Journalartikel
Autorenliste: Lo Iacono, Luigi; Gorski, Peter Leo; Grosse, Josephine; Gruschka, Nils
Jahr der Veröffentlichung: 2017
Seiten: 27-33
Zeitschrift: Journal of Information Security and Applications
Bandnummer: 34
Heftnummer: Part 1
ISSN: 2214-2126
eISSN: 2214-2134
DOI Link: https://doi.org/10.1016/j.jisa.2016.11.006
Verlag: Elsevier
Abstract:
As mobile devices have evolved from simple phones to rich computing systems, the data stored on these multi-taskers have consequently become more sensitive and private. Due to this, modern mobile operating systems include sophisticated permission systems for restricting the access to this device for the mobile applications. However, many applications acquire more permissions than required. These over-privileged applications can affect data security and user privacy. All application permissions are indicated to the user, but these notifications have been shown to be ignored or not understood. Thus, other mechanisms need to be improved.This paper presents design approaches to communicate the degree of over-privilege in mobile applications. It uses an additional rating system in application stores to inform users before making the decision of installing a specific application. The approaches have been evaluated in a usability study based on distinct prototype Android application stores. The findings show that passive security indicators can be applied to influence the decision-making process of users before downloading and installing an application. (C) 2016 Elsevier Ltd. All rights reserved.
Zitierstile
Harvard-Zitierstil: Lo Iacono, L., Gorski, P., Grosse, J. and Gruschka, N. (2017) Signalling over-privileged mobile applications using passive security indicators, Journal of information security and applications, 34(Part 1), pp. 27-33. https://doi.org/10.1016/j.jisa.2016.11.006
APA-Zitierstil: Lo Iacono, L., Gorski, P., Grosse, J., & Gruschka, N. (2017). Signalling over-privileged mobile applications using passive security indicators. Journal of information security and applications. 34(Part 1), 27-33. https://doi.org/10.1016/j.jisa.2016.11.006