{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T11:11:33Z","timestamp":1753182693894,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3197231.3197236","type":"proceedings-article","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T13:02:25Z","timestamp":1532350945000},"page":"45-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["An investigation into Android run-time permissions from the end users' perspective"],"prefix":"10.1145","author":[{"given":"Gian Luca","family":"Scoccia","sequence":"first","affiliation":[{"name":"Gran Sasso Science Institute, L'Aquila, Italy"}]},{"given":"Stefano","family":"Ruberto","sequence":"additional","affiliation":[{"name":"Gran Sasso Science Institute, L'Aquila, Italy"}]},{"given":"Ivano","family":"Malavolta","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, The Netherlands"}]},{"given":"Marco","family":"Autili","sequence":"additional","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]},{"given":"Paola","family":"Inverardi","sequence":"additional","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/developer.android.com\/training\/permissions\/requesting.html#perm-check. Online","author":"Requesting","year":"2017","unstructured":"Requesting permissions at run time. https:\/\/developer.android.com\/training\/permissions\/requesting.html#perm-check. Online ; accessed 12- January - 2017 . Requesting permissions at run time. https:\/\/developer.android.com\/training\/permissions\/requesting.html#perm-check. Online; accessed 12-January-2017."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.85"},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous. Online","author":"Normal","year":"2017","unstructured":"Normal and dangerous permissions. https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous. Online ; accessed 12- January - 2017 . Normal and dangerous permissions. https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html#normal-dangerous. Online; accessed 12-January-2017."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/developer.android.com\/training\/permissions\/requesting.html. Online","author":"Requesting","year":"2017","unstructured":"Requesting permissions at run time. https:\/\/developer.android.com\/training\/permissions\/requesting.html. Online ; accessed 24- October - 2017 . Requesting permissions at run time. https:\/\/developer.android.com\/training\/permissions\/requesting.html. Online; accessed 24-October-2017."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering - An Introduction","author":"Wohlin C.","year":"2012","unstructured":"C. Wohlin , P. Runeson , M. H\u00f6st , M.C. Ohlsson , B. Regnell , and A. Wessl\u00e9n . Experimentation in Software Engineering - An Introduction . Kluwer Academic Publishers , 2012 . C. Wohlin, P. Runeson, M. H\u00f6st, M.C. Ohlsson, B. Regnell, and A. Wessl\u00e9n. Experimentation in Software Engineering - An Introduction. Kluwer Academic Publishers, 2012."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1324786"},{"key":"e_1_3_2_1_11_1","unstructured":"Distribution of free and paid android apps in the google play store from 3rd quarter 2017 to 4th quarter 2017. https:\/\/www.statista.com\/statistics\/266211\/distribution-of-free-and-paid-android-apps\/. Accessed: 2018-03-09.  Distribution of free and paid android apps in the google play store from 3rd quarter 2017 to 4th quarter 2017. https:\/\/www.statista.com\/statistics\/266211\/distribution-of-free-and-paid-android-apps\/. Accessed: 2018-03-09."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820518.2820535"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.101"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993259.2993262"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568263"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2013.6488439"},{"key":"e_1_3_2_1_17_1","volume-title":"Modern information retrieval","author":"Baeza-Yates Ricardo","year":"1999","unstructured":"Ricardo Baeza-Yates , Berthier Ribeiro-Neto , Modern information retrieval , volume 463 . 1999 . Ricardo Baeza-Yates, Berthier Ribeiro-Neto, et al. Modern information retrieval, volume 463. 1999."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3115\/1225403.1225421"},{"key":"e_1_3_2_1_20_1","series-title":"Series B (Methodological)","first-page":"111","volume-title":"Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society","author":"Stone Mervyn","year":"1974","unstructured":"Mervyn Stone . Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society . Series B (Methodological) , pages 111 -- 147 , 1974 . Mervyn Stone. Cross-validatory choice and assessment of statistical predictions. Journal of the royal statistical society. Series B (Methodological), pages 111--147, 1974."},{"key":"e_1_3_2_1_21_1","unstructured":"Daniel Jurafsky and James H Martin. Speech and language processing: An introduction to natural language processing computational linguistics and speech recognition.   Daniel Jurafsky and James H Martin. Speech and language processing: An introduction to natural language processing computational linguistics and speech recognition."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320414"},{"key":"e_1_3_2_1_23_1","first-page":"163","volume-title":"A survey of text classification algorithms. Mining text data","author":"Aggarwal Charu C","year":"2012","unstructured":"Charu C Aggarwal and ChengXiang Zhai . A survey of text classification algorithms. Mining text data , pages 163 -- 222 , 2012 . Charu C Aggarwal and ChengXiang Zhai. A survey of text classification algorithms. Mining text data, pages 163--222, 2012."