scholarly journals Consciousness about Mobile App Permissions

2019 ◽  
Vol 8 (4) ◽  
pp. 11384-11386

This paper gives us the attentiveness on opening files from unknown sources as sometimes it may cause damage to our mobile phones. In almost all the mobile apps after downloading it will ask some of the permissions to allow clicking for the allow button only we can able to access anything in that application otherwise we are unable to use all the features of that application. Many popular android apps including Facebook messenger, WhatsApp, Skype, Twitter, Share it, Instagram and other party apps get user permission after the installation. By allowing these permissions they can recording with the phone audio and video at any time, they can see contacts and modifying the USB storage contents(files). Lack of knowledge and awareness about permissions to the people may cause significant negative consequences. This research evaluates effectiveness of a demo app with visual ques to increase permissions awareness and avoid negative consequences.

2020 ◽  
Author(s):  
Michael Mackert ◽  
Dorothy Mandell ◽  
Erin Donovan ◽  
Lorraine Walker ◽  
Mike Garcia ◽  
...  

UNSTRUCTURED Health communication campaigns often suffer from the shortcomings of a limited budget and limited reach, resulting in a limited impact. This paper suggests a shift to audience-centered communication platforms – particularly apps on mobile phones. By using a common platform, multiple interventions and campaigns can combine resources and increase user engagement, resulting in a larger impact on health behavior. Given the widespread use of mobile phones, mobile apps can be an effective and efficient tool to provide health interventions. One such platform is Father’s Playbook, a mobile app designed for men to be more involved during their partner’s pregnancy. Health campaigns and interventions looking to reach expectant fathers can use Father’s Playbook as a vehicle for their messages.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Sungtae Kim ◽  
Taeyong Park ◽  
Geochang Jeon ◽  
Jeong Hyun Yi

Mobile apps are booming with the expansion of mobile devices such as smartphones, tablet PCs, smartwatches, and IoT devices. As the capabilities of mobile apps and the types of personal information required to run apps have diversified, the need for increased security has grown. In particular, Android apps are vulnerable to repackaging attacks, so various code protection techniques such as obfuscation and packing have been applied. However, apps protected with these techniques can also be disabled with static and dynamic analyses. In recent years, instead of using such application level protection techniques, a number of approaches have been adopted to monitor the behavior of apps at the platform level. However, in these cases, not only incompatibility of system software due to platform modification, but also self-control functionality cannot be provided at the user level and is very inconvenient. Therefore, in this paper we propose an app protection scheme that can split a part of the app code, store it in a separate IoT device, and self-control the split code through the partial app. In the proposed scheme, the partial app is executed only when it matches the split code stored in the IoT device. It does not require complicated encryption techniques to protect the code like the existing schemes. It also provides solutions to the parameter dependency and register reallocation issues that must be considered when implementing the proposed code splitting scheme. Finally, we present and analyze the results of experimenting the proposed scheme on real devices.


2019 ◽  
Vol 47 (2) ◽  
pp. 189-192 ◽  
Author(s):  
Harry E Smallbone ◽  
Thomas FE Drake-Brockman ◽  
Britta S von Ungern-Sternberg

Follow-up for ongoing management and monitoring of patients is important in clinical practice and research. While common, telephone follow-up is resource intensive and, in our experience, yields low success rates. Electronic communication using mobile devices including smartphones and tablets can provide efficient alternatives — including SMS (text), online forms and mobile apps. To assess attitudes towards electronic follow-up, we surveyed 642 parents and carers at Perth Children’s Hospital, targeting demographics, device ownership and attitudes towards electronic follow-up. Mobile phone ownership was effectively universal. Almost all respondents were happy to communicate electronically with the hospital. Promisingly, 93.2% of respondents were happy to receive follow-up SMSs from the hospital and 80.3% were happy to reply to SMS questions. There was less enthusiasm regarding other modalities, with 59.9% happy to use a website and 69.0% happy to use a mobile app. The results support the introduction of electronic communication for follow-up in our paediatric population.


