Proceedings of the 5th ACM Conference on Data and Application Security and Privacy 2015
DOI: 10.1145/2699026.2699108
|View full text |Cite
|
Sign up to set email alerts
|

Dimensions of Risk in Mobile Applications

Abstract: Mobile platforms, such as Android, warn users about the permissions an app requests and trust that the user will make the correct decision about whether or not to install the app. Unfortunately many users either ignore the warning or fail to understand the permissions and the risks they imply. As a step toward developing an indicator of risk that decomposes risk into several categories, or dimensions, we conducted two studies designed to assess the dimensions of risk deemed most important by experts and novice… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(22 citation statements)
references
References 17 publications
0
21
1
Order By: Relevance
“…In particular, the Android malware and botnet distribution by malicious persons are always motivated by privacy exposure of victim, financial profit to attacker and degrading operating system of smartphone [16,26,27,15]. Thus, this research had classified the app features into three risks which are privacy risk, financial risk and system risk.…”
Section: Features Threat Scorementioning
confidence: 99%
“…In particular, the Android malware and botnet distribution by malicious persons are always motivated by privacy exposure of victim, financial profit to attacker and degrading operating system of smartphone [16,26,27,15]. Thus, this research had classified the app features into three risks which are privacy risk, financial risk and system risk.…”
Section: Features Threat Scorementioning
confidence: 99%
“…); (2) Photo sharing on social networks; and (3) Location disclosure. These categories are chosen as common representative items from the 14 personal information items found to be a privacy risk on mobile devices in the user study conducted by Jorgensen et al [9].…”
Section: User Studymentioning
confidence: 99%
“…With the rapid growth in pervasive/ubiquitous computing, personal information privacy has become a bottleneck research challenge [9,13,21]. A lot of private and often sensitive information about users that is collected through ubiquitous devices can be shared with unknown entities at any time, without them being aware.…”
Section: Introductionmentioning
confidence: 99%
“…The human factors component is based on principles of decision making, including that information framing influences decisions (Kahneman & Tversky, 1979) and that people often rely on gist representations rather than on detailed verbatim representations (Brust-Renck, Royer, & Reyna, 2013). Central to our approach is an assumption that most users will prefer less detailed displays of risk information, such as a summary risk score (Chen et al, in press;Gates, Chen, Li, & Proctor, 2014) and indication of risk categories (Jorgensen et al, 2015).…”
Section: Selection Of Mobile Appsmentioning
confidence: 99%
“…In addition to a summary risk (or safety) index, research has also identified the major risk categories (personal information privacy, monetary, and device availability/stability) that can be utilized by users who want more detailed information (Jorgensen et al, 2015). Principles of display design (e.g., Bennett & Flach, 2011) can form the basis for research to determine the most effective way to convey the risks associated with these categories to users when choosing among apps.…”
Section: Selection Of Mobile Appsmentioning
confidence: 99%