{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T06:54:35Z","timestamp":1765608875403,"version":"3.48.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032137135","type":"print"},{"value":"9783032137142","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-13714-2_27","type":"book-chapter","created":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T06:43:43Z","timestamp":1765608223000},"page":"444-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security and\u00a0Privacy Assessment of\u00a0U.S. and\u00a0Non-U.S. Android E-Commerce Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6389-5508","authenticated-orcid":false,"given":"Urvashi","family":"Kishnani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,14]]},"reference":[{"key":"27_CR1","unstructured":"Abraham, A., Schlecht, D., Ma, G., Dobrushin, M., Nadal, V.: Mobile security framework (MobSF) (2016)"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"e891","DOI":"10.7717\/peerj-cs.891","volume":"8","author":"P Acosta-Vargas","year":"2022","unstructured":"Acosta-Vargas, P., Salvador-Acosta, B., Salvador-Ullauri, L., Jad\u00e1n-Guerrero, J.: Accessibility challenges of e-commerce websites. PeerJ Comput. Sci. 8, e891 (2022)","journal-title":"PeerJ Comput. Sci."},{"key":"27_CR3","unstructured":"AfterShip: Top 100 e-commerce stores (2024). https:\/\/www.aftership.com\/store-list\/top-100-ecommerces-stores. Accessed 30 May 2024"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed, A.M., Zairi, M., Alwabel, S.: Global benchmarking for internet and e-commerce applications. Benchmarking: Int. J. 13(1\/2), 68\u201380 (2006)","DOI":"10.1108\/14635770610644583"},{"key":"27_CR5","unstructured":"AndroBugs: Androbugs 2. https:\/\/github.com\/androbugs2\/androbugs2. Accessed 30 May 2024"},{"issue":"3","key":"27_CR6","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1007\/s12525-019-00375-6","volume":"30","author":"R Bandara","year":"2020","unstructured":"Bandara, R., Fernando, M., Akter, S.: Privacy concerns in e-commerce: a taxonomy and a future research agenda. Electron. Mark. 30(3), 629\u2013647 (2020)","journal-title":"Electron. Mark."},{"issue":"2","key":"27_CR7","first-page":"11","volume":"25","author":"JE Boritz","year":"2011","unstructured":"Boritz, J.E., No, W.G.: E-commerce and privacy: exploring what we know and opportunities for future discovery. J. Inf. Syst. 25(2), 11\u201345 (2011)","journal-title":"J. Inf. Syst."},{"key":"27_CR8","unstructured":"Business of Apps: Android statistics (2024). https:\/\/www.businessofapps.com\/data\/android-statistics\/. Accessed 30 May 2024"},{"key":"27_CR9","unstructured":"Chanana, N., Goele, S.: Future of e-commerce in India. Int. J. Comput. Bus. Res. 8(1) (2012)"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th international conference on Mobile systems, applications, and services, pp. 239\u2013252 (2011)","DOI":"10.1145\/1999995.2000018"},{"issue":"11","key":"27_CR11","doi-asserted-by":"publisher","first-page":"7008","DOI":"10.1109\/TSMC.2019.2961979","volume":"51","author":"TM Choi","year":"2020","unstructured":"Choi, T.M.: Mobile-app-online-website dual channel strategies: privacy concerns, e-payment convenience, channel relationship, and coordination. IEEE Trans. Syst., Man, Cybern.: Syst. 51(11), 7008\u20137016 (2020)","journal-title":"IEEE Trans. Syst., Man, Cybern.: Syst."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Das, S., Dev, J., Camp, L.J.: Privacy preserving policy framework: user-aware and user-driven. In: TPRC47: The 47th Research Conference on Communication, Information and Internet Policy (2019)","DOI":"10.2139\/ssrn.3445942"},{"key":"27_CR13","unstructured":"Developers, A.: Developer guides: Android developers (2023). https:\/\/developer.android.com\/guide\/"},{"key":"27_CR14","unstructured":"Fellner, K., Rautenstrauch, C., Turowski, K.: A component model for an interorganizational agent-based coordination. In: 1999 Information Resources Management Association International Conference (IRMA\u201999): Managing Information Technology Resources in Organizations in the Next Millennium, pp. 1036\u20131040 (1999)"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1023\/A:1019134712734","volume":"2","author":"M Gaedke","year":"2000","unstructured":"Gaedke, M., Turowski, K.: