{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:35Z","timestamp":1740098975922,"version":"3.37.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_15","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"169-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Smartphone Bloatware: An Overlooked Privacy Problem"],"prefix":"10.1007","author":[{"given":"Haroon","family":"Elahi","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Kaufman, L., Weed, B.: Too much of a good thing? Identifying and resolving bloat in the user interface. In: Conference Summary on Human Factors in Computing Systems - CHI 1998, vol. 30, pp. 207\u2013208 (1998). \nhttps:\/\/doi.org\/10.1145\/286498.286693","DOI":"10.1145\/286498.286693"},{"issue":"4","key":"15_CR2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MSP.2012.92","volume":"10","author":"P McDaniel","year":"2012","unstructured":"McDaniel, P.: Bloatware comes to the smartphone. IEEE Secur. Priv. 10(4), 85\u201387 (2012). \n            https:\/\/dl.acm.org\/citation.cfm?id=2377522","journal-title":"IEEE Secur. Priv."},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Baecker, R., Booth, K., Jovicic, S., McGrenere, J., Moore, G.: Reducing the gap between what users know and what they need to know. In: Proceedings on the 2000 Conference on Universal Usability - CUU 2000, pp. 17\u201323 (2000). \nhttps:\/\/doi.org\/10.1145\/355460.355467","DOI":"10.1145\/355460.355467"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"McGrenere, J.: Bloat: the objective and subject dimensions. In: CHI 2000 Extended Abstracts on Human Factors in Computing Systems, pp. 337\u2013338 (2000). \nhttps:\/\/doi.org\/10.1145\/633292.633495","DOI":"10.1145\/633292.633495"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D.J., Shadbolt, N.: Better the devil you know: exposing the data sharing practices of smartphone apps. In: CHI (2017). \nhttps:\/\/doi.org\/10.1145\/3025453.3025556","DOI":"10.1145\/3025453.3025556"},{"key":"15_CR6","unstructured":"https:\/\/goo.gl\/kEKs3y\n\n. Accessed 6 June 2017"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3007211","volume":"16","author":"J Shu","year":"2017","unstructured":"Shu, J., Zhang, Y., Li, J., Li, B., Gu, D.: Why data deletion fails? A study on deletion flaws and data remanence in Android systems. ACM Trans. Embed. Comput. Syst. 16, 1\u201322 (2017). \nhttps:\/\/doi.org\/10.1145\/3007211","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Vrhovec, S.L.R.: Safe use of mobile devices in the cyberspace. In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics, pp. 1397\u20131401 (2016). \nhttps:\/\/doi.org\/10.1109\/MIPRO.2016.7522358","DOI":"10.1109\/MIPRO.2016.7522358"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Yu, P., Yeung, C.A.: App mining: finding the real value of mobile applications. In: Proceedings of WWW 2014 Companion, pp. 417\u2013418 (2014). \nhttps:\/\/doi.org\/10.1145\/2567948.2577297","DOI":"10.1145\/2567948.2577297"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1509\/jmkr.2005.42.4.431","volume":"42","author":"DV Thompson","year":"2005","unstructured":"Thompson, D.V., Hamilton, R.W., Rust, R.T.: Feature fatigue: when product capabilities become too much of a good thing. J. Mark. Res. 42, 431\u2013442 (2005). \nhttps:\/\/doi.org\/10.1509\/jmkr.2005.42.4.431","journal-title":"J. Mark. Res."