Assessing factors influencing consumers' non-adoption intention: exploring the dark sides of mobile payment

RK Behera, PK Bala, NP Rana - Information Technology & People, 2023 - emerald.com
Purpose The new ways to complete financial transactions have been developed by setting
up mobile payment (m-payment) platforms and such platforms to access banking in the …

Notice the imposter! a study on user tag spoofing attack in mobile apps

S Li, Z Yang, G Yang, H Zhang, N Hua… - 32nd USENIX Security …, 2023 - usenix.org
Recent years have witnessed the rapid development of mobile services, spanning almost
every field. To characterize users and provide personalized and targeted services, user tag …

A small leak will sink many ships: Vulnerabilities related to mini-programs permissions

J Zhang, L Yang, Y Han, Z Xiang… - 2023 IEEE 47th Annual …, 2023 - ieeexplore.ieee.org
As a new format of mobile application, mini-programs, which function within a larger app and
are built with HTML, CSS, and JavaScript web technology, have become the way to do …

Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators

Y Zhang, R Vardhan, P Chinprutthiwong… - Proceedings of the 2023 …, 2023 - dl.acm.org
Amazon Alexa's booming third-party skill market has grown from 160 to 100,000 skills within
three years. In this work, we make the first effort in demystifying the Alexa skill permission …

Privacy and Ethics in a Smart City: Towards Attaining Digital Sovereignty

N Momen - Cybersecurity for Smart Cities: Practices and …, 2023 - Springer
Many of today's and tomorrow's smart cities will rely upon services and distributed systems
that will apply machine learning and artificial intelligence in their operational logic. These …

Investigating Software Developer'Challenges for Android Permissions in Stack Overflow

SJ Oishwee, N Stakhanova… - Available at SSRN …, 2023 - papers.ssrn.com
The Android permission system is a set of controls to regulate access to sensitive data and
resources (eg, camera). The fast evolving nature of Android permissions, coupled with …

[PDF][PDF] A systematic approach to prioritize vulnerabilities in iot deployments

O Alrawi - 2023 - alrawi.io
To my fellow lab mates, Chaz, Gong, Kevin V, Panos, Rosa, Thanos1, Thanos2, Thomas,
Yizheng, and Zane, thank you for your support and camaraderie. A special thanks to Chaz …

Comparative Analysis of Feature Selection Methods for Detection of Android Malware

M Dhalaria, E Gandotra, D Gupta - … of Deep Learning and Internet of …, 2023 - igi-global.com
Over the past few years, Android has been found to be the most prevalent operating system.
The increase in the adoption of Android by users has led to many security issues. The …

Regulatory technologies for the study of data and platform power in the app economy

K Kollnig - 2023 - ora.ox.ac.uk
Tracking, the large-scale collection of data about user behaviour, is commonplace in mobile
apps. While some see tracking as a necessary evil to making apps available at lower prices …

Data Extraction, Attacks and Protection on Android Clipboard

PK Tiwari - 2023 International Conference on Advances in …, 2023 - ieeexplore.ieee.org
The Android clipboard acts as a buffer storage space for storing and enabling user's
convenience for data transfer between multiple applications. However, this utility becomes …