SAGE Open ◽  
2020 ◽  
Vol 10 (3) ◽  
pp. 215824402093953 ◽  
Author(s):  
Syed Far Abid Hossain ◽  
Zhao Xi ◽  
Mohammad Nurunnabi ◽  
Khalid Hussain

The article analyzes the role of driving m-commerce with social networking and therefore provides insight into how the application of mobile apps influences customers’ perceptions on purchasing products online and on the mode of payment. The consumers are engaged in social interactions through the internet by the new opportunities provided by social media. These interactions provide and generate certain values for both businesses and consumers. An upsurge in the application of social media on mobile phones by users is evident, giving optimism and the ability to view the role of the integration of m-commerce into social media. Certain criteria like mobile app compatibility, trust, perceived value of mobile phone apps for online shopping, and online payment are examined from the point of view of consumers who purchase products, save purchase time, and provide easy use and security through social networking sites and m-commerce. Adoption of a digital mode of payment is affected by the education level of the consumers as, if they are internet savvy, they will be more inclined to use the digital payment mode. The article not only discusses the role of education in the better understanding of consumers toward the application of online modes of transaction through mobile phones, but also indicates that there are security issues, although these have been resolved to some extent by technological advances. Yet, there is need for the retailers as well as the consumers to achieve further technological progress.


Author(s):  
Zulfiqar Ali ◽  
Aiman M Ayyal Awwad ◽  
Wolfgang Slany

<p class="0abstract">The rapid advancement of mobile computing technology and the rising usage of mobile apps made our daily life more productive. The mobile app should operate all the time bug-free in order to improve user satisfaction and offers great business value to the end user. At the same time, smartphones are full of special features that make testing of apps more challenging. Actually, the quality is a must for successful applications and it cannot be achieved without testing and verification. In this paper, we present the Behavior Driven Development (BDD) methodology and Cucumber framework to automate regression testing of Android apps. Particularly, the proposed methods use the visual programming language for smartphones (Catrobat) as a reference. The Catrobat program scripts communicate via a broadcast mechanism. The objective is to test the broadcast mechanism from different angles and track regression errors as well as specify and diagnose bugs with the help of executable specifications. The results show that the methods are able to effectively reveal deficiencies in the broadcast mechanism, and ensure that the app matches all expectations and needs of end users.</p>


Now a days most of the persons doing their banking transactions, bill payments online through mobile app or web. Almost all the financial institutions are providing second layer of authentication by providing one time password while online transactions. But one the other hand in almost every mobile applications have the features to read your contacts, your locations, your messages not only read but they have the features to write the massages, write the contacts in your contacts list. Are these features really helps us? Are they really for our time saving? In this research article we will see the dark side of these features of our mobile applications.


2022 ◽  
pp. 026461962110673
Author(s):  
Yogendra Pandey ◽  
Jaehoon Lee ◽  
Devender R Banda ◽  
Nora Griffin-Shirley ◽  
The Nguyen ◽  
...  

Mobile phones/devices are an important part of our daily lives for sighted people and those with visual impairment (VI) in India. This study explores how Indian university students use and perceive mobile apps and identify the challenges in their usage. A paper-based survey was administered for 124 college students who were legally blind. The survey had items relating to sociodemographic information, use of mobile devices and apps, and the use of apps specifically designed for persons with VI. Results show that, on average, the participants with VI have been using a mobile device for more than 5 years. Many participants used Android devices and free apps. In addition, they found that the mobile apps were user-friendly and accessible. Results also found that Facebook and WhatsApp are more frequently used. Participants had a high level of self-efficacy and positive attitudes toward special apps for VI. Android devices are popular in India because of lower cost compared to iOS devices. Results are discussed, and implications for practice are provided.