Integrating web-based e-commerce applications with business application systems. NETNOMICS 2, 117\u2013138 (2000)","journal-title":"NETNOMICS"},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/359205.359227","volume":"44","author":"AK Ghosh","year":"2001","unstructured":"Ghosh, A.K., Swaminatha, T.M.: Software security and privacy risks in mobile e-commerce. Commun. ACM 44(2), 51\u201357 (2001)","journal-title":"Commun. ACM"},{"issue":"1\u20132","key":"27_CR17","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1504\/WREMSD.2019.098454","volume":"15","author":"S Goyal","year":"2019","unstructured":"Goyal, S., Sergi, B.S., Esposito, M.: Literature review of emerging trends and future directions of e-commerce in global business landscape. World Rev. Entrepreneurship, Manage. Sustain. Dev. 15(1\u20132), 226\u2013255 (2019)","journal-title":"World Rev. Entrepreneurship, Manage. Sustain. Dev."},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Hadan, H., Serrano, N., Das, S., Camp, L.J.: Making IoT worthy of human trust. In: TPRC47: The 47th Research Conference on Communication, Information and Internet Policy (2019). available at SSRN: https:\/\/ssrn.com\/abstract=3426871 or http:\/\/dx.doi.org\/10.2139\/ssrn.3426871","DOI":"10.2139\/ssrn.3426871"},{"issue":"3","key":"27_CR19","first-page":"1","volume":"3","author":"MA Hussain","year":"2013","unstructured":"Hussain, M.A.: A study of information security in e-commerce applications. Int. J. Comput. Eng. Sci. (IJCES) 3(3), 1\u20139 (2013)","journal-title":"Int. J. Comput. Eng. Sci. (IJCES)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Kishnani, U., Das, S.: Securing the web: analysis of http security headers in popular global websites. In: International Conference on Information Systems Security, pp. 87\u2013106. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-80020-7_5"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Kishnani, U., Das, S.: Dual-technique privacy & security analysis for e-commerce websites through automated and manual implementation. In: Proceedings of the 2025 Hawaii International Conference on System Sciences (HICSS) (2025)","DOI":"10.24251\/HICSS.2025.554"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Kishnani, U., Noah, N., Das, S., Dewri, R.: Assessing security, privacy, user interaction, and accessibility features in popular e-payment applications. In: Proceedings of the 2023 European Symposium on Usable Security, pp. 143\u2013157 (2023)","DOI":"10.1145\/3617072.3617102"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Ladan, M.I.: E-commerce security issues. In: 2014 International Conference on Future Internet of Things and Cloud, pp. 197\u2013201. IEEE (2014)","DOI":"10.1109\/FiCloud.2014.39"},{"key":"27_CR24","doi-asserted-by":"publisher","unstructured":"LAZ\u0102RA, A.P.: Security testing for e-commerce applications. In: International Conference on Cybersecurity and Cybercrime, vol. 10, pp. 224\u2013229 (2023). https:\/\/doi.org\/10.19107\/CYBERCON.2023.30","DOI":"10.19107\/CYBERCON.2023.30"},{"key":"27_CR25","unstructured":"Lin, Y.C.: AndroBugs framework: an android application security vulnerability scanner. Blackhat Europe 2015 (2015)"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Liu, H., et\u00a0al.: Privacy computing issues in collecting and using customer data of mobile devices. In: 2022 7th International Conference on Signal and Image Processing (ICSIP), pp. 382\u2013389. IEEE (2022)","DOI":"10.1109\/ICSIP55141.2022.9886951"},{"issue":"9","key":"27_CR27","doi-asserted-by":"publisher","first-page":"6019","DOI":"10.1007\/s00500-023-08099-8","volume":"27","author":"R Liu","year":"2023","unstructured":"Liu, R., Wang, E.: Blockchain and mobile client privacy protection in e-commerce consumer shopping tendency identification application. Soft. Comput. 27(9), 6019\u20136031 (2023)","journal-title":"Soft. Comput."