“desperate times call for desperate measures”: User concerns with mobile loan apps in kenya

CW Munyendo, Y Acar, AJ Aviv - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The usage of mobile loan applications has proliferated in develo** countries. This is due
to the ease and speed in which they disburse small loans to users, compared to traditional …

Contextualizing privacy decisions for better prediction (and protection)

P Wijesekera, J Reardon, I Reyes, L Tsai… - Proceedings of the …, 2018 - dl.acm.org
Modern mobile operating systems implement an ask-on-first-use policy to regulate
applications' access to private user data: the user is prompted to allow or deny access to a …

An investigation into Android run-time permissions from the end users' perspective

GL Scoccia, S Ruberto, I Malavolta, M Autili… - Proceedings of the 5th …, 2018 - dl.acm.org
To protect the privacy of end users from intended or unintended malicious behaviour, the
Android operating system provides a permissions-based security model that restricts access …

Bu-Dash: a universal and dynamic graphical password scheme (extended version)

P Andriotis, M Kirby, A Takasu - International Journal of Information …, 2023 - Springer
Passwordless authentication is a trending theme in cyber security, while biometrics
gradually replace knowledge-based schemes. However, Personal Identification Numbers …

Automated detection and repair of incompatible uses of runtime permissions in android apps

M Dilhara, H Cai, J Jenkins - … of the 5th International Conference on …, 2018 - dl.acm.org
The runtime permission model of Android enhances security yet also constitutes a source of
incompatibility issues that impedes the productivity of mobile developers. This paper …

Enhancing trustability of android applications via user-centric flexible permissions

GL Scoccia, I Malavolta, M Autili… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
The Android OS market is experiencing a growing share globally. It is becoming the mobile
platform of choice for an increasing number of users. People rely on Android mobile devices …

Delaying informed consent: An empirical investigation of mobile apps' upgrade decisions

R Mayya, S Viswanathan - Management Science, 2024 - pubsonline.informs.org
In response to users' evolving desire for choice and control over their personal data,
numerous platforms across sectors have been updating privacy policies. Unlike public …

User comfort with android background resource accesses in different contexts

D Votipka, SM Rabin, K Micinski, T Gilray… - … Symposium on Usable …, 2018 - usenix.org
Android apps ask users to allow or deny access to sensitive resources the first time the app
needs them. Prior work has shown that users decide whether to grant these requests based …

Investigating user perception and comprehension of android permission models

A Peruma, J Palmerino, DE Krutz - … of the 5th International Conference on …, 2018 - dl.acm.org
Do you know the permissions your favorite apps use? You probably don't, and you aren't
alone. Everyone seemingly talks about how important app security and privacy is to them …

Unraveling the complexity of mobile application permissions: Strategies to enhance users' privacy education

R Lavranou, S Karagiannis, A Tsohou… - European Journal of …, 2023 - ej-eng.org
Smartphones and other mobile devices have seamlessly integrated into our daily lives
offering a multitude of possibilities through various applications. However, this convenience …