{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:12:23Z","timestamp":1761621143512,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642403422"},{"type":"electronic","value":"9783642403439"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40343-9_15","type":"book-chapter","created":{"date-parts":[[2013,8,23]],"date-time":"2013-08-23T01:44:28Z","timestamp":1377222268000},"page":"173-184","source":"Crossref","is-referenced-by-count":25,"title":["A Qualitative Metrics Vector for the Awareness of Smartphone Security Users"],"prefix":"10.1007","author":[{"given":"Alexios","family":"Mylonas","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Bill","family":"Tsoumas","sequence":"additional","affiliation":[]},{"given":"Theodore","family":"Apostolopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Questionnaire, \n                      http:\/\/www.aueb.gr\/users\/amylonas\/instrument.pdf"},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2010.202","volume":"9","author":"D. Barrera","year":"2011","unstructured":"Barrera, D., Van Oorschot, P.: Secure Software Installation on Smartphones. IEEE Security & Privacy\u00a09(3), 42\u201348 (2011)","journal-title":"IEEE Security & Privacy"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Chia, P., Yamamoto, Y., Asokan, N.: Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals. In: Proceedings of the 21st International World Wide Web Conference, pp. 311\u2013320 (2012)","DOI":"10.1145\/2187836.2187879"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring User Confidence in Smartphone Security and Privacy. In: Proceedigns of the 8th Symposium on Usable Privacy and Security (2012)","DOI":"10.1145\/2335356.2335358"},{"key":"15_CR5","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting privacy leaks in iOS applications. In: Proceedigns of the 18th Annual Network and Distributed System Security Symposium (2011)"},{"key":"15_CR6","unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proceedings of the 20th Usenix Security Symposium (2011)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android Permissions: User Attention, Comprehension, and Behavior. In: Proceedigns of the 8th Symposium on Usable Privacy and Security (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"15_CR8","unstructured":"Felt, A.P., Wang, H.J., Moshchuk, A., Hanna, S., Chin, E.: Permission Re-Delegation: Attacks and Defenses. In: Proceedings of the 20th Usenix Security Symposium (2011)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1145\/2046707.2046779","volume-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security","author":"A. Felt","year":"2011","unstructured":"Felt, A., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627\u2013638. ACM, USA (2011)"},{"key":"15_CR10","volume-title":"An introduction to qualitative research","author":"U. Flick","year":"1998","unstructured":"Flick, U.: An introduction to qualitative research. Sage Publications, London (1998)"},{"key":"15_CR11","unstructured":"Grace, M., Zhou, Y., Wang, Z., Jiang, X.: Systematic Detection of Capability Leaks in Stock Android Smartphones. In: Proceedings of the 19th Network and Distributed System Security Symposium (2012)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren\u2019t the droids you\u2019re looking for: Retrofitting Android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, USA, pp. 639\u2013652 (2011)","DOI":"10.1145\/2046707.2046780"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Iliadis, J., Gritzalis, D., Spinellis, D., Preneel, B., Katsikas, S.: Evaluating certificate status information mechanisms. In: Proceedings of the 7th ACM Computer and Communications Security Conference, pp. 1\u20138 (2000)","DOI":"10.1145\/352600.352603"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-34638-5_6","volume-title":"Financial Cryptography and Data Security","author":"P. Kelley","year":"2012","unstructured":"Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N., Wetherall, D.: A Conundrum of Permissions: Installing Applications on an Android Smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol.\u00a07398, pp. 68\u201379. Springer, Heidelberg (2012)"},{"issue":"5-6","key":"15_CR15","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.ijmedinf.2006.09.010","volume":"76","author":"D. Lekkas","year":"2006","unstructured":"Lekkas, D., Gritzalis, D.: Long-term verifiability of healthcare records authenticity. International Journal of Medical Informatics\u00a076(5-6), 442\u2013448 (2006)","journal-title":"International Journal of Medical Informatics"},{"key":"15_CR16","unstructured":"Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: Smartphone Security Evaluation: The Malware Attack Case. In: Proceedings of the 8th International Conference of Security and Cryptography, pp. 25\u201336 (2011)"},{"key":"15_CR17","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-35755-8_16","volume-title":"E-Business and Telecommunications","author":"A. Mylonas","year":"2012","unstructured":"Mylonas, A., Dritsas, S., Tsoumas, B., Gritzalis, D.: On the Feasibility of Malware Attacks in Smartphone Platforms. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. CCIS, vol.\u00a0314, pp. 217\u2013232. Springer, Heidelberg (2012)"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A. Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security\u00a034, 47\u201366 (2013)","journal-title":"Computers & Security"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-22890-2_5","volume-title":"Trust, Privacy and Security in Digital Business","author":"A. Mylonas","year":"2011","unstructured":"Mylonas, A., Tsoumas, B., Dritsas, S., Gritzalis, D.: A Secure Smartphone Applications Roll-out Scheme. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol.\u00a06863, pp. 49\u201361. Springer, Heidelberg (2011)"},{"issue":"2","key":"15_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2010.2","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security Privacy\u00a08(2), 35\u201344 (2010)","journal-title":"IEEE Security Privacy"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M.: Secure electronic voting: The current landscape. In: Gritzalis, D. (ed.) Secure Electronic Voting, pp. 110\u2013122. Kluwer (2003)","DOI":"10.1007\/978-1-4615-0239-5_7"},{"key":"15_CR22","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-30436-1_36","volume-title":"Information Security and Privacy Research","author":"M. Theoharidou","year":"2012","unstructured":"Theoharidou, M., Mylonas, A., Gritzalis, D.: A risk assessment method for smartphones. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 443\u2013456. Springer, Heidelberg (2012)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting Android malware: Characterization and evolution. In: Proceedings of 33rd IEEE Symposium on Security and Privacy, pp. 95\u2013109 (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40343-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T13:31:06Z","timestamp":1675344666000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-40343-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642403422","9783642403439"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40343-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}