ANALYSIS OF DANGEROUS PERMISSION TYPES THE MOBILE APPLICATIONS

Main Article Content

Yangiboev Navruz Zufar ugli

Abstract

The research paper explores the risks associated with different types of permissions requested by mobile apps and comprehensively analyzes their implications. Also, by examining the various permissions required by mobile apps, the study sheds light on the security vulnerabilities and privacy issues faced by users. Through systematic assessment and categorization, the study identifies different levels of risk associated with different permission types, providing valuable insights for both developers and users. The research also aims to improve understanding of mobile app security practices and empower users to make informed decisions about app permissions. Ultimately, the article serves as an important resource for stakeholders seeking to mitigate risks and protect user privacy in the rapidly evolving mobile technology environment.

Article Details

How to Cite
Yangiboev Navruz Zufar ugli. (2024). ANALYSIS OF DANGEROUS PERMISSION TYPES THE MOBILE APPLICATIONS. Galaxy International Interdisciplinary Research Journal, 12(4), 417–421. Retrieved from https://internationaljournals.co.in/index.php/giirj/article/view/5487
Section
Articles

References

Mass, F. (2017) Coming off a Slow 2016, Smartphone Shipment Volume Expected to Recover in 2017 and Gain Momentum into 2018, According to IDC. (IDC) Worldwide Quarterly Mobile Phone Tracker.

Chen, L., McGrew, D. and Mitchell C. (2016) Security Standardisation Research. Springer International, New York.

https://doi.org/10.1007/978-3-319-49100-4

Carrascosa, I.P., Kalutarage, H.K. and Huang, Y. (2017) Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. Springer International Publishing, Cham.

https://doi.org/10.1007/978-3-319-59439-2

Doherty, J. (2016) Wireless and Mobile Device Security. Jones & Bartlett Learning, Burlington.

Elenkov, N. (2015) Android Security Internals: An In-Depth Guide to Android’s Security Architecture. No Starch Press, San Francisco.

Six, J. (2012) Application Security for the Android Platform. O‘Reilly Media, Sebastopol.

Android Developer (2017) Request App Permissions

https://developer.android.com/guide/topics/permissions/requesting.html

Pelet, J.-E. (2016) Mobile Platforms, Design, and Apps for Social Commerce. Advances in E-Business Research Series, IGI Global, New York.

Ayed, A.B. (2015) A Literature Review on Android Permission System. International Journal of Advanced Research in Computer Engineering & Technology, 4, 1520-1523.

Felt, A.P., Ha, E., Egelman, S. and Haney, A. (2012) Android Permissions: User Attention, Comprehension, and Behavior. Computer Science Department, University of California, Oakland, 1-14.

https://doi.org/10.1145/2335356.2335360