Author(s):  
Ashish Bijlani ◽  
Umakishore Ramachandran ◽  
Roy Campbell

This work presents the first-ever detailed and large-scale measurement analysis of storage consumption behavior of applications (apps) on smart mobile devices. We start by carrying out a five-year longitudinal static analysis of millions of Android apps to study the increase in their sizes over time and identify various sources of app storage consumption. Our study reveals that mobile apps have evolved as large monolithic packages that are packed with features to monetize/engage users and optimized for performance at the cost of redundant storage consumption. We also carry out a mobile storage usage study with 140 Android participants. We built and deployed a lightweight context-aware storage tracing tool, called cosmos, on each participant's device. Leveraging the traces from our user study, we show that only a small fraction of apps/features are actively used and usage is correlated to user context. Our findings suggest a high degree of app feature bloat and unused functionality, which leads to inefficient use of storage. Furthermore, we found that apps are not constrained by storage quota limits, and developers freely abuse persistent storage by frequently caching data, creating debug logs, user analytics, and downloading advertisements as needed. Finally, drawing upon our findings, we discuss the need for efficient mobile storage management, and propose an elastic storage design to reclaim storage space when unused. We further identify research challenges and quantify expected storage savings from such a design. We believe our findings will be valuable to the storage research community as well as mobile app developers.


2021 ◽  
Vol 36 (1) ◽  
pp. 525-533
Author(s):  
Ahmad Asyraf Rosli ◽  
Muhammad Rusydi Muhammad Razif ◽  
Omar Abu Hassan ◽  
Nor Shahida Mohd Shah ◽  
Ili Najaa Aimi Mohd Nordin ◽  
...  

The Internet of Things (IoT) with its enormous growth widens its applications to the living environment of the people by changing a home to a smart home. The smart home is a system, which connect homes with various types of digital devices to communicate with each other through the internet. Based on our prior study, 59% of the respondent among Malaysians are unaware about the IoT or just heard about it without knowing its concept. Thus, this project will present a development of a smart home system based on mobile apps control using IoT to educate Malaysian. This project uses a combination of wireless technology and infrared sensor to detect the motion and a microcontroller to control the usage of appliances in the home. Blynk as a mobile app has been programmed and used to control and display the usage of LED, fan and camera. The output of the appliances will be displayed on the Blynk in kind of LED icon and stream video. The IoT system has been successfully developed and able to follow the instruction given. The LED, fan and camera will turn ON when the switch button in Blynk is pressed. The system has a limited range of operation because it depends on the Wi-Fi signal range, which is about 50 meters of the developed smart home using IoT control. The proposed smart home prototype is useful in the education sector to expose all Malaysian to the current technology especially students and staffs in the university.


2020 ◽  
Vol 8 (2) ◽  
pp. 10-19
Author(s):  
Zon Nyein Nway

Nowadays, almost all the users use Android applications in their smart phones for various reasons Since Android is free operating system, android-apps can be easily downloaded via biggest open app stores and third-party mobile app markets. But these applications were not guaranteed whether these are malware apps or not by legitimate organizations. As mobile phones are glued with most of the people, malware applications threaten all of them for their private information. So, the work of analysis for the apps is very important. The proposed system analyzes the correlation patterns of app’s permissions that must be used in all android apps by developers by using a statistical technique called singular value decomposition (SVD). The analysis phase uses the numbers of malware samples 50 to 300 from https://www.kaggle.com/goorax/static-analysis-of-android-malware-of-2017. The proposed system evaluates the risk level (High, Medium, and Low) of Android applications based on the correlation patterns of permissions. The system accuracy is 85% for both malware and goodware applications. Nowadays, almost all the users use Android applications in their smart phones for various reasons Since Android is free operating system, android-apps can be easily downloaded via biggest open app stores and third-party mobile app markets. But these applications were not guaranteed whether these are malware apps or not by legitimate organizations. As mobile phones are glued with most of the people, malware applications threaten all of them for their private information. So, the work of analysis for the apps is very important. The proposed system analyzes the correlation patterns of app’s permissions that must be used in all android apps by developers by using a statistical technique called singular value decomposition (SVD). The analysis phase uses the numbers of malware samples 50 to 300 from https://www.kaggle.com/goorax/static-analysis-of-android-malware-of-2017. The proposed system evaluates the risk level (High, Medium, and Low) of Android applications based on the correlation patterns of permissions. The system accuracy is 85% for both malware and goodware applications.


Sign in / Sign up

Export Citation Format

Share Document