Dissertations / Theses on the topic 'APP PERMISSION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 dissertations / theses for your research on the topic 'APP PERMISSION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.
Full textRustgi, Pulkit. "The Evaluation of an Android Permission Management System Based on Crowdsourcing." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6033.
Full textLu, Can. "Revisiting the Evolution of Android Permissions." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535377084768501.
Full textAlmuhimedi, Hazim. "Helping Smartphone Users Manage their Privacy through Nudges." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1103.
Full textDahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.
Full textSu, Shu-Miaw. "English planning permission and Taiwanese development permission : the relevant measures of planning permission - a lesson from English experience." Thesis, University College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298175.
Full textSagar, Shraddha. "PREDICTION OF PROTECTED-PERMISSIVE LEFT-TURN PHASING CRASHES BASED ON CONFLICT ANALYSIS." UKnowledge, 2017. https://uknowledge.uky.edu/ce_etds/60.
Full textJamil, Eva, and Mazdak Shirazi. "Spelar behörighetskrav någon roll? : En kvantitativ studie av Android användares beteende och förståelse." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12225.
Full textProblem – Android is the leading operative system on the market, while previous studies have shown that malware and attacks have mostly been targeted at Android units. Attacks are executed when applications that consist malware gets access of the permissions they demand of the unit. This is by the approval of the user before an installation of an application. A problem is that many users ignores or don’t understand the permission they give applications access to. Purpose - The study aims to examine three issues. The first research question contains hypotheses about how aware Android users are of the risks which ten application permissions contain. These permissions often occurs among malicious applications but are also included among safe applications at Google Play. Furthermore, the objective of this study is to investigate whether there is a connection between the user awareness and their downloading behavior. The last issue examines whether users read through the application permissions before installing an application, and what possible reasons that causes them to not read the permissions. Methodology - Quantitative methods have been used by gathering the empirical material through a questionnaire. The study involved 116 respondents and the results were created by using bar graphs, crosstabs, Chi-square tests and frequency tables. Results and Conclusion - The goal has been met to a large extent, however, it would have been beneficial to have a larger selection to possibly be able to ensure and strengthen the significance of the Chi-square tests. The result showed that a high degree of users are not aware of the risks of the investigated permissions. Further findings showed that there is some connection between the user’s awareness and download behavior, since six out of ten hypotheses got confirmed. The results also showed that 62 percent of the users never alternatively rarely read permissions before installation. The reason for this is that they don’t understand the permissions associated description, alternatively don’t notice the permissions at all. Finally, the respondents indicated that they do not understand the description of the permissions because they are too short and have too many technical terms. Originality - The results of the study mainly benefits the Android users since it increases their knowledge which protects them against the risks. The result, however, also benefit the further development of the application permissions, to make them work more effectively as a warning method. What’s new and valuable in the study is that it’s based on the problems that was identified in previous research and we decided to further immerse ourselves in the subject. The study has investigated whether there is a connection between the user awareness and downloading behavior, as well as the background causes which makes the users ignore and don’t understand the permissions. Originality is also found in the study since we limited ourselves to specifically investigate ten permissions that often occur among malicious applications. The study is written in Swedish.
RAWAL, PRAVEEN SINGH. "APP PERMISSION CLASSIFICATION : STATIC AND DYNAMIC METHODS." Thesis, 2023. http://dspace.dtu.ac.in:8080/jspui/handle/repository/20424.
Full textWu, Min-Xun, and 吳旻訓. "Understanding the Impacts of Permission Requested on Mobile App Adoption." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/ykzfa4.
Full text國立中山大學
資訊管理學系研究所
102
Because of the expanding of smartphones, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to provide various functions for users. However, Apps might request more permissions than they need. Users have to grant permissions requested by Apps before downloading Apps. The purpose of this study is understanding the impacts of permissions on users'' intention to download mobile Apps. We proposed the concept of &;quot;permission-function fit (PFF)&;quot;, and included perceived privacy risk and social exchange theory into TAM to explore the research purpose. The results of this study are: (1) users'' attitude toward the App positively influences their download intention. (2) Users'' perceived usefulness and the ranking of the App positively influence users'' attitude toward the App; perceived privacy risk negatively affect users'' attitude; when App requests more permissions than it needs, users have negative attitude toward it. Perceived usefulness has the strongest effect on attitude. (3)The privacy level of permissions positively affects users'' perception of privacy risk; when Apps request more permissions than they need, users perceive higher privacy risk.
