Abstract
This work compares Android and iPhone users according to their security and privacy awareness when handling apps. Based on an online survey conducted with over 700 German respondents (mostly university students) we found out that Android users seem to be more aware of the risks associated with the app usage than iPhone users. For example, iPhone users almost never consider the possibility of apps sending premium-rate SMS or causing other hidden costs. Furthermore, Android users more often mention security, trust and privacy issues as important factors when they decide to use a new app. We hypothesize that the cause of these differences they are likely to arise through differences in app market policies, in app review processes and in presentation of data usage by the apps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arthur, C., Dredge, S.: iOS v Android: Why Schmidt was wrong and developers still start on Apple (June 10, 2012), www.guardian.co.uk
Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012 (2012)
Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: SOUPS (2012)
Dediu, H.: Android economics: An introduction (April 2, 2012), www.asymco.com
Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Apllications. In: NDSS (2011)
Elmer-DeWitt, P.: 6 ways iPhone and Android users differ (February 25, 2010), tech.fortune.cnn.com
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: SPSM (2011)
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. In: SOUPS (2012)
Google: Protect against harmful apps (February 28, 2014), https://support.google.com/accounts/answer/2812853?hl=en
Han, J., Yan, Q., Gao, D., Zhou, J., Deng, R.H.: Comparing Mobile Privacy Protection through Cross-Platform Applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2013)
Kelley, P.G., Sadeh, L.F.C.N.: Privacy as part of the app decision-making process. In: ACM (2013)
Kelloway, E.K.: Using LISREL for Structural Equation Modeling. Sage, Thousand Oaks (1998)
King, J.: How Come I’m Allowing Strangers to Go Through My Phone?: Smart Phones and Privacy Expectations, under review (2012)
Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin’s studies. Tech. Rep. Paper 856, Carnegie Mellon University, Institute for Software Research (January 2005)
Leontiadis, I., Efstratiou, C., Picone, M., Mascolo, C.: Don’t kill my ads!: Balancing privacy in an ad-supported mobile application market. In: HotMobile (2012)
Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J.I., Zhang, J.: Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In: ACM UbiComp (2012), http://doi.acm.org/10.1145/2370216.2370290
Lipsman, A., Aquino, C.: 2013 Mobile Future in Focus (February 22, 2013), http://www.comscore.com
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15(4), 336–355 (2004)
Mayring, P.: Qualitative Inhaltsanalyse, 11th edn. Beltz Verlag (2010)
Mylonas, A., Gritzalis, D., Tsoumas, B., Apostolopoulos, T.: A qualitative metrics vector for the awareness of smartphone security users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2013. LNCS, vol. 8058, pp. 173–184. Springer, Heidelberg (2013)
Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security Awareness in Smartphone Platforms 34, 47–66 (2013)
Percoco, N.J., Schulte, S.: Adventures in bouncerland. In: Black Hat USA (2012)
Pötzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)
Raphael, J.: How Google’s Android security is about to get even smarter (February 27, 2014), http://blogs.computerworld.com/android/23590/google-android-security
Seriot, N.: iPhone Privacy. In: Black Hat USA (2010)
Sofos: Security threat report (2013), http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report
Spreitzenbarth, M., Freiling, F.: Android malware on the rise. Tech. Rep. CS-2012-04, University of Erlangen (April 2012)
Travlos, D.: Five Reasons Why Google Android versus Apple iOS Market Share Numbers Don’t Matter (August 22, 2012), http://www.forbes.com
Wang, T., Lu, K., Lu, L., Chung, S., Lee, W.: Jekyll on iOS: when benign apps become evil. Presented as Part of the 22nd USENIX Security Symposium, Washington D.C, USA (August 2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Reinfelder, L., Benenson, Z., Gassmann, F. (2014). Differences between Android and iPhone Users in Their Security and Privacy Awareness. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2014. Lecture Notes in Computer Science, vol 8647. Springer, Cham. https://doi.org/10.1007/978-3-319-09770-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-09770-1_14
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09769-5
Online ISBN: 978-3-319-09770-1
eBook Packages: Computer ScienceComputer Science (R0)