{"id":"https://openalex.org/W4288076265","doi":"https://doi.org/10.1145/2745802.2745819","title":"Analyzing confidentiality and privacy concerns","display_name":"Analyzing confidentiality and privacy concerns","publication_year":2015,"publication_date":"2015-04-27","ids":{"openalex":"https://openalex.org/W4288076265","doi":"https://doi.org/10.1145/2745802.2745819"},"language":"en","primary_location":{"id":"doi:10.1145/2745802.2745819","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2745802.2745819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011391821","display_name":"Sherlock A. Licorish","orcid":"https://orcid.org/0000-0001-7318-2421"},"institutions":[{"id":"https://openalex.org/I80281795","display_name":"University of Otago","ror":"https://ror.org/01jmxt844","country_code":"NZ","type":"education","lineage":["https://openalex.org/I80281795"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Sherlock A. Licorish","raw_affiliation_strings":["University of Otago, Dunedin, New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Otago, Dunedin, New Zealand","institution_ids":["https://openalex.org/I80281795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043958822","display_name":"Stephen G. MacDonell","orcid":"https://orcid.org/0000-0002-2231-6941"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Stephen G. MacDonell","raw_affiliation_strings":["Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009735281","display_name":"Tony Clear","orcid":"https://orcid.org/0000-0001-6985-5064"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Tony Clear","raw_affiliation_strings":["Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011391821"],"corresponding_institution_ids":["https://openalex.org/I80281795"],"apc_list":null,"apc_paid":null,"fwci":3.62846677,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.95032192,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12238","display_name":"Green IT and Sustainability","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.732752799987793},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.6624395847320557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6073830127716064},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5984944105148315},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.5765645503997803},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5309612154960632},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43863701820373535}],"concepts":[{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.732752799987793},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.6624395847320557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6073830127716064},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5984944105148315},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.5765645503997803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5309612154960632},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43863701820373535},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2745802.2745819","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2745802.2745819","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1966024199","https://openalex.org/W1966991026","https://openalex.org/W1992460156","https://openalex.org/W1993422118","https://openalex.org/W1995328894","https://openalex.org/W2011595288","https://openalex.org/W2022371098","https://openalex.org/W2069928740","https://openalex.org/W2082177508","https://openalex.org/W2100877102","https://openalex.org/W2116799040","https://openalex.org/W2142225512","https://openalex.org/W2153739469","https://openalex.org/W2154183829","https://openalex.org/W2154813515","https://openalex.org/W2155621631","https://openalex.org/W2163950848","https://openalex.org/W2171233501","https://openalex.org/W2799161684","https://openalex.org/W3128608526","https://openalex.org/W3150428451","https://openalex.org/W3164897799","https://openalex.org/W4288073915"],"related_works":["https://openalex.org/W2112141997","https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331"],"abstract_inverted_index":{"Context:":[0],"Post-release":[1],"user":[2,104,134],"feedback":[3,20],"plays":[4],"an":[5],"integral":[6],"role":[7],"in":[8,65,86,103,114,126],"improving":[9],"software":[10],"quality":[11],"and":[12,39,63,84,98,106,110,116,136,175],"informing":[13],"new":[14,155,176],"features.":[15],"Given":[16],"its":[17,48],"growing":[18],"importance,":[19],"concerning":[21],"security":[22,43,70,156,192,201],"enhancements":[23],"is":[24],"particularly":[25],"noteworthy.":[26],"In":[27],"considering":[28,93],"the":[29,37,87,99,196,207],"rapid":[30],"uptake":[31],"of":[32,41,95,101,214],"Android":[33,42,54,69,91,177],"we":[34],"have":[35],"examined":[36],"scale":[38],"severity":[40],"threats":[44],"as":[45],"reported":[46],"by":[47],"stakeholders.":[49,215],"Objective:":[50],"We":[51,73],"systematically":[52],"mine":[53],"issue":[55],"logs":[56],"to":[57,67,78,128,132,162,198],"derive":[58],"insights":[59],"into":[60],"stakeholder":[61,96,182],"perceptions":[62],"experiences":[64],"relation":[66],"certain":[68],"issues.":[71],"Method:":[72],"employed":[74],"contextual":[75],"analysis":[76],"techniques":[77],"study":[79],"issues":[80],"raised":[81,125],"regarding":[82],"confidentiality":[83,129],"privacy":[85,111,140],"last":[88],"three":[89],"major":[90],"releases,":[92],"covariance":[94],"comments,":[97],"level":[100],"consistency":[102],"preferences":[105,153],"priorities.":[107],"Results:":[108],"Confidentiality":[109],"concerns":[112,141],"varied":[113],"severity,":[115],"were":[117,142],"most":[118],"prevalent":[119],"over":[120],"Jelly":[121],"Bean":[122],"releases.":[123],"Issues":[124],"regard":[127],"related":[130],"mostly":[131],"access,":[133],"credentials":[135],"permission":[137],"management,":[138],"while":[139],"mainly":[143],"expressed":[144,151],"about":[145],"phone":[146],"locking.":[147],"Community":[148],"users":[149,188],"also":[150],"divergent":[152],"for":[154,172,210],"features,":[157],"ranging":[158],"from":[159],"more":[160],"relaxed":[161],"very":[163],"strict.":[164],"Conclusion:":[165],"Strategies":[166],"that":[167,186],"support":[168],"continuous":[169],"corrective":[170],"measures":[171],"both":[173],"old":[174],"releases":[178],"would":[179,205],"likely":[180],"maintain":[181],"confidence.":[183],"An":[184],"approach":[185],"provides":[187],"with":[189,195],"basic":[190],"default":[191],"settings,":[193],"but":[194],"power":[197],"configure":[199],"additional":[200],"features":[202],"if":[203],"desired,":[204],"provide":[206],"best":[208],"balance":[209],"Android's":[211],"wide":[212],"cohort":[213]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-07-28T00:00:00"}
