Money and Privacy - Android Market Evidence∗

نویسندگان

  • Michael Kummer
  • Patrick Schulte
  • Sang-Pil Han
  • Andres Hervas
  • Imke Reimers
  • Rahul Telang
چکیده

We study the role of privacy in the market for mobile applications. For such programs used with smartphones and tablet PCs a very important market has emerged. Yet, neither the role of privacy on that market is well understood, nor do we have empirical evidence regarding its role therein. We exploit data on 300,000 mobile applications and almost 600 “applications-pairs” to analyze both sides of this market: First, we analyze the price that application suppliers charge for more privacy. Second, we study how users’ installations are related to the “personal data greediness” of mobile applications. We provide the first empirical evidence on the main assumptions of recent early models on suppliers’ and consumers’ strategies in this market. Our results show that (1) consumers take it into account when applications request rights to collect private information and (2) suppliers ask for more rights if they offer an app for free than if they offer it for a fee. JEL Classification: D4, D83, L15

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Does the Android Permission System Provide Adequate Information Privacy Protection for End-users of Mobile Apps?

This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indi...

متن کامل

Two Trends in Mobile Security: Financial Motives and Transitioning from Static to Dynamic Analysis

The goal of this paper is to analyze the behavior and intent of recent types of privacy-invasive Android adware. There are two recent trends in this area: more financial (rather than ego) motives, and the development of more dynamic analysis tools. This paper starts with a review of Android mobile operating system security, and also addresses the pros and cons of open source operating system se...

متن کامل

Two-factor Protection Scheme in Securing the Source Code of Android Applications

While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the pro...

متن کامل

Permission-Based Android Malware Detection

Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them, Android-based mobile devices had appeared lately and, they were now an ideal target for attackers. Android-based smartphone users can get free applications from Android Application Market. But, these applications were not certified by legitimate organizations and the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015