{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T00:01:28Z","timestamp":1752192088650,"version":"3.41.2"},"reference-count":82,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3584673","type":"journal-article","created":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T13:39:16Z","timestamp":1751290756000},"page":"114216-114229","source":"Crossref","is-referenced-by-count":0,"title":["Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2183-9576","authenticated-orcid":false,"given":"Logan","family":"Mears","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, University of Nebraska Omaha, Omaha, NE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9578-4487","authenticated-orcid":false,"given":"Rachel","family":"Donner","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, University of Nebraska Omaha, Omaha, NE, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3468-0182","authenticated-orcid":false,"given":"George","family":"Grispos","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, University of Nebraska Omaha, Omaha, NE, USA"}]}],"member":"263","reference":[{"volume-title":"Presidential Policy Directive 21 (PPD\u201321)","year":"2013","key":"ref1"},{"volume-title":"Critical Infrastructure Sectors","year":"2025","key":"ref2"},{"volume-title":"Usda Agriculture Census: Lots of Numbers","year":"2024","author":"Murphree","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.20.1.3229"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jssas.2024.02.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.102829"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cles.2024.100132"},{"volume-title":"Technology Use: Farm Computer Usage and Ownership Report","year":"2023","key":"ref8"},{"volume-title":"The Impact of Mobile Technology on Farm Management","year":"2023","author":"Moses","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssaho.2024.100811"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0237337"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1504\/IJAITG.2021.122854"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.16"},{"volume-title":"Number of Mobile Cyberattacks Against Users Worldwide","year":"2023","key":"ref15"},{"volume-title":"Mobile Application Security Testing Guide","year":"2025","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5897\/ajar2020.14909"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11119-019-09675-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-02049-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0144-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.016"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0251867"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09934-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35299-7_9"},{"issue":"2","key":"ref25","first-page":"143","article-title":"Security analysis of ship management applications for Android","volume":"5","author":"Jo","year":"2023","journal-title":"Defense Secur."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030058"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275523"},{"key":"ref28","article-title":"Privacy and security of Women\u2019s reproductive health apps in a changing legal landscape","author":"Saini","year":"2024","journal-title":"arXiv:2404.05876"},{"article-title":"Cyber risk and security implications in smart agriculture and food systems","year":"2019","author":"Jahn","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00025"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2020.105776"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s22093520"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975142"},{"key":"ref34","first-page":"1","article-title":"Towards a cybersecurity testbed for agricultural vehicles and environments","volume-title":"Proc. 17th Midwest Assoc. Inf. Syst. Conf.","author":"Freyhof"},{"volume-title":"Researching Information Systems and Computing","year":"2022","author":"Oates","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10488-013-0528-y"},{"volume-title":"Top 10 Agricultural Equipment Manufacturers in World","year":"2025","author":"Chakravarty","key":"ref37"},{"volume-title":"15 Biggest Agricultural Companies in the U.S.","year":"2023","author":"Zafar","key":"ref38"},{"volume-title":"ApkTool\u2013Install Guide","year":"2025","key":"ref39"},{"volume-title":"Axmldec 1.2.0","year":"2025","key":"ref40"},{"volume-title":"Mobile Security Framework","year":"2025","key":"ref41"},{"volume-title":"OstorLab\u2013mobile Security Testing Automation for Android and Ios","year":"2025","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/s24175465"},{"volume-title":"SSL Server Test","year":"2025","key":"ref44"},{"volume-title":"SSL Server Rating Guide","year":"2025","key":"ref45"},{"volume-title":"Exodus Privacy","year":"2025","key":"ref46"},{"volume-title":"Google Play: Pcapdroid-network Monitor","year":"2025","key":"ref47"},{"volume-title":"PCAPdroid","year":"2025","author":"Emanuele","key":"ref48"},{"volume-title":"Permissions on Android","year":"2025","key":"ref49"},{"volume-title":"An Analysis of Android App Permissions","year":"2015","author":"Kenneth","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295141"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"volume-title":"Google Discloses Man-in-the-Disk Attack Flaw in Fortnite Android App","year":"2018","key":"ref53"},{"volume-title":"Location Tracking","year":"2017","key":"ref54"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"volume-title":"Meet Google Play\u2019s Target Api Level Requirement","year":"2025","key":"ref57"},{"volume-title":"Special Publication 800-124r2: Guidelines for Managing the Security of Mobile Devices in the Enterprise","year":"2023","key":"ref58"},{"volume-title":"CVE-2015-6609","year":"2025","key":"ref59"},{"volume-title":"Cleartext Communications","year":"2025","key":"ref60"},{"volume-title":"CVE-2016\u20135696","year":"2025","key":"ref61"},{"volume-title":"Cwe Top 25 Most Dangerous Software Weaknesses","year":"2024","key":"ref62"},{"volume-title":"CWE-532: Insertion of Sensitive Information Into Log File","year":"2025","key":"ref63"},{"volume-title":"CWE-312: Cleartext Storage of Sensitive Information","year":"2025","key":"ref64"},{"volume-title":"CWE-276: Incorrect Default Permissions","year":"2025","key":"ref65"},{"volume-title":"Privilege Escalation","year":"2025","key":"ref66"},{"volume-title":"CWE-327: Use of a Broken or Risky Cryptographic Algorithm","year":"2025","key":"ref67"},{"volume-title":"Janus Android Vulnerability Allows App Modifications","year":"2017","key":"ref68"},{"volume-title":"Android Security Bulletin","year":"2017","key":"ref69"},{"volume-title":"PDP Law Implementing Regulation Forthcoming, but Data Breach Fines Still Unclear","year":"2024","key":"ref70"},{"volume-title":"Indonesia: Personal Data Protection Act Enters Into Force","year":"2022","key":"ref71"},{"volume-title":"Firebase Crashlytics","year":"2025","key":"ref72"},{"volume-title":"Google Analytics","year":"2025","key":"ref73"},{"volume-title":"Privacy and Security in Firebase","year":"2025","key":"ref74"},{"volume-title":"Misconfigured Firebase Instances Expose 125 Million User Records","year":"2024","author":"Arghire","key":"ref75"},{"volume-title":"Misconfigured Firebase Instances Leaked 19 Million Plaintext Passwords","year":"2024","author":"Ilascu","key":"ref76"},{"volume-title":"Mapbox Navigation","year":"2025","key":"ref77"},{"volume-title":"AltBeacon Protocol Specification","year":"2025","key":"ref78"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23353"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"volume-title":"Okta Documentation","year":"2025","key":"ref81"},{"volume-title":"Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Critical Seasons","year":"2022","key":"ref82"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11059874.pdf?arnumber=11059874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T23:20:16Z","timestamp":1752103216000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11059874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":82,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3584673","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}