2021
DOI: 10.20533/ijds.2040.2570.2021
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Abstract: A user's consent is required for sensitive information to be shared with third parties. Data exfiltration is one of the main end goals of cyber-attacks and with the dominance of Android in the smartphone market, many Android users are susceptible to this data theft. Most of these Android users are unaware of the theft of their personal data to an unauthorised entity. The entities responsible for this leakage can vary from malicious hackers and mobile network operators to the phone company themselves. Our paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 3 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?