},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Mai, Z.: Mobile e-commerce application based on 5G network. In: International Conference on Innovative Computing, pp. 287\u2013293. Springer (2023)","DOI":"10.1007\/978-981-99-2287-1_41"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Maji, A.K., Arshad, F.A., Bagchi, S., Rellermeyer, J.S.: An empirical study of the robustness of inter-component communication in android. In: IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1\u201312. IEEE (2012)","DOI":"10.1109\/DSN.2012.6263963"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Markert, P., Adhikari, A., Das, S.: A transcontinental analysis of account remediation protocols of popular websites. arXiv preprint: arXiv:2302.01401 (2023)","DOI":"10.2139\/ssrn.4344461"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Merlo, A., Georgiu, G.C.: RiskinDroid: machine learning-based risk analysis on android. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 538\u2013552. Springer (2017)","DOI":"10.1007\/978-3-319-58469-0_36"},{"issue":"1\u20132","key":"27_CR32","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1504\/IJEG.2022.123245","volume":"14","author":"S Monogios","year":"2022","unstructured":"Monogios, S., Magos, K., Limniotis, K., Kolokotronis, N., Shiaeles, S.: Privacy issues in android applications: the cases of GPS navigators and fitness trackers. Int. J. Electr. Governance 14(1\u20132), 83\u2013111 (2022)","journal-title":"Int. J. Electr. Governance"},{"key":"27_CR33","first-page":"273","volume":"3","author":"G Ng-Kruelle","year":"2002","unstructured":"Ng-Kruelle, G., Swatman, P.A., Rebne, D.S., Hampe, J.F.: The price of convenience: privacy and mobile commerce. Q. J. Electron. Commer. 3, 273\u2013286 (2002)","journal-title":"Q. J. Electron. Commer."},{"issue":"6","key":"27_CR34","first-page":"2360","volume":"2","author":"M Niranjanamurthy","year":"2013","unstructured":"Niranjanamurthy, M., Kavyashree, N., Jagannath, S., Chahar, D.: Analysis of e-commerce and m-commerce: advantages, limitations and security issues. Int. J. Adv. Res. Comput. Commun. Eng. 2(6), 2360\u20132370 (2013)","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"1","key":"27_CR35","first-page":"291","volume":"3","author":"C Omar","year":"2014","unstructured":"Omar, C., Anas, T.: E-commerce in Malaysia: development, implementation and challenges. Int. Rev. Manag. Bus. Res. 3(1), 291\u2013298 (2014)","journal-title":"Int. Rev. Manag. Bus. Res."},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Poikela, M., Kaiser, F.: \u2018it is a topic that confuses me\u2019\u2013privacy perceptions in usage of location-based applications. In: European Workshop on Usable Security (EuroUSEC) (2016)","DOI":"10.14722\/eurousec.2016.23010"},{"key":"27_CR37","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10660-007-9002-9","volume":"7","author":"R Smith","year":"2007","unstructured":"Smith, R., Shao, J.: Privacy and e-commerce: a consumer-centric perspective. Electron. Commer. Res. 7, 89\u2013116 (2007)","journal-title":"Electron. Commer. Res."},{"key":"27_CR38","doi-asserted-by":"crossref","unstructured":"Surani, A., Bawaked, A., Wheeler, M., Kelsey, B., Roberts, N., Vincent, D., Das, S.: Security and privacy of digital mental health: an analysis of web services and mobile applications. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 319\u2013338. Springer, Sophia-Antipolis (2023)","DOI":"10.1007\/978-3-031-37586-6_19"},{"key":"27_CR39","doi-asserted-by":"crossref","unstructured":"Yang, C., Wan, J.: An approach to separating security concerns in e-commerce systems at the architecture level. In: 2008 International Symposium on Electronic Commerce and Security, pp. 749\u2013753. IEEE (2008)","DOI":"10.1109\/ISECS.2008.59"},{"issue":"4","key":"27_CR40","first-page":"31","volume":"53","author":"R Zhang","year":"2013","unstructured":"Zhang, R., Chen, J.Q., Lee, C.J.: Mobile commerce and consumer privacy concerns. J. Comput. Inf. Syst. 53(4), 31\u201338 (2013)","journal-title":"J. Comput. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-13714-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T06:43:47Z","timestamp":1765608227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-13714-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"ISBN":["9783032137135","9783032137142"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-13714-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,14]]},"assertion":[{"value":"14 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iciss.isrdc.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}