{"id":"https://openalex.org/W1912883369","doi":"https://doi.org/10.1108/ics-10-2014-0071","title":"Reengineering the user: privacy concerns about personal data on smartphones","display_name":"Reengineering the user: privacy concerns about personal data on smartphones","publication_year":2015,"publication_date":"2015-10-12","ids":{"openalex":"https://openalex.org/W1912883369","doi":"https://doi.org/10.1108/ics-10-2014-0071","mag":"1912883369"},"language":"en","primary_location":{"id":"doi:10.1108/ics-10-2014-0071","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-10-2014-0071","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025141413","display_name":"Matina Tsavli","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Matina Tsavli","raw_affiliation_strings":["Department of Digital Systems, University of Piraeus, Piraeus, Greece","Department of Digital Systems, University of Piraeus,Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]},{"raw_affiliation_string":"Department of Digital Systems, University of Piraeus,Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047660023","display_name":"Pavlos S. Efraimidis","orcid":"https://orcid.org/0000-0003-3749-0165"},"institutions":[{"id":"https://openalex.org/I147962203","display_name":"Democritus University of Thrace","ror":"https://ror.org/03bfqnx40","country_code":"GR","type":"education","lineage":["https://openalex.org/I147962203"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Pavlos S. Efraimidis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece","Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece","institution_ids":["https://openalex.org/I147962203"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi, Greece","institution_ids":["https://openalex.org/I147962203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037619435","display_name":"Vasilios Katos","orcid":"https://orcid.org/0000-0001-6132-3004"},"institutions":[{"id":"https://openalex.org/I147962203","display_name":"Democritus University of Thrace","ror":"https://ror.org/03bfqnx40","country_code":"GR","type":"education","lineage":["https://openalex.org/I147962203"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Vasilios Katos","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece","Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi, Greece","institution_ids":["https://openalex.org/I147962203"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering Democritus University of Thrace Xanthi, Greece","institution_ids":["https://openalex.org/I147962203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008534182","display_name":"Lilian Mitrou","orcid":"https://orcid.org/0000-0001-7149-5053"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Lilian Mitrou","raw_affiliation_strings":["Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece","Department of Information and Communication Systems Engineering University of the Aegean Samos Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"Department of Information and Communication Systems Engineering University of the Aegean Samos Greece","institution_ids":["https://openalex.org/I98805295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025141413"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":null,"apc_paid":null,"fwci":1.4359,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.81657046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"23","issue":"4","first_page":"394","last_page":"405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.7651772499084473},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6937425136566162},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6360701322555542},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.578813910484314},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5567923784255981},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.516836941242218},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.45488882064819336},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.44418519735336304},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4235365092754364}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.7651772499084473},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6937425136566162},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6360701322555542},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.578813910484314},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5567923784255981},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.516836941242218},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.45488882064819336},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.44418519735336304},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4235365092754364},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-10-2014-0071","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-10-2014-0071","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W12003480","https://openalex.org/W72228273","https://openalex.org/W1945137593","https://openalex.org/W1963971515","https://openalex.org/W2012927760","https://openalex.org/W2033811191","https://openalex.org/W2069101457","https://openalex.org/W2081436185","https://openalex.org/W2092712591","https://openalex.org/W2123437505","https://openalex.org/W2126242334","https://openalex.org/W2156744053","https://openalex.org/W3121605184","https://openalex.org/W4254194321","https://openalex.org/W4399339983"],"related_works":["https://openalex.org/W1981999315","https://openalex.org/W2057929437","https://openalex.org/W366415247","https://openalex.org/W2940924828","https://openalex.org/W2002090901","https://openalex.org/W1995370140","https://openalex.org/W2755037920","https://openalex.org/W2172861410","https://openalex.org/W2135211349","https://openalex.org/W4308824859"],"abstract_inverted_index":{"Purpose":[0],"\u2013":[1,35,73,137,186,213,244],"This":[2,245],"paper":[3,219,246],"aims":[4],"to":[5,85,163,168,178,235,267,284,286],"discuss":[6],"the":[7,16,20,39,48,51,65,111,124,147,170,181,200,223,251,280],"privacy":[8,69,128,176,204],"and":[9,50,58,126,173,202,231,269,276,288],"security":[10],"concerns":[11,129,177,205],"that":[12,28,120],"have":[13,29,262],"risen":[14],"from":[15,46,239],"permissions":[17,252],"model":[18],"in":[19,154,190,195,217,259],"Android":[21],"operating":[22,100,156,256],"system,":[23],"along":[24],"with":[25],"two":[26,248],"shortcomings":[27,249],"not":[30,103,263],"been":[31,264],"adequately":[32,265],"addressed.":[33],"Design/methodology/approach":[34],"The":[36,74,138,158,187,214],"impact":[37],"of":[38,43,54,62,67,76,88,108,130,132,146,206,208,225,250,254,279],"applications\u2019":[40],"evolutionary":[41],"increment":[42],"permission":[44,149],"requests":[45],"both":[47],"user\u2019s":[49,112,171],"developer\u2019s":[52],"point":[53],"view":[55],"is":[56,70,91,162],"studied,":[57],"finally,":[59],"a":[60,165],"series":[61],"remedies":[63],"against":[64],"erosion":[66],"users\u2019":[68,293],"proposed.":[71],"Findings":[72],"results":[75],"this":[77,191,218],"work":[78],"indicate":[79],"that,":[80],"even":[81],"though":[82],"providing":[83],"access":[84],"personal":[86,113,229],"data":[87,230],"smartphone":[89,99],"users":[90,131,207,226],"by":[92],"definition":[93],"neither":[94],"problematic":[95],"nor":[96],"unlawful,":[97],"today\u2019s":[98],"systems":[101,257],"do":[102],"provide":[104],"an":[105,144,271],"adequate":[106],"level":[107],"protection":[109],"for":[110,274],"data.":[114],"However,":[115],"there":[116],"are":[117],"several":[118],"ideas":[119],"can":[121],"significantly":[122,198],"improve":[123,199,232],"situation":[125,201],"mitigate":[127,203],"smart":[133,209],"devices.":[134,210],"Research":[135],"limitations/implications":[136],"proposed":[139,188,216],"approach":[140],"was":[141],"evaluated":[142],"through":[143],"examination":[145],"Android\u2019s":[148],"model,":[150],"although":[151],"issues":[152],"arise":[153],"other":[155,277],"systems.":[157],"authors\u2019":[159,260],"future":[160],"intention":[161],"conduct":[164],"user":[166],"study":[167],"measure":[169],"awareness":[172],"concepts":[174],"surrounding":[175],"empirically":[179],"investigate":[180],"above-mentioned":[182],"suggestions.":[183],"Practical":[184],"implications":[185,212],"suggestions":[189],"paper,":[192],"if":[193],"adopted":[194],"practice,":[196],"could":[197],"Social":[211],"recommendations":[215],"would":[220],"strongly":[221],"enhance":[222],"control":[224],"over":[227],"their":[228,233],"ability":[234],"distinguish":[236],"legitimate":[237],"apps":[238,275],"malware":[240],"or":[241],"grayware.":[242],"Originality/value":[243],"emphasises":[247],"models":[253],"mobile":[255,281,292],"which,":[258],"view,":[261],"addressed":[266],"date":[268],"propose":[270],"inherent":[272],"way":[273],"entities":[278],"computing":[282],"ecosystem":[283],"commit":[285],"responsible":[287],"transparent":[289],"practices":[290],"on":[291],"privacy.":[294]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
