2019
DOI: 10.1016/j.cose.2019.02.010
|View full text |Cite
|
Sign up to set email alerts
|

Revealing the unrevealed: Mining smartphone users privacy perception on app markets

Abstract: Popular smartphone apps may receive several thousands of user reviews containing statements about apps' functionality, interface, user-friendliness, etc. They sometimes also comprise privacy relevant information that can be extremely helpful for app developers to better understand why users complain about certain privacy aspects of their apps. However, due to the complicated and sometimes vague nature of reviews, it is quite though and time consuming for developers to go through all these reviews to get inform… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 46 publications
(35 citation statements)
references
References 36 publications
0
32
0
Order By: Relevance
“…Perception Analyzer The BA tool enables employees to write (optional) reviews regarding each privacy and security invasive activity that they observe. The main goal of Perception Analyzer (PA) as an extension of our previous work [21] is to mine these bunch of reviews to investigate how much privacy and security relevant claims/statements can be extracted that can be ultimately used for the risk assessment component. These self-written reports are sent to the IT security department of the enterprise as well.…”
Section: Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…Perception Analyzer The BA tool enables employees to write (optional) reviews regarding each privacy and security invasive activity that they observe. The main goal of Perception Analyzer (PA) as an extension of our previous work [21] is to mine these bunch of reviews to investigate how much privacy and security relevant claims/statements can be extracted that can be ultimately used for the risk assessment component. These self-written reports are sent to the IT security department of the enterprise as well.…”
Section: Componentsmentioning
confidence: 99%
“…We detect not only a privacy and security relevant user review, but also determine the threat hidden in it. To this end, we take the most relevant threats in the context of smartphone ecosystems introduced in [21] into account. These threats are used as the input for the supervised classification algorithm as described in Table 1.…”
Section: T7 Generalmentioning
confidence: 99%
“…We detect not only a privacy and security relevant user review, but also determine the underlying threat. Based on our already proposed threat catalog [18], we use these threats as the input for the classifier as described in Table 1. Allows an attacker to access or infer personal data to use it for marketing purposes, such as profiling.…”
Section: User Reviews Analysis (A4)mentioning
confidence: 99%
“…We were interested to first extract such information, and then, to determine the granularity of privacy relevant statements (to extract potential privacy threats of apps based on the analysis of their user reviews). Based on our previous work [18], we used the collected data as an input for a trained machine learning algorithm (Logistic Regression (LR) implemented in scikit-learn [29]). This ultimately led to a smaller result set.…”
Section: Privacy Relevant Complaints Analysismentioning
confidence: 99%
See 1 more Smart Citation