4.6 Article

Privacy Assessment in Android Apps: A Systematic Mapping Study

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

Android security assessment: A review, taxonomy and research gap study

Shivi Garg et al.

Summary: Security threats are escalating exponentially, especially to mobile platforms like Android. While significant research progress has been made in Android security, challenges and gaps still exist. This paper presents a comprehensive taxonomy to review state-of-the-art approaches used in Android security.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Mobile app privacy in software engineering research: A systematic mapping study

Fahimeh Ebrahimi et al.

Summary: The study finds that the existing literature can be categorized into privacy policy, requirements, user perspective, and leak detection. There is an imbalance in the research focus, with a majority of studies concentrating on proposing tools for detecting privacy leaks, while fewer studies target privacy requirements and policies, and even fewer focus on user perspective.

INFORMATION AND SOFTWARE TECHNOLOGY (2021)

Article Computer Science, Information Systems

GDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps

Danny S. Guaman et al.

Summary: The widespread use of Android mobile applications results in global collection and sharing of personal data, with European data protection regulations requiring equivalent protection regardless of location. A study found that a significant percentage of Android apps had issues with disclosure of cross-border transfers.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A Systematic Mapping Study on Software Quality Control Techniques for Assessing Privacy in Information Systems

Danny S. Guaman et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

A Systematic Literature Review of Android Malware Detection Using Static Analysis

Ya Pan et al.

IEEE ACCESS (2020)

Review Computer Science, Information Systems

A Review of Android Malware Detection Approaches Based on Machine Learning

Kaijun Liu et al.

IEEE ACCESS (2020)

Review Computer Science, Hardware & Architecture

Automated Testing of Android Apps: A Systematic Literature Review

Pingfan Kong et al.

IEEE TRANSACTIONS ON RELIABILITY (2019)

Article Computer Science, Software Engineering

A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software

Alireza Sadeghi et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2017)

Review Computer Science, Information Systems

Static analysis of android apps: A systematic literature review

Li Li et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2017)

Review Computer Science, Software Engineering

Analyzing and automatically labelling the types of user issues that are raised in mobile app reviews

Stuart McIlroy et al.

EMPIRICAL SOFTWARE ENGINEERING (2016)

Article Computer Science, Information Systems

Guidelines for conducting systematic mapping studies in software engineering: An update

Kai Petersen et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2015)

Article Computer Science, Interdisciplinary Applications

What is the best database for computer science journal articles?

Antonio Cavacini

SCIENTOMETRICS (2015)

Proceedings Paper Computer Science, Software Engineering

Composite Constant Propagation: Application to Android Inter-Component Communication Analysis

Damien Octeau et al.

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)

Proceedings Paper Computer Science, Software Engineering

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps

Li Li et al.

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1 (2015)

Proceedings Paper Engineering, Electrical & Electronic

Protection Goals for Privacy Engineering

Marit Hansen et al.

2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW) (2015)

Editorial Material Computer Science, Hardware & Architecture

Can You Engineer Privacy?

Seda Gurses

COMMUNICATIONS OF THE ACM (2014)

Article Computer Science, Information Systems

Requirements engineering paper classification and evaluation criteria: a proposal and a discussion

R Wieringa et al.

REQUIREMENTS ENGINEERING (2006)