Abstract
Android is used as an operating system by a vast range of devices such as mobile phones, tablets, TV sets, watches, etc., providing users with a collection of android applications to, carry through, their daily needs. Android security has been built upon a “Permission-based mechanism”, which gives access to the critical information, of an Android device to an application, and often does not allow the user to understand the privacy implications of those accepted permissions. User’s overriding desire to complete the primary task to install an Android application reduces their attention to the installation-time permission requests. This study on Android applications will help the users to gain better understanding of the required and used permissions in Android environment, giving them a preferable user control to effectively maintain confidentiality, integrity, availability, security, and privacy of user’s data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.