Open Access Open Access  Restricted Access Subscription Access

App Abuses: A Study of Increasing Risk in User's Adoption of Free Third-Party Mobile Apps in India


Affiliations
1 Amity Business School, Amity University, Lucknow, India
 

Technological risks are those that are genuinely new, which emerge from new technologies and processes. Developing risks are those that are not new, but whose manifestation and implications are emerging. Mobile malware is one such risk though it is relatively low, but with the emergence of free app, the diversity in data, technology and collaboration has also increased the threat of malicious apps (malware) and App vulnerabilities in the embedded processes of mobile phones, which leads to a deeper analysis. The Norton Report (2013), a global survey of end-users, showed that 38 percent of mobile users had already experienced mobile cybercrime. Mobile users are storing sensitive files online (52 percent), store work and personal information in the same online storage accounts (24 percent) and sharing logins and passwords with families (21 percent) and friends (18 percent), putting their data and their employers’ data at risk. Yet only 50 percent of these users take even basic security precautions. According to McAfee Labs threat report, June 2014 The Company has discovered a suspicious Android app, Android/BadInst. A, on the Google Play app store that automatically downloads, installs, and launches other apps without user permission, which is usually required when manually installing apps from Google Play. Because this confirmation procedure at installation plays a critical role in securing a mobile platform, allowing apps to skip this process poses a significant risk to device users, including the silent installation of more dangerous malware. Companies must recognize that fraud awareness, prevention and mitigation are everyday issues that need to be a permanent fixture on the organization’s agenda. Apps like WhatsApp must be vigilant in ensuring their compliance with regulatory and legal issues. But lack of user security awareness is the primary contributor to several harmful cyber threats. Consequently, the hardware, operating system and apps all affect the total security state of the device, and this risk increases when a user uses potentially old or insecure devices as to limited knowledge . Most android phones offer to keep user data on cloud. However, like most technology changes, cloud computing presents its share of risks and challenges, which are too often overlooked or not fully understood by people those are frequent to embrace it. As the free apps risk profile and threat landscape in the mobile app is rapidly increasing, People need to change their mindset and approach towards using mobile phone risk to mitigate the emerging risk of android platform. This study takes an in depth look at the risks associated with third party free apps as an example of mobile app risk and suggests credible models so that risk appetites can be aligned with the exposures being faced.

Keywords

Cloud Computing, Legal Issues, Mobile Apps, Security, Technology.
User
Notifications
Font Size

  • Debatin, B., Lovejoy J., Horn A., and Hughes B. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15(1), 83-108.
  • Facebook Statistics. 2010. Retrieved from http://www.face- book.com/press/info.php?statistics.
  • Hull, G., Lipford, H., & Latulipe C. (2010). Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology.
  • Mylonas, A., Meletiadis, V., Mitrou, L., Gritzalis, D. (2013). Smartphone sensor data as digital evidence. Comput Secur. 38, 51-75.
  • Pearce, P., Felt, A.P., Nunez, G., & Wagner, D. (2012). Android: privilege separation for applications and advertisers in android. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 71-72).
  • Shehab, M., Marouf, S., & Hudel, C. (2011, July). ROAuth: Recommendation based open authorization. Proceedings of the 7th Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA.
  • Steel, E., & Fowler G. (2010 October). Facebook in privacy breach. The Wall Street Journal.
  • Retrieved from http://www.windowsecurity.com/arti- des-tutorials/misc_network_security/third-party-soft- ware-security-threat-part1.html
  • Retrieved from http://www.independent.co.uk/life-style/ gadgets-and-tech/the-snappening
  • Retrieved from http://www.forbes.com/sites/james- lyne/2014/01/31/yahoo-hacked-and-how-to-protect-your- passwords

Abstract Views: 436

PDF Views: 131




  • App Abuses: A Study of Increasing Risk in User's Adoption of Free Third-Party Mobile Apps in India

Abstract Views: 436  |  PDF Views: 131

Authors

Hitesh Keserwani
Amity Business School, Amity University, Lucknow, India

Abstract


Technological risks are those that are genuinely new, which emerge from new technologies and processes. Developing risks are those that are not new, but whose manifestation and implications are emerging. Mobile malware is one such risk though it is relatively low, but with the emergence of free app, the diversity in data, technology and collaboration has also increased the threat of malicious apps (malware) and App vulnerabilities in the embedded processes of mobile phones, which leads to a deeper analysis. The Norton Report (2013), a global survey of end-users, showed that 38 percent of mobile users had already experienced mobile cybercrime. Mobile users are storing sensitive files online (52 percent), store work and personal information in the same online storage accounts (24 percent) and sharing logins and passwords with families (21 percent) and friends (18 percent), putting their data and their employers’ data at risk. Yet only 50 percent of these users take even basic security precautions. According to McAfee Labs threat report, June 2014 The Company has discovered a suspicious Android app, Android/BadInst. A, on the Google Play app store that automatically downloads, installs, and launches other apps without user permission, which is usually required when manually installing apps from Google Play. Because this confirmation procedure at installation plays a critical role in securing a mobile platform, allowing apps to skip this process poses a significant risk to device users, including the silent installation of more dangerous malware. Companies must recognize that fraud awareness, prevention and mitigation are everyday issues that need to be a permanent fixture on the organization’s agenda. Apps like WhatsApp must be vigilant in ensuring their compliance with regulatory and legal issues. But lack of user security awareness is the primary contributor to several harmful cyber threats. Consequently, the hardware, operating system and apps all affect the total security state of the device, and this risk increases when a user uses potentially old or insecure devices as to limited knowledge . Most android phones offer to keep user data on cloud. However, like most technology changes, cloud computing presents its share of risks and challenges, which are too often overlooked or not fully understood by people those are frequent to embrace it. As the free apps risk profile and threat landscape in the mobile app is rapidly increasing, People need to change their mindset and approach towards using mobile phone risk to mitigate the emerging risk of android platform. This study takes an in depth look at the risks associated with third party free apps as an example of mobile app risk and suggests credible models so that risk appetites can be aligned with the exposures being faced.

Keywords


Cloud Computing, Legal Issues, Mobile Apps, Security, Technology.

References