While the literature on permissions from the end-user perspective is rich, there is a lack of empirical research on why developers request permissions, their conceptualization of …
IM Almomani, A Al Khayer - Ieee access, 2020 - ieeexplore.ieee.org
Android is one of the most essential and highly used operating systems. Android permissions system is a core security component that offers an access-control mechanism to …
Smart Voice Assistants are transforming the way users interact with technology. This transformation is mostly fostered by the proliferation of voice-driven applications (called …
N Tjikhoeri, L Olson, E Guzmán - Empirical Software Engineering, 2024 - Springer
This work analyzes ethical concerns found in users' app store reviews. We performed this study because ethical concerns in mobile applications (apps) are widespread, pose severe …
Privacy labels provide an easy and recognizable overview of data collection practices adopted by mobile apps developers. Specifically, on the Apple App Store, privacy labels are …
With the increasing usage of smartphones in banks, medical services and m-commerce, and the uploading of applications from unofficial sources, security has become a major concern …
Everyday Augmented Reality (AR) headsets pose significant privacy risks, potentially allowing prolonged sensitive data collection of both users and bystanders (eg members of …
Inside the operating system, the processing of configuration files tends to be complicated and involves various data operation procedures. On Android, the processing of manifest files …
MEA Tebib, M Graa, P Andre - International Journal On Advances in …, 2023 - hal.science
Mobile devices are increasingly used in our daily lives. To fulfill the needs of smartphone users, the development of mobile applications has been growing at a high rate. As …