},{"key":"e_1_3_2_1_24_1","volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media","author":"Bird Steven","year":"2009","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media , Inc .\", 2009 . Steven Bird, Ewan Klein, and Edward Loper. Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media, Inc.\", 2009."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2517747"},{"key":"e_1_3_2_1_26_1","volume-title":"Classification and regression trees. monterey, calif., usa: Wadsworth","author":"Breiman L","year":"1984","unstructured":"L Breiman , JH Friedman , RA Olshen , and CJ Stone . Classification and regression trees. monterey, calif., usa: Wadsworth , 1984 . L Breiman, JH Friedman, RA Olshen, and CJ Stone. Classification and regression trees. monterey, calif., usa: Wadsworth, 1984."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781315399102","volume-title":"Data mining with R: learning with case studies","author":"Torgo Luis","year":"2016","unstructured":"Luis Torgo . Data mining with R: learning with case studies . CRC press , 2016 . Luis Torgo. Data mining with R: learning with case studies. CRC press, 2016."},{"key":"e_1_3_2_1_28_1","first-page":"137","volume-title":"Text categorization with support vector machines: Learning with many relevant features. Machine learning: ECML-98","author":"Joachims Thorsten","year":"1998","unstructured":"Thorsten Joachims . Text categorization with support vector machines: Learning with many relevant features. Machine learning: ECML-98 , pages 137 -- 142 , 1998 . Thorsten Joachims. Text categorization with support vector machines: Learning with many relevant features. Machine learning: ECML-98, pages 137--142, 1998."},{"key":"e_1_3_2_1_29_1","volume-title":"Nonparametric statistics: A step-by-step approach","author":"Corder Gregory W","year":"2014","unstructured":"Gregory W Corder and Dale I Foreman . Nonparametric statistics: A step-by-step approach . John Wiley & Sons , 2014 . Gregory W Corder and Dale I Foreman. Nonparametric statistics: A step-by-step approach. John Wiley & Sons, 2014."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_3_2_1_31_1","first-page":"91","volume-title":"Proceedings of the Web","volume":"2","author":"Vidas Timothy","year":"2011","unstructured":"Timothy Vidas , Nicolas Christin , and Lorrie Cranor . Curbing android permission creep . In Proceedings of the Web , volume 2 , pages 91 -- 96 , 2011 . Timothy Vidas, Nicolas Christin, and Lorrie Cranor. Curbing android permission creep. In Proceedings of the Web, volume 2, pages 91--96, 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818768"},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/developer.android.com\/training\/permissions\/usage-notes.html. Online","author":"Permissions","year":"2017","unstructured":"Permissions usage notes. https:\/\/developer.android.com\/training\/permissions\/usage-notes.html. Online ; accessed 24- October - 2017 . Permissions usage notes. https:\/\/developer.android.com\/training\/permissions\/usage-notes.html. Online; accessed 24-October-2017."},{"key":"e_1_3_2_1_34_1","volume-title":"Donald Thomas Campbell, and Arles Day. Quasi-experimentation: Design & analysis issues for field settings","author":"Cook Thomas D","year":"1979","unstructured":"Thomas D Cook , Donald Thomas Campbell, and Arles Day. Quasi-experimentation: Design & analysis issues for field settings , volume 351 . Houghton Mifflin Boston , 1979 . Thomas D Cook, Donald Thomas Campbell, and Arles Day. Quasi-experimentation: Design & analysis issues for field settings, volume 351. Houghton Mifflin Boston, 1979."},{"key":"e_1_3_2_1_35_1","volume-title":"Gartner says free apps will account for nearly 90 percent of total mobile app store downloads","author":"Gartner Inc","year":"2012","unstructured":"Inc Gartner . Gartner says free apps will account for nearly 90 percent of total mobile app store downloads in 2012 , 2012. http:\/\/www.gartner.com\/newsroom\/id\/2153215. Inc Gartner. Gartner says free apps will account for nearly 90 percent of total mobile app store downloads in 2012, 2012. http:\/\/www.gartner.com\/newsroom\/id\/2153215."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823922"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_42"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3063155.3063211"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2487044"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2014.50"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9375-7"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197231.3197251"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837112"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 5th International Conference on Mobile Software Engineering and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197231.3197236","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3197231.3197236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:17Z","timestamp":1750212437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197231.3197236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":43,"alternative-id":["10.1145\/3197231.3197236","10.1145\/3197231"],"URL":"https:\/\/doi.org\/10.1145\/3197231.3197236","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}