Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Gerber, Paul; Volkamer, Melanie; Renaud, Karen
Publisher: ACM SIGCAS
Languages: English
Types: Article
A smartphone is an indispensible device that also holds a great deal of personal and private data. Contact details, party or holiday photos and emails --- all carried around in our pockets and easily lost. On Android, the most widely-used smartphone operating system, access to this data is regulated by permissions. Apps request these permissions at installation, and they ideally only ask for permission to access data they really need to carry out their functions. The user is expected to check, and grant, requested permissions before installing the app. Their privacy can potentially be violated if they fail to check the permissions carefully. In June 2014 Google changed the Android permission screen, perhaps attempting to improve its usability. Does this mean that all is well in the Android eco-system, or was this update a retrograde move? This article discusses the new permission screen and its possible implications for smartphone owner privacy.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Android.com. Manifest.permission. Retrieved December 15th, 2014. http://developer.android.com/reference/android/ Manifest.permission.html.
    • [2] androidnext. Google Play Store: Jungstes Update sorgt fur laxere Handhabung von App-Berechtigungen. Retrieved December 1st, 2014. http://www.androidnext.de/news/google-play-storejuengstes-update-sorgt-fuer-laxere-handhabung-vonapp-berechtigungen/.
    • [3] areamobile. Google erschwert Prufen von App-Berechtigungen. Retrieved October 1st, 2014. http://www.areamobile.de/news/27347-androidgoogle-erschwert-pruefen-von-app-berechtigungen.
    • [4] S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti. Timing is everything? In Proceedings of the 27th international conference on Human factors in computing systems - CHI 09, page 319, New York, New York, USA, 2009. ACM Press.
    • [5] Fachbereich Informatik Technische Universitat Darmstadt. Forschungsgruppe Security, Usability and Society: Privacy friendly QR Scanner App. Retrieved December 15th, 2014. https://www.secuso.informatik.tudarmstadt.de/de/research/results/privacy-friendly-qrscanner-app/.
    • [6] A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demysti ed. Proceedings of the 18th ACM conference on Computer and communications security - CCS '11, page 627, 2011.
    • [7] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android Permissions : User Attention , Comprehension , and Behavior. In Symposium on Usable Privacy and Security (SOUPS) 2012, Washington, DC, USA, 2012.
    • [8] golem.de. Android-Apps erhalten leichter mehr Berechtigungen. Retrieved October 1st, 2014. http://www.golem.de/news/google-play-store-androidapps-erhalten-leichter-mehr-berechtigungen-1406- 106856.html.
    • [9] Google. Check app permissions. Retrieved September 29th, 2014. https://support.google.com/googleplay/answer/ 6014972?hl=dehttps://support.google.com/googleplay/ answer/6014972?hl=de.
    • [10] M. Harbach, M. Hettig, S. Weber, and M. Smith. Using personal examples to improve risk communication for security & privacy decisions. Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14, pages 2647{2656, 2014.
    • [11] heise online. Play Store ermoglicht Apps mehr Rechte ohne Nachfragen. Retrieved October 1st, 2014. http://heise.de/-2211827. retrieval date: May 30, 2014.
    • [12] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In J. Blyth, S. Dietrich, and L. J. Camp, editors, Financial Cryptography and Data Security, volume 7398 of Lecture Notes in Computer Science, pages 68{79. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012.
    • [13] P. G. Kelley, L. F. Cranor, and N. Sadeh. Privacy as part of the app decision-making process. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13, page 3393, 2013.
    • [14] L. Kraus, I. Wechsung, and S. Moller. Using Statistical Information to Communicate Android Permission Risks to Users. In G. Lenzini and G. Bella, editors, Proc. of 4th Int. Worshop on Socio-Technical Aspects in Security and Trust (STAST). IEEE, 2014.
    • [15] H. S. L. Z. Lin, Amini. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy through Crowdsourcing. pages 501{510, 2012.
    • [16] T. Vidas, N. Christin, and L. F. Cranor. Curbing Android Permission Creep. In W2SP, 2011.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article