A Conundrum of Permissions: Installing Applications on an Android Smartphone
نویسندگان
چکیده
Each time a user installs an application on their Android phone they are presented with a full screen of information describing what access they will be granting that application. This information is intended to help them make two choices: whether or not they trust that the application will not damage the security of their device and whether or not they are willing to share their information with the application, developer, and partners in question. We performed a series of semi-structured interviews in two cities to determine whether people read and understand these permissions screens, and to better understand how people perceive the implications of these decisions. We find that the permissions displays are generally viewed and read, but not understood by Android users. Alarmingly, we find that people are unaware of the security risks associated with mobile apps and believe that app marketplaces test and reject applications. In sum, users are not currently well prepared to make informed privacy and security decisions around installing applications.
منابع مشابه
ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامهها در دستگاههای همراه
Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...
متن کاملAn Effective Risk Computation Metric for Android Malware Detection
Android has been targeted by malware developers since it has emerged as widest used operating system for smartphones and mobile devices. Android security mainly relies on user decisions regarding to installing applications (apps) by approving their requested permissions. Therefore, a systematic user assistance mechanism for making appropriate decisions can significantly improve the security of ...
متن کاملAn Intelligent Methodology for Malware Detection in Android Smartphones Based Static Analysis
Recently, a lot of mobile phone users are rapidly switching to smartphones, and, many users download mobile applications without any thought of security. Therefore, smartphones are interesting target for malware, especially with Android devices. So, it is too important to use a methodology to detect the malware applications before installing it on the phones. In this paper we propose an effecti...
متن کاملSmartphone Users Want to Be Mocked
To secure users’ sensitive data, Android employs a “takeit-or-leave-it” permissions model. Unfortunately, this model has many well-documented flaws: applications request unnecessary permissions [1, 2], while users don’t understand the implications of permissions requested [3]. An alternative “take-it-or-break-it” approach [5] allows users to selectively enable particular permissions, but many a...
متن کاملSeparating Smartphone Advertising from Applications
dan S. Wallach is a Professor of computer Science at rice University. [email protected] A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. Advertising libraries often need additional permissions, requiring applications to issue requests for additional permissions to their users at ins...
متن کامل