},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Chen, X., Zhu, S.: DroidJust: automated functionality-aware privacy leakage analysis for Android applications. In: WiSec 2015, 22\u201326 June 2015, New York City, NY, USA, pp. 5:1\u20135:12 (2015). \nhttps:\/\/doi.org\/10.1145\/2766498.2766507","DOI":"10.1145\/2766498.2766507"},{"key":"15_CR12","doi-asserted-by":"publisher","unstructured":"Liu, X., Wang, W., Liu, J.: POSTER: the popular apps in your pocket are leaking your privacy. In: Proceedings of the CCS 2015, 12\u201316 October 2015, Denver, Color. USA, pp. 1653\u20131655 (2015). \nhttps:\/\/doi.org\/10.1145\/2810103.2810127","DOI":"10.1145\/2810103.2810127"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2996358","volume":"49","author":"B Reaves","year":"2016","unstructured":"Reaves, B., Bowers, J., Gorski III, S.A., Anise, O., Bobhate, R., Cho, R., Das, H., Hussain, S., Karachiwala, H., Scaife, N., Wright, B., Butler, K., Enck, W., Traynor, P.: * droid: assessment and Evaluation of Android application analysis tools. ACM Comput. Surv. 49, 1\u201330 (2016). \nhttps:\/\/doi.org\/10.1145\/2996358","journal-title":"ACM Comput. Surv."},{"key":"15_CR14","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/52.951496","volume":"18","author":"B Witten","year":"2001","unstructured":"Witten, B., Landwehr, C., Caloyannides, M.: Does open source improve system security? IEEE Softw. 18, 57\u201361 (2001)","journal-title":"IEEE Softw."},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Li, L., Bartel, A., Bissyand\u00e9, T.F., Klein, J., Le Traon, Y., Arzt, S., McDaniel, P.: IccTA: detecting inter-component privacy leaks in Android apps. In: Proceedings of the 37th International Conference on Software Engineering, vol. 1, pp. 280\u2013291 (2015). \nhttps:\/\/doi.org\/10.1109\/ICSE.2015.48","DOI":"10.1109\/ICSE.2015.48"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Lu, L., Li, Z., Wu, Z., Lee, W., Jiang, G.: CHEX: statically vetting Android apps for component hijacking vulnerabilities. In: ACM Conference on Computer and Communications Security, pp. 229\u2013240 (2012). \nhttps:\/\/doi.org\/10.1145\/2382196.2382223","DOI":"10.1145\/2382196.2382223"},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Dimitriadis, A., Efraimidis, P.S., Katos, V.: Malevolent app pairs: an Android permission overpassing scheme. In: Proceedings of CF 2016, pp. 431\u2013436 (2016). \nhttps:\/\/doi.org\/10.1145\/2903150.2911706","DOI":"10.1145\/2903150.2911706"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Android privacy C(R)ache: reading your external storage and sensors for fun and profit. In: 2nd MobiHoc International Workshop on Privacy-Aware Mobile Computing PAMCO 2016, pp. 1\u201310 (2016). \nhttps:\/\/doi.org\/10.1145\/2940343.2940346","DOI":"10.1145\/2940343.2940346"},{"key":"15_CR19","doi-asserted-by":"publisher","unstructured":"Han, Q., Cho, D.: Characterizing the technological evolution of smartphones. In: Proceedings of the 18th Annual International Conference on Electronic Commerce: e-Commerce in Smart connected World - ICEC 2016, pp. 1\u20138 (2016). \nhttps:\/\/doi.org\/10.1145\/2971603.2971635","DOI":"10.1145\/2971603.2971635"},{"key":"15_CR20","first-page":"512","volume":"44","author":"S Kim","year":"2016","unstructured":"Kim, S., Choe, Y., Lee, Y., Kim, S., Choe, Y., Users, S., Puntoni, S.: How heavy is your smartphone? Imaginary weight perception of smartphone users and its impact on product evaluation. Adv. Consum. Res. 44, 512\u2013513 (2016)","journal-title":"Adv. Consum. Res."},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Spensky, C., Stewart, J., Yerukhimovich, A., Shay, R., Trachtenberg, A., Housley, R., Cunningham, R.K.: SoK: privacy on mobile devices \u2013 it\u2019s complicated. In: Proceedings on Privacy Enhancing Technologies, pp. 96\u2013116 (2016). \nhttps:\/\/doi.org\/10.1515\/popets-2016-0018","DOI":"10.1515\/popets-2016-0018"},{"key":"15_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5308-6_3","volume-title":"Facebook Nation","author":"N Lee","year":"2013","unstructured":"Lee, N.: Smartphones and privacy. In: Lee, N. (ed.) Facebook Nation. Springer, New York (2013). \nhttps:\/\/doi.org\/10.1007\/978-1-4614-5308-6_3"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Neumann, P.G.: Risks to the public. In: ACM SIGSOFT, vol. 36, pp. 17\u201323 (2011). \nhttps:\/\/doi.org\/10.1145\/1988997.1989002","DOI":"10.1145\/1988997.1989002"},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Neumann, P.G.: Risks of untrustworthiness. In: Proceedings of the Computer Security Applications Conference ACSAC, pp. 321\u2013326 (2006). \nhttps:\/\/doi.org\/10.1109\/ACSAC.2006.45","DOI":"10.1109\/ACSAC.2006.45"},{"key":"15_CR25","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1080\/13662710701369262","volume":"14","author":"H Koski","year":"2007","unstructured":"Koski, H., Kretschmer, T.: Innovation and dominant design in mobile telephony. Ind. Innov. 