Добірка наукової літератури з теми "APP PERMISSION"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "APP PERMISSION".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "APP PERMISSION"
Xu, Guosheng, Shengwei Xu, Chuan Gao, Bo Wang, and Guoai Xu. "PerHelper: Helping Developers Make Better Decisions on Permission Uses in Android Apps." Applied Sciences 9, no. 18 (September 5, 2019): 3699. http://dx.doi.org/10.3390/app9183699.
Повний текст джерелаNaga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.
Повний текст джерелаUllah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (January 13, 2022): 246. http://dx.doi.org/10.3390/electronics11020246.
Повний текст джерелаOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (September 24, 2019): 3997. http://dx.doi.org/10.3390/app9193997.
Повний текст джерелаPaul, Nishtha, Arpita Jadhav Bhatt, Sakeena Rizvi, and Shubhangi. "Malware Detection in Android Apps Using Static Analysis." Journal of Cases on Information Technology 24, no. 3 (July 2022): 1–25. http://dx.doi.org/10.4018/jcit.20220701.oa6.
Повний текст джерелаNaderi, Hamid, and Behzad Kiani. "Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps." Frontiers in Health Informatics 9, no. 1 (September 2, 2020): 41. http://dx.doi.org/10.30699/fhi.v9i1.224.
Повний текст джерелаXiong, Aiping, Huangyi Ge, Wanling Zou, Ninghui Li, and Robert W. Proctor. "Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 797. http://dx.doi.org/10.1177/1541931213601692.
Повний текст джерелаReimer, Helmut. "App „Permission Watcher“ für Android-Smartphones." Datenschutz und Datensicherheit - DuD 36, no. 3 (March 2012): 218. http://dx.doi.org/10.1007/s11623-012-0079-5.
Повний текст джерелаLiu, Zhongxin, Xin Xia, David Lo, and John Grundy. "Automatic, highly accurate app permission recommendation." Automated Software Engineering 26, no. 2 (March 19, 2019): 241–74. http://dx.doi.org/10.1007/s10515-019-00254-6.
Повний текст джерелаYilmaz, Saliha, and Mastaneh Davis. "Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 717–24. http://dx.doi.org/10.34190/eccws.22.1.1453.
Повний текст джерелаДисертації з теми "APP PERMISSION"
Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.
Повний текст джерелаRustgi, Pulkit. "The Evaluation of an Android Permission Management System Based on Crowdsourcing." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6033.
Повний текст джерелаLu, Can. "Revisiting the Evolution of Android Permissions." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535377084768501.
Повний текст джерелаAlmuhimedi, Hazim. "Helping Smartphone Users Manage their Privacy through Nudges." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1103.
Повний текст джерелаDahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.
Повний текст джерелаSu, Shu-Miaw. "English planning permission and Taiwanese development permission : the relevant measures of planning permission - a lesson from English experience." Thesis, University College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298175.
Повний текст джерелаSagar, Shraddha. "PREDICTION OF PROTECTED-PERMISSIVE LEFT-TURN PHASING CRASHES BASED ON CONFLICT ANALYSIS." UKnowledge, 2017. https://uknowledge.uky.edu/ce_etds/60.
Повний текст джерелаJamil, Eva, and Mazdak Shirazi. "Spelar behörighetskrav någon roll? : En kvantitativ studie av Android användares beteende och förståelse." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12225.
