ABSTRACT
Android's permission system is intended to inform users about the risks of installing applications. When a user installs an application, he or she has the opportunity to review the application's permission requests and cancel the installation if the permissions are excessive or objectionable. We examine whether the Android permission system is effective at warning users. In particular, we evaluate whether Android users pay attention to, understand, and act on permission information during installation. We performed two usability studies: an Internet survey of 308 Android users, and a laboratory study wherein we interviewed and observed 25 Android users. Study participants displayed low attention and comprehension rates: both the Internet survey and laboratory study found that 17% of participants paid attention to permissions during installation, and only 3% of Internet survey respondents could correctly answer all three permission comprehension questions. This indicates that current Android permission warnings do not help most users make correct security decisions. However, a notable minority of users demonstrated both awareness of permission warnings and reasonable rates of comprehension. We present recommendations for improving user attention and comprehension, as well as identify open challenges.
- AdMob Mobile Metrics Report. AdMob Blog, 2010.Google Scholar
- How Consumers Interact with Mobile App Advertising. Harris Interactive Survey, December 2011.Google Scholar
- M. Ackerman, L. Cranor, and J. Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the ACM Conference on Electronic Commerce, 1999. Google ScholarDigital Library
- A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Electronic Commerce Conference (ACM EC), 2004. Google ScholarDigital Library
- Android Open Source Project. Android Security Overview, 2012.Google Scholar
- L. Barkhuus and A. Dey. Location-based services for mobile telephony: a study of users' privacy concerns. In Proceedings of the International Conference on Human-Computer Interaction, 2003.Google Scholar
- J. R. Bettman. An Information Processing Theory of Consumer Choice. Addison-Wesley Publishing Company, 1979.Google Scholar
- N. J. Blunch. Position Bias in Multiple-Choice Questions. Journal of Marketing Research, 1984.Google Scholar
- T. Buchanan, C. Paine, A. N. Joinson, and U.-D. Reips. Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 2007. Google ScholarDigital Library
- S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2005. Google ScholarDigital Library
- L. F. Cranor. A Framework for Reasoning about the Human in the Loop. In Proceedings of the Conference on Usability, Psychology, and Security. USENIX Association, 2008. Google ScholarDigital Library
- S. Egelman, L. F. Cranor, and J. Hong. You've Been Warned: An empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2008. Google ScholarDigital Library
- W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), 2010. Google ScholarDigital Library
- W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application security. In Proceedings of the USENIX Security Symposium, 2011. Google ScholarDigital Library
- W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2009. Google ScholarDigital Library
- A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android Permissions Demystified. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2011. Google ScholarDigital Library
- A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A Survey of Mobile Malware in the Wild. In Proceedings of the ACM Workshop on Security and Privacy in Mobile Devices (SPSM), 2011. Google ScholarDigital Library
- A. P. Felt, K. Greenwood, and D. Wagner. The Effectiveness of Application Permissions. In Proceedings of the USENIX Conference on Web Application Development (WebApps), 2011. Google ScholarDigital Library
- A. Fuchs, A. Chaudhuri, and J. Foster. SCanDroid: Automated Security Certification of Android Applications. Technical report, University of Maryland, 2009.Google Scholar
- G. J. Gaeth and J. Shanteau. Reducing the Influence of Irrelevant Information on Experienced Decision Makers. Organizational Behavior and Human Performance, 33, 1984.Google Scholar
- P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data From Imperious Applications. In Proceedings of the ACM Conference on Computer and Communication Security, 2011. Google ScholarDigital Library
- J. Howell and S. Schechter. What you see is what they get. In Proceedings of the IEEE Workshop on Web 2.0 Security and Privacy (W2SP), 2010.Google Scholar
- C. Jensen, C. Potts, and C. Jensen. Privacy practices of Internet users: Self-reports versus observed behavior. In International Journal of Human-Computer Studies, 2005. Google ScholarDigital Library
