{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:16:48Z","timestamp":1768515408390,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319097695","type":"print"},{"value":"9783319097701","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_14","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T03:25:20Z","timestamp":1408418720000},"page":"156-167","source":"Crossref","is-referenced-by-count":19,"title":["Differences between Android and iPhone Users in Their Security and Privacy Awareness"],"prefix":"10.1007","author":[{"given":"Lena","family":"Reinfelder","sequence":"first","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]},{"given":"Freya","family":"Gassmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Arthur, C., Dredge, S.: iOS v Android: Why Schmidt was wrong and developers still start on Apple (June 10, 2012), \n                    \n                      www.guardian.co.uk"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012 (2012)","DOI":"10.1145\/2187836.2187879"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: SOUPS (2012)","DOI":"10.1145\/2335356.2335358"},{"key":"14_CR4","unstructured":"Dediu, H.: Android economics: An introduction (April 2, 2012), \n                    \n                      www.asymco.com"},{"key":"14_CR5","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Apllications. In: NDSS (2011)"},{"key":"14_CR6","unstructured":"Elmer-DeWitt, P.: 6 ways iPhone and Android users differ (February 25, 2010), \n                    \n                      tech.fortune.cnn.com"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: SPSM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. In: SOUPS (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"14_CR9","unstructured":"Google: Protect against harmful apps (February 28, 2014), \n                    \n                      https:\/\/support.google.com\/accounts\/answer\/2812853?hl=en"},{"key":"14_CR10","unstructured":"Han, J., Yan, Q., Gao, D., Zhou, J., Deng, R.H.: Comparing Mobile Privacy Protection through Cross-Platform Applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2013)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Sadeh, L.F.C.N.: Privacy as part of the app decision-making process. In: ACM (2013)","DOI":"10.1145\/2470654.2466466"},{"key":"14_CR12","unstructured":"Kelloway, E.K.: Using LISREL for Structural Equation Modeling. Sage, Thousand Oaks (1998)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"King, J.: How Come I\u2019m Allowing Strangers to Go Through My Phone?: Smart Phones and Privacy Expectations, under review (2012)","DOI":"10.2139\/ssrn.2493412"},{"key":"14_CR14","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin\u2019s studies. Tech. Rep. Paper 856, Carnegie Mellon University, Institute for Software Research (January 2005)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Leontiadis, I., Efstratiou, C., Picone, M., Mascolo, C.: Don\u2019t kill my ads!: Balancing privacy in an ad-supported mobile application market. In: HotMobile (2012)","DOI":"10.1145\/2162081.2162084"},{"key":"14_CR16","unstructured":"Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J.I., Zhang, J.: Expectation and purpose: Understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: ACM UbiComp (2012), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/2370216.2370290"},{"key":"14_CR17","unstructured":"Lipsman, A., Aquino, C.: 2013 Mobile Future in Focus (February 22, 2013), \n                    \n                      http:\/\/www.comscore.com"},{"issue":"4","key":"14_CR18","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"N.K. Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users\u2019 Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research\u00a015(4), 336\u2013355 (2004)","journal-title":"Information Systems Research"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Mayring, P.: Qualitative Inhaltsanalyse, 11th edn. Beltz Verlag (2010)","DOI":"10.1007\/978-3-531-92052-8_42"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40343-9_15","volume-title":"Trust, Privacy, and Security in Digital Business","author":"A. Mylonas","year":"2013","unstructured":"Mylonas, A., Gritzalis, D., Tsoumas, B., Apostolopoulos, T.: A qualitative metrics vector for the awareness of smartphone security users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2013. LNCS, vol.\u00a08058, pp. 173\u2013184. Springer, Heidelberg (2013)"},{"key":"14_CR21","first-page":"47","volume":"34","author":"A. Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security Awareness in Smartphone Platforms\u00a034, 47\u201366 (2013)","journal-title":"Security Awareness in Smartphone Platforms"},{"key":"14_CR22","unstructured":"Percoco, N.J., Schulte, S.: Adventures in bouncerland. In: Black Hat USA (2012)"},{"key":"14_CR23","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-03315-5_17","volume-title":"The Future of Identity in the Information Society","author":"S. P\u00f6tzsch","year":"2009","unstructured":"P\u00f6tzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) The Future of Identity. IFIP AICT, vol.\u00a0298, pp. 226\u2013236. Springer, Heidelberg (2009)"},{"key":"14_CR24","unstructured":"Raphael, J.: How Google\u2019s Android security is about to get even smarter (February 27, 2014), \n                    \n                      http:\/\/blogs.computerworld.com\/android\/23590\/google-android-security"},{"key":"14_CR25","unstructured":"Seriot, N.: iPhone Privacy. In: Black Hat USA (2010)"},{"key":"14_CR26","unstructured":"Sofos: Security threat report (2013), \n                    \n                      http:\/\/www.sophos.com\/en-us\/security-news-trends\/reports\/security-threat-report"},{"key":"14_CR27","unstructured":"Spreitzenbarth, M., Freiling, F.: Android malware on the rise. Tech. Rep. CS-2012-04, University of Erlangen (April 2012)"},{"key":"14_CR28","unstructured":"Travlos, D.: Five Reasons Why Google Android versus Apple iOS Market Share Numbers Don\u2019t Matter (August 22, 2012), \n                    \n                      http:\/\/www.forbes.com"},{"key":"14_CR29","unstructured":"Wang, T., Lu, K., Lu, L., Chung, S., Lee, W.: Jekyll on iOS: when benign apps become evil. Presented as Part of the 22nd USENIX Security Symposium, Washington D.C, USA (August 2013)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T12:52:04Z","timestamp":1558961524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}