Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Shancang Li
Theodoros Spyridopoulos
Gianluca Stringhini
Theo Tryfonas
Editor
© Springer International Publishing AG 2017. Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model has been gracefully accepted by the majority of users, who also seem to be consistent regarding their privacy and security preferences. In this paper we analyse permission data collected by Android devices that were utilising the runtime permission model. The reconstructed data represent apps’ settings snapshots. We compare behavioural insights extracted from the acquired data with users’ privacy preferences reported in our previous work. In addition, compared with the responses received from another group of mobile device users, users’ privacy settings seem to be affected by the functionality of apps. Furthermore, we advise visual schemata that describe users’ privacy settings and point out a usability issue regarding the installation process of Android apps under the runtime permission model.
Andriotis, P., Li, S., Spyridopoulos, T., & Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model. Lecture Notes in Artificial Intelligence, 10292 LNCS, 604-622. https://doi.org/10.1007/978-3-319-58460-7_42
Journal Article Type | Conference Paper |
---|---|
Conference Name | HCII 2017 |
Start Date | Jul 9, 2019 |
End Date | Jul 14, 2019 |
Acceptance Date | Feb 10, 2017 |
Publication Date | Jan 1, 2017 |
Journal | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Print ISSN | 0302-9743 |
Electronic ISSN | 1611-3349 |
Publisher | Springer Verlag |
Peer Reviewed | Peer Reviewed |
Volume | 10292 LNCS |
Pages | 604-622 |
Series Title | Lecture Notes in Computer Science |
DOI | https://doi.org/10.1007/978-3-319-58460-7_42 |
Keywords | runtime, permissions, Android, settings, apps, marshmallow, privacy, security, usability, profile |
Public URL | https://uwe-repository.worktribe.com/output/888222 |
Publisher URL | https://doi.org/10.1007/978-3-319-58460-7_42 |
Additional Information | Title of Conference or Conference Proceedings : 5th International Conference on Human Aspects of Information Security, Privacy and Trust |
Studying users’ adaptation to Android's run-time fine-grained access control system
(2018)
Journal Article
MAMADROID: Detecting Android Malware by Building Markov Chains of Behavioral Models
(2017)
Presentation / Conference
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model
(2017)
Conference Proceeding
Privacy decision-making in the digital era: A game theoretic review
(2017)
Journal Article
A study on usability and security features of the Android pattern lock screen
(2016)
Journal Article
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Advanced Search