- P. Kelley, M. Benisch, L. Cranor, and N. Sadeh. When are users comfortable sharing locations with advertisers? In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2011. Google ScholarDigital Library
- P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A Conundrum of Permissions: Installng Applications on an Android Smartphone. In Proceedings of the Workshop on Usable Security (USEC), 2012.Google ScholarDigital Library
- J. King, A. Lampinen, and A. Smolen. Privacy: Is There An App for That? In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2011. Google ScholarDigital Library
- P. Kumaraguru and L. F. Cranor. Privacy Indexes: A Survey of Westin's Studies. Technical report, Carnegie Mellon University CMU-ISRI-5-138, 2015.Google Scholar
- R. Leung, L. Findlater, J. McGrenere, P. Graf, and J. Yang. Multi-Layered Interfaces to Improve Older Adults' Initial Learnability of Mobile Applications. ACM Transactions on Accessible Computing (TACCESS), 2010. Google ScholarDigital Library
- J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. I'm the mayor of my house: examining why people use Foursquare - a social-driven location sharing application. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, 2011. Google ScholarDigital Library
- W. A. Magat, W. K. Viscusi, and J. Huber. Consumer Processing of Hazard Warning Information. Journal of Risk and Uncertainty, 1, 1988.Google Scholar
- S. Motiee, K. Hawkey, and K. Beznosov. Do windows users follow the principle of least privilege?: investigating user account control practices. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2010. Google ScholarDigital Library
- K. Mueller and K. Butler. Flex-P: Flexible Android Permissions. IEEE Symposium on Security and Privacy, Poster Session, 2011.Google Scholar
- M. Nauman, S. Khan, M. Alam, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2010. Google ScholarDigital Library
- P. Nickinson. Android Market now has more than a quarter-million applications, 2011.Google Scholar
- F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. Wang, and C. Cowan. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. In Proceedings of the IEEE Conference on Security and Privacy, 2012. Google ScholarDigital Library
- N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 2009. Google ScholarDigital Library
- S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The Emperor's New Security Indicators. In Proceedings of the IEEE Symposium on Security and Privacy, 2007. Google ScholarDigital Library
- S. Sen and D. Lerman. Why are you telling me this? An examination into negative consumer reviews on the web. Journal of Interactive Marketing, 21, 2007.Google Scholar
- B. Shneiderman. Promoting universal usability with multi-layer interface design. In Proceedings of the Conference on Universal Usability (CUU), 2003. Google ScholarDigital Library
- J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the USENIX Security Symposium, 2009. Google ScholarDigital Library
- J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the USENIX Security Symposium, 2009. Google ScholarDigital Library
- H. Taylor. Most People are "Privacy Pragmatists" Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits. Harris Interactive, March 2003.Google Scholar
- S. Thurm and Y. I. Kane. Your apps are watching you, 2010.Google Scholar
- M. S. Wogalter. Communication-Human Information Processing (C-HIP) Model. In Handbook of Warnings. Lawrence Erlbaum Associates, 2006.Google ScholarCross Ref
- M. S. Wogalter. Purpose and scope of warnings. In Handbook of Warnings. Lawrence Erlbaum Associates, 2006.Google ScholarCross Ref
- Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012.Google Scholar
- F. Zhu and X. Zhang. Impact of Online Consumer Reviews on Sales: The Moderating Role of Product and Consumer Characteristics. Journal of Marketing, 74, 2010.Google Scholar
Index Terms
- Android permissions: user attention, comprehension, and behavior
Recommendations
Android permissions demystified
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityAndroid provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. ...
Android: Changing the Mobile Landscape
The mobile phone landscape changed last year with the introduction of smart phones running Android, a platform marketed by Google. Android phones are the first credible threat to the iPhone market. Not only did Google target the same consumers as iPhone,...
A bundle protocol implementation for android devices
Mobicom '12: Proceedings of the 18th annual international conference on Mobile computing and networkingIn this demo we present IBR-DTN for Android: IBR-DTN is a fully featured RFC5050 compliant Bundle Protocol implementation that can run on un-rooted Android devices starting from Android Version 2.3 (Gingerbread). IBR-DTN for Android supports all ...
Comments