To see the other types of publications on this topic, follow the link: APP PERMISSION.

Dissertations / Theses on the topic 'APP PERMISSION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 15 dissertations / theses for your research on the topic 'APP PERMISSION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rustgi, Pulkit. "The Evaluation of an Android Permission Management System Based on Crowdsourcing." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6033.

Full text
Abstract:
Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a c
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Can. "Revisiting the Evolution of Android Permissions." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535377084768501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Almuhimedi, Hazim. "Helping Smartphone Users Manage their Privacy through Nudges." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1103.

Full text
Abstract:
The two major smartphone platforms (Android and iOS) have more than two mil- lion mobile applications (apps) available from their respective app stores, and each store has seen more than 50 billion apps downloaded. Although apps provide desired functionality by accessing users’ personal information, they also access personal information for other purposes (e.g., advertising or profiling) that users may or may not desire. Users can exercise control over how apps access their personal information through permission managers. However, a permission manager alone might not be sufficient to help use
APA, Harvard, Vancouver, ISO, and other styles
5

Dahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.

Full text
Abstract:
The Android OS is ever growing on the global market, reaching more and more people. This have led to the distribution of millions of applications, that the Android user can interact with. However, the usage of Android apps is not risk free and there are various methods deployed by Google Play to protect the privacy of the Android owner. One of these protective measures are permissions. However, as permissions are controlled by the user, there is a need of comprehending the user behaviour and attitude to the permissions. Lack of understanding the importance, and of the permission itself, could
APA, Harvard, Vancouver, ISO, and other styles
6

Su, Shu-Miaw. "English planning permission and Taiwanese development permission : the relevant measures of planning permission - a lesson from English experience." Thesis, University College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sagar, Shraddha. "PREDICTION OF PROTECTED-PERMISSIVE LEFT-TURN PHASING CRASHES BASED ON CONFLICT ANALYSIS." UKnowledge, 2017. https://uknowledge.uky.edu/ce_etds/60.

Full text
Abstract:
Left-turning maneuvers are considered to be the highest risk movements at intersections and two-thirds of the crashes associated with left-turns are reported at signalized intersections. Left-turning vehicles typically encounter conflicts from opposing through traffic. To separate conflicting movements, transportation agencies use a protected-only phase at signalized intersections where each movement is allowed to move alone. However, this could create delays and thus the concept of a protected-permissive phase has been introduced to balance safety and delays. However, the permissive part of t
APA, Harvard, Vancouver, ISO, and other styles
8

Jamil, Eva, and Mazdak Shirazi. "Spelar behörighetskrav någon roll? : En kvantitativ studie av Android användares beteende och förståelse." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12225.

Full text
Abstract:
Problem - Android är det ledande operativsystemet på marknaden, samtidigt har tidigare forskning påvisat att skadlig kod och mobila attacker främst har riktats mot Androidenheter. Attacker utförs genom att applikationer som innehar skadlig kod, får den åtkomst på enheten som de begär genom att applikationsbehörigheter godkänns av användaren före installation av en applikation. Ett stort problem är att användarna i dagsläget väljer att ignorera behörigheterna före installation samt inte förstår dess betydelse. Frågeställning och syfte - Studien syftar till att undersöka tre frågeställningar. De
APA, Harvard, Vancouver, ISO, and other styles
9

RAWAL, PRAVEEN SINGH. "APP PERMISSION CLASSIFICATION : STATIC AND DYNAMIC METHODS." Thesis, 2023. http://dspace.dtu.ac.in:8080/jspui/handle/repository/20424.

Full text
Abstract:
It is no secret that Android is one of the most widely used smartphone operating systems globally, boasting a staggering 2.5 billion active users. However, data secu¬rity has become a crucial aspect of smartphone usage with the increasing reliance on smartphones to store sensitive personal information. Unfortunately, many apps tend to collect user data without the user's knowledge or consent, which can harm data security. To counter this, Android has included an inbuilt security feature called app permission to enable users to control app access. This feature enables users to grant or decline
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Min-Xun, and 吳旻訓. "Understanding the Impacts of Permission Requested on Mobile App Adoption." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/ykzfa4.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊管理學系研究所<br>102<br>Because of the expanding of smartphones, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to provide various functions for users. However, Apps might request more permissions than they need. Users have to grant permissions requested by Apps before downloading Apps. The purpose of this study is understanding the impacts of permissions on users&apos;&apos; intention to download mobile Apps. We proposed the concept of &;quot;permission-function fit (PFF)&;quot;, and included perceived pr
APA, Harvard, Vancouver, ISO, and other styles
11

Chen, Shu-Hsuan, and 陳書玄. "Investigate the Impact of “From Free to Fee” and Permission Marketing on the Consumers'' Intention to Download App." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/89203982834071378354.

Full text
Abstract:
碩士<br>國立高雄第一科技大學<br>行銷與流通管理研究所<br>103<br>The study aims to investigate the impact of “from free to fee” and permission marketing on App download intention. In order to avoid the interference comes from other external factors, the two factors between-subject design were used, and conducted as 2(from free to fee: free and fee) ×2(permission levels: high and low). There are 146 subjects to attend the experiment, include 66 males and 80 females. Additionally, we employ “from free to fee” (i.e. free to fee and fee to free) to be a between-subject experiment design which generates two situations who
APA, Harvard, Vancouver, ISO, and other styles
12

Chen, KAI-JUN, and 陳凱軍. "Android Malware Detection Based on API and Permission." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/35zus5.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊工程系<br>107<br>The increasing number of malicious APKs and the evolution of related technologies and advances in attack techniques have led to many types of malicious behaviors, such as Trojans, SMS, advertising software, etc., bring about a serious threat to mobile device users. According to the GDATA survey of German security operators [22], the number of new Android malicious APKs was 3 million in 2017; and the number of new Android malicious APKs found was 3.18 million until the third quarter in 2018. It is imperative to detect if the APK contains malicious behavior. The
APA, Harvard, Vancouver, ISO, and other styles
13

KUMAR, NIRAJ. "ANDROID APP REPACKAGING DETECTION USING SIGNING CERTIFICATE AND PERMISSIONS COMPARISON." Thesis, 2018. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19109.

Full text
Abstract:
Android eco system works in two steps as far as an application developer is concerned. In the first step, developers design and develop an Android app and subsequently publish it on Google Play Store either as paid apps or with some advertisements to earn monetary benefit or sometimes as free app just for building user base. Besides the bona fide Android ecosystem, there is a parallel dark world of malicious attackers who repackage other developer's application (Free apps available in Play Store or other app stores) and publish it with their own name. Alternatively, they add advert
APA, Harvard, Vancouver, ISO, and other styles
14

Hour, Kai-Jong, and 侯凱中. "Explore the user permissions to the APP application perceived risks and impact on the willingness to use-a case of Google Android APP." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7fgnbx.

Full text
Abstract:
碩士<br>嶺東科技大學<br>資訊管理系碩士班<br>103<br>The reason of studying this research plan is due to the APP of smart mobile devices recently have begun to cause security and privacy problems, it also leads to a fraudulent social phenomenon. In order to understand users’ intention before installing APP when the decleard screem pop up to request the using device permission, whether users have the perceived risk to determine that the using device permission is appropriate, and the impact of the perceived risk on follow-up users’ willingness to install. Therefore, this research plan studing participants are us
APA, Harvard, Vancouver, ISO, and other styles
15

Trudeau, Dominique. "Expression and persistence of Microplitis demolitor polydna virus in permissive and non-permissive hosts of the Braconid wasp, Microplitis demolitor." 1998. http://catalog.hathitrust.org/api/volumes/oclc/40674158.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!