Повний текст джерелаProblem – Android is the leading operative system on the market, while previous studies have shown that malware and attacks have mostly been targeted at Android units. Attacks are executed when applications that consist malware gets access of the permissions they demand of the unit. This is by the approval of the user before an installation of an application. A problem is that many users ignores or don’t understand the permission they give applications access to. Purpose - The study aims to examine three issues. The first research question contains hypotheses about how aware Android users are of the risks which ten application permissions contain. These permissions often occurs among malicious applications but are also included among safe applications at Google Play. Furthermore, the objective of this study is to investigate whether there is a connection between the user awareness and their downloading behavior. The last issue examines whether users read through the application permissions before installing an application, and what possible reasons that causes them to not read the permissions. Methodology - Quantitative methods have been used by gathering the empirical material through a questionnaire. The study involved 116 respondents and the results were created by using bar graphs, crosstabs, Chi-square tests and frequency tables. Results and Conclusion - The goal has been met to a large extent, however, it would have been beneficial to have a larger selection to possibly be able to ensure and strengthen the significance of the Chi-square tests. The result showed that a high degree of users are not aware of the risks of the investigated permissions. Further findings showed that there is some connection between the user’s awareness and download behavior, since six out of ten hypotheses got confirmed. The results also showed that 62 percent of the users never alternatively rarely read permissions before installation. The reason for this is that they don’t understand the permissions associated description, alternatively don’t notice the permissions at all. Finally, the respondents indicated that they do not understand the description of the permissions because they are too short and have too many technical terms. Originality - The results of the study mainly benefits the Android users since it increases their knowledge which protects them against the risks. The result, however, also benefit the further development of the application permissions, to make them work more effectively as a warning method. What’s new and valuable in the study is that it’s based on the problems that was identified in previous research and we decided to further immerse ourselves in the subject. The study has investigated whether there is a connection between the user awareness and downloading behavior, as well as the background causes which makes the users ignore and don’t understand the permissions. Originality is also found in the study since we limited ourselves to specifically investigate ten permissions that often occur among malicious applications. The study is written in Swedish.
RAWAL, PRAVEEN SINGH. "APP PERMISSION CLASSIFICATION : STATIC AND DYNAMIC METHODS." Thesis, 2023. http://dspace.dtu.ac.in:8080/jspui/handle/repository/20424.
Повний текст джерелаWu, Min-Xun, and 吳旻訓. "Understanding the Impacts of Permission Requested on Mobile App Adoption." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/ykzfa4.
Повний текст джерела國立中山大學
資訊管理學系研究所
102
Because of the expanding of smartphones, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to provide various functions for users. However, Apps might request more permissions than they need. Users have to grant permissions requested by Apps before downloading Apps. The purpose of this study is understanding the impacts of permissions on users'' intention to download mobile Apps. We proposed the concept of &;quot;permission-function fit (PFF)&;quot;, and included perceived privacy risk and social exchange theory into TAM to explore the research purpose. The results of this study are: (1) users'' attitude toward the App positively influences their download intention. (2) Users'' perceived usefulness and the ranking of the App positively influence users'' attitude toward the App; perceived privacy risk negatively affect users'' attitude; when App requests more permissions than it needs, users have negative attitude toward it. Perceived usefulness has the strongest effect on attitude. (3)The privacy level of permissions positively affects users'' perception of privacy risk; when Apps request more permissions than they need, users perceive higher privacy risk.
Книги з теми "APP PERMISSION"
Sayles, Victoria. 11. Licences and proprietary estoppel. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198815198.003.0011.
Повний текст джерелаPolivach, A., and P. Gudev. Polivach A.P., Gudev P.A. The IMEMO Sea Powers’ Rankings 2021 (2.0). – Moscow, IMEMO, 2021. – 178 p. Primakov National Research Institute of World Economy and International Relations, Russian Academy of Sciences (IMEMO), 23, Profsoyuznaya Str., Moscow, 117997, Russian Federation, 2021. http://dx.doi.org/10.20542/978-5-9535-0601-4.
Повний текст джерелаManson, Leigh, and Shona Muir. Advance care planning in New Zealand: our Voice—tō tātou reo. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198802136.003.0021.
Повний текст джерелаStephens, Keri K. Mobile Workers in a Hospital. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190625504.003.0009.
Повний текст джерелаClarke, Sandra, and Sarah Greer. Land Law Directions. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198809555.001.0001.
Повний текст джерелаЧастини книг з теми "APP PERMISSION"
Mathur, Akshay, Ethan Ewoldt, Quamar Niyaz, Ahmad Javaid, and Xiaoli Yang. "Permission-Educator: App for Educating Users About Android Permissions." In Intelligent Human Computer Interaction, 361–71. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98404-5_34.
Повний текст джерелаShen, Yidong, Ming Xu, Ning Zheng, Jian Xu, Wenjing Xia, Yiming Wu, Tong Qiao, and Tao Yang. "Android App Classification and Permission Usage Risk Assessment." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 567–77. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00916-8_52.
Повний текст джерелаRaber, Frederic, and Antonio Krueger. "Towards Understanding the Influence of Personality on Mobile App Permission Settings." In Human-Computer Interaction – INTERACT 2017, 62–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68059-0_4.
