Review of Mobile Apps Permissions and Associated Intrusive Privacy Threats.
Akosua Boakyewaa TeyeEzer Osei Yeboah-BoatengPublished in: CoRR (2018)
Keyphrases
- mobile apps
- security issues
- privacy issues
- privacy policies
- security risks
- mobile applications
- privacy preserving
- personal information
- access control
- private information
- sensitive information
- information security
- privacy protection
- data security
- data management
- m learning
- data mining
- mobile learning
- software development