14, 305\u2013324 (2007). \nhttps:\/\/doi.org\/10.1080\/13662710701369262","journal-title":"Ind. Innov."},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TC.2015.2470247","volume":"65","author":"Y Li","year":"2016","unstructured":"Li, Y., Dai, W., Member, S., Ming, Z., Qiu, M., Member, S.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65, 1339\u20131350 (2016). \nhttps:\/\/doi.org\/10.1109\/TC.2015.2470247","journal-title":"IEEE Trans. Comput."},{"key":"15_CR27","unstructured":"https:\/\/en.wikipedia.org\/wiki\/Carrier_IQ\n\n. Accessed 6 June 2017"},{"issue":"2","key":"15_CR28","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2963145","volume":"49","author":"M Xu","year":"2016","unstructured":"Xu, M., Song, C., Ji, Y., Shih, M.W., Lu, K., Zheng, C., et al.: Toward engineering a secure Android ecosystem: a survey of existing techniques. ACM Comput. Surv. 49(2), 38 (2016). \nhttps:\/\/doi.org\/10.1145\/2963145","journal-title":"ACM Comput. Surv."},{"key":"15_CR29","doi-asserted-by":"publisher","unstructured":"Marforio, C., Francillon, A., Capkun, S.: Application collusion attack on the permission-based security model and its implications for modern smartphone systems. Technical report 724, pp. 1\u201316 (2011). \nhttps:\/\/doi.org\/10.3929\/ethz-a-006936208","DOI":"10.3929\/ethz-a-006936208"},{"key":"15_CR30","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.ijinfomgt.2016.02.004","volume":"36","author":"MA Harris","year":"2016","unstructured":"Harris, M.A., Brookshire, R., Chin, A.G.: Identifying factors influencing consumers\u2019 intent to install mobile applications. Int. J. Inf. Manag. 36, 441\u2013450 (2016). \nhttps:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.02.004","journal-title":"Int. J. Inf. Manag."},{"key":"15_CR31","doi-asserted-by":"publisher","unstructured":"Yin, P., Luo, P., Lee, W.-C., Wang, M.: App recommendation: a contest between satisfaction and temptation. In: Proceedings of the 6th ACM International Conference Web Search Data Mining, pp. 395\u2013404 (2013). \nhttps:\/\/doi.org\/10.1145\/2433396.2433446","DOI":"10.1145\/2433396.2433446"},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1016\/j.telpol.2012.07.011","volume":"37","author":"A Riikonen","year":"2013","unstructured":"Riikonen, A., Smura, T., Kivi, A., T\u00f6yli, J.: Diffusion of mobile handset features: Analysis of turning points and stages. Telecomm. Policy 37, 563\u2013572 (2013). \nhttps:\/\/doi.org\/10.1016\/j.telpol.2012.07.011","journal-title":"Telecomm. Policy"},{"key":"15_CR33","unstructured":"http:\/\/support.google.com\/googleplay\/android-developer\/answer\/11345?hl=en\n\n. Accessed 7 July 2017"},{"key":"15_CR34","doi-asserted-by":"publisher","unstructured":"Shen, Y., Evans, N., Benameur, A.: Insights into rooted and non-rooted Android mobile devices with behavior analytics. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016, pp. 580\u2013587 (2016). \nhttps:\/\/doi.org\/10.1145\/2851613.2851713","DOI":"10.1145\/2851613.2851713"},{"key":"15_CR35","doi-asserted-by":"publisher","unstructured":"Liu, B., Lin, J., Sadeh, N.: Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In: Proceedings of the 23rd international conference on World Wide Web, pp. 201\u2013212 (2014). \nhttps:\/\/doi.org\/10.1145\/2566486.2568035","DOI":"10.1145\/2566486.2568035"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:58:30Z","timestamp":1512554310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}