions were displayed to consumers upon installation of the app. Beginning with version 6.0, permissions are displayed to the consumer once the app is installed and running...