Chen, Shu-Hsuan, and 陳書玄. "Investigate the Impact of “From Free to Fee” and Permission Marketing on the Consumers'' Intention to Download App." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/89203982834071378354.
Full text國立高雄第一科技大學
行銷與流通管理研究所
103
The study aims to investigate the impact of “from free to fee” and permission marketing on App download intention. In order to avoid the interference comes from other external factors, the two factors between-subject design were used, and conducted as 2(from free to fee: free and fee) ×2(permission levels: high and low). There are 146 subjects to attend the experiment, include 66 males and 80 females. Additionally, we employ “from free to fee” (i.e. free to fee and fee to free) to be a between-subject experiment design which generates two situations wholly. The results show that, the free App leads higher download intention than the App with a fee, and the App with higher permission level leads higher download intention than the App with lower permission level. The interaction effect of “from free to fee” and permission marketing on App download intention is not significant. The main effect is significant, but the interaction effect is still not significant after adding gender as the moderator. The App download intention between man and woman is significantly different. Finally, this study presents the theory and managerial implications for reference in future research and industry application. Keywords: From free to fee, Permission marketing, Gender, App download intention.
Chen, KAI-JUN, and 陳凱軍. "Android Malware Detection Based on API and Permission." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/35zus5.
Full text國立雲林科技大學
資訊工程系
107
The increasing number of malicious APKs and the evolution of related technologies and advances in attack techniques have led to many types of malicious behaviors, such as Trojans, SMS, advertising software, etc., bring about a serious threat to mobile device users. According to the GDATA survey of German security operators [22], the number of new Android malicious APKs was 3 million in 2017; and the number of new Android malicious APKs found was 3.18 million until the third quarter in 2018. It is imperative to detect if the APK contains malicious behavior. The method of detection in this paper is mainly static analysis. It uses static analysis to extract all the APIs of the malicious APK and the benign APK and the Permission declared by the APK, and compares the APIs executed by the APK with executable APIs in the declared Permission. After the comparison, the reserved API and Permission are used as the input of the feature filtering. The feature screening formula proposed in this paper is computing the difference of total number of APIs and the difference of total number of Permissions between the malicious APK data set and the benign APK data set. The larger differences are reserved, but the smaller difference are removed. After the feature-filtered API and Permission are used as feature vectors which the machine learning algorithm is used to train the classification model (Random Forest, SVM). We analyzed 26389 malicious APKs and benign APKs through experiments. The experimental results show that the accuracy of the feature screening method used in this paper is 95.03%. Compared with other papers [6,17], the accuracy of this paper increases by about 1~3%. 0.1 to 0.3% accuracy.
KUMAR, NIRAJ. "ANDROID APP REPACKAGING DETECTION USING SIGNING CERTIFICATE AND PERMISSIONS COMPARISON." Thesis, 2018. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19109.
Full textHour, Kai-Jong, and 侯凱中. "Explore the user permissions to the APP application perceived risks and impact on the willingness to use-a case of Google Android APP." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7fgnbx.
Full text嶺東科技大學
資訊管理系碩士班
103
The reason of studying this research plan is due to the APP of smart mobile devices recently have begun to cause security and privacy problems, it also leads to a fraudulent social phenomenon. In order to understand users’ intention before installing APP when the decleard screem pop up to request the using device permission, whether users have the perceived risk to determine that the using device permission is appropriate, and the impact of the perceived risk on follow-up users’ willingness to install. Therefore, this research plan studing participants are users who use smart mobile device with Android system. After investigating issues which are based on Knowledge Product theory、Trust theory and perceived risk theory, and then designing and constructing this research model. Finally, sending the on-line questionnaire to the users who use smart mobile device with Android system in Taiwan ,and then analysing recalled date by SPSS for Windows V.12.
Trudeau, Dominique. "Expression and persistence of Microplitis demolitor polydna virus in permissive and non-permissive hosts of the Braconid wasp, Microplitis demolitor." 1998. http://catalog.hathitrust.org/api/volumes/oclc/40674158.html.
Full text