Повний текст джерелаHuang, Keman, Jinjing Han, Shizhan Chen, and Zhiyong Feng. "A Skewness-Based Framework for Mobile App Permission Recommendation and Risk Evaluation." In Service-Oriented Computing, 252–66. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46295-0_16.
Повний текст джерелаHuang, Hsiao-Ying, and Masooda Bashir. "Android App Permission and Users’ Adoption: A Case Study of Mental Health Application." In Human Aspects of Information Security, Privacy and Trust, 110–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_8.
Повний текст джерелаMacDuffie, Jason K., and Patricia A. Morreale. "Comparing Android App Permissions." In Design, User Experience, and Usability: Technological Contexts, 57–64. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40406-6_6.
Повний текст джерелаSchwarz, Torsten. "Grundlagen des Permission Marketing." In Das Handbuch Direct Marketing & More, 983–1005. Wiesbaden: Gabler Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-90220-7_55.
Повний текст джерелаBierhoff, Kevin, Nels E. Beckman, and Jonathan Aldrich. "Practical API Protocol Checking with Access Permissions." In Lecture Notes in Computer Science, 195–219. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03013-0_10.
Повний текст джерелаSharma, Akanksha, and Subrat Kumar Dash. "Mining API Calls and Permissions for Android Malware Detection." In Cryptology and Network Security, 191–205. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_13.
Повний текст джерелаChowdhury, Md Naseef-Ur-Rahman, Qudrat E. Alahy, and Hamdy Soliman. "Advanced Android Malware Detection Utilizing API Calls and Permissions." In Lecture Notes in Electrical Engineering, 123–34. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4118-3_12.
Повний текст джерелаТези доповідей конференцій з теми "APP PERMISSION"
Rawal, Praveen Singh, and Divyashikha Sethia. "App Permission Classification dynamic Model(APCM)." In 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2023. http://dx.doi.org/10.1109/icccnt56998.2023.10307201.
Повний текст джерелаLi, Shanlin, Weiyi Jiang, Yongming Yao, and Chenyu Xu. "Permission analysis based on android app store." In International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), edited by Pavel Loskot and Shaozhang Niu. SPIE, 2023. http://dx.doi.org/10.1117/12.2681726.
Повний текст джерелаPan, Lanlan Pan, Ruonan Qiu, Zhenming Chen, Gen Li, Dian Wen, and Minghui Yang. "Enhance Calling Definition Security for Android Custom Permission." In 4th International Conference on Natural Language Processing and Machine Learning. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130808.
Повний текст джерелаLiu, Xueqing, Yue Leng, Wei Yang, Chengxiang Zhai, and Tao Xie. "Mining Android App Descriptions for Permission Requirements Recommendation." In 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, 2018. http://dx.doi.org/10.1109/re.2018.00024.
Повний текст джерелаZeng, Huan, Yan Ren, Qing-Xian Wang, Neng-Qiang He, and Xu-Yang Ding. "Detecting malware and evaluating risk of app using Android permission-API system." In 2014 11th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). IEEE, 2014. http://dx.doi.org/10.1109/iccwamtip.2014.7073445.
Повний текст джерелаHu, Xiaocao, and Hui Wang. "Category-Aware App Permission Recommendation based on Sparse Linear Model." In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00133.
Повний текст джерелаKrutz, Daniel E., Nuthan Munaiah, Anthony Peruma, and Mohamed Wiem Mkaouer. "Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps." In 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft). IEEE, 2017. http://dx.doi.org/10.1109/mobilesoft.2017.5.
Повний текст джерелаHe, Yi, and Qi Li. "Detecting and defending against inter-app permission leaks in android apps." In 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC). IEEE, 2016. http://dx.doi.org/10.1109/pccc.2016.7820624.
Повний текст джерелаMujahid, Suhaib. "Detecting wearable app permission mismatches: a case study on Android wear." In ESEC/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3106237.3121279.
Повний текст джерелаOlukoya, Oluwafemi, Lewis Mackenzie, and Inah Omoronyia. "Permission-based Risk Signals for App Behaviour Characterization in Android Apps." In 5th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007248701830192.
Повний текст джерела