App Abuses: A Study of Increasing Risk in User's Adoption of Free Third-Party Mobile Apps in India

Authors

  •  Hitesh Keserwani Amity Business School, Amity University, Lucknow

DOI:

https://doi.org/10.53739/samvad/2015/v10/98326

Keywords:

Cloud Computing, Legal Issues, Mobile Apps, Security, Technology.

Abstract

Technological risks are those that are genuinely new, which emerge from new technologies and processes. Developing risks are those that are not new, but whose manifestation and implications are emerging. Mobile malware is one such risk though it is relatively low, but with the emergence of free app, the diversity in data, technology and collaboration has also increased the threat of malicious apps (malware) and App vulnerabilities in the embedded processes of mobile phones, which leads to a deeper analysis. The Norton Report (2013), a global survey of end-users, showed that 38 percent of mobile users had already experienced mobile cybercrime. Mobile users are storing sensitive files online (52 percent), store work and personal information in the same online storage accounts (24 percent) and sharing logins and passwords with families (21 percent) and friends (18 percent), putting their data and their employers’ data at risk. Yet only 50 percent of these users take even basic security precautions. According to McAfee Labs threat report, June 2014 The Company has discovered a suspicious Android app, Android/BadInst. A, on the Google Play app store that automatically downloads, installs, and launches other apps without user permission, which is usually required when manually installing apps from Google Play. Because this confirmation procedure at installation plays a critical role in securing a mobile platform, allowing apps to skip this process poses a significant risk to device users, including the silent installation of more dangerous malware. Companies must recognize that fraud awareness, prevention and mitigation are everyday issues that need to be a permanent fixture on the organization’s agenda. Apps like WhatsApp must be vigilant in ensuring their compliance with regulatory and legal issues. But lack of user security awareness is the primary contributor to several harmful cyber threats. Consequently, the hardware, operating system and apps all affect the total security state of the device, and this risk increases when a user uses potentially old or insecure devices as to limited knowledge . Most android phones offer to keep user data on cloud. However, like most technology changes, cloud computing presents its share of risks and challenges, which are too often overlooked or not fully understood by people those are frequent to embrace it. As the free apps risk profile and threat landscape in the mobile app is rapidly increasing, People need to change their mindset and approach towards using mobile phone risk to mitigate the emerging risk of android platform. This study takes an in depth look at the risks associated with third party free apps as an example of mobile app risk and suggests credible models so that risk appetites can be aligned with the exposures being faced.

Downloads

Download data is not yet available.

Downloads

Published

2015-12-01

How to Cite

(1)
Keserwani, H. App Abuses: A Study of Increasing Risk in User’s Adoption of Free Third-Party Mobile Apps in India. samvad 2015, 10, 53-58.

Issue

Section

Articles

References

Debatin, B., Lovejoy J., Horn A., and Hughes B. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15(1), 83-108.

Facebook Statistics. 2010. Retrieved from http://www.face- book.com/press/info.php?statistics.

Hull, G., Lipford, H., & Latulipe C. (2010). Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology.

Mylonas, A., Meletiadis, V., Mitrou, L., Gritzalis, D. (2013). Smartphone sensor data as digital evidence. Comput Secur. 38, 51-75.

Pearce, P., Felt, A.P., Nunez, G., & Wagner, D. (2012). Android: privilege separation for applications and advertisers in android. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (pp. 71-72).

Shehab, M., Marouf, S., & Hudel, C. (2011, July). ROAuth: Recommendation based open authorization. Proceedings of the 7th Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA.

Steel, E., & Fowler G. (2010 October). Facebook in privacy breach. The Wall Street Journal.

Retrieved from http://www.windowsecurity.com/arti- des-tutorials/misc_network_security/third-party-soft- ware-security-threat-part1.html

Retrieved from http://www.independent.co.uk/life-style/ gadgets-and-tech/the-snappening

Retrieved from http://www.forbes.com/sites/james- lyne/2014/01/31/yahoo-hacked-and-how-to-protect-your- passwords

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.