Skip to Main Content
Keywords: Android
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2022) 30 (1): 117–136.
Published: 19 August 2021
...Oussama BenRhouma; Ali AlZahrani; Ahmad AlKhodre; Abdallah Namoun; Wasim Ahmad Bhat Purpose The purpose of this paper is to investigate the private-data pertaining to the interaction of users with social media applications that can be recovered from second-hand Android devices. Design...
Journal Articles
Information and Computer Security (2021) 29 (4): 680–693.
Published: 22 June 2021
... with N = 60 participants, where they asked them to select applications on Android tablets with accurate real-time marketplace data. Findings In the aggregate, the authors found that app selections changed to be more risk-averse in the presence of a user-centered multi-level warning system using...
Journal Articles
Information and Computer Security (2020) 28 (1): 116–132.
Published: 23 January 2020
... the difficulty to read privacy policies and android’s obscure permission set with a new privacy policy visualization model. Thus, we propose AppAware parser, a mobile add-on that acts complementary with AppAware and helps mobile device users to monitor the applications they installed to their smart device...
Journal Articles
Information and Computer Security (2016) 24 (5): 474–495.
Published: 14 November 2016
... to have access to this restricted information, it must be granted permission by the consumer. Prior to Android version 6.0, permissions were displayed to consumers upon installation of the app. Beginning with version 6.0, permissions are displayed to the consumer once the app is installed and running...

or Create an Account

Close Modal
Close Modal