Explore chapters and articles related to this topic
Various Shades of Intrusion: An Analysis of Grayware, Adsware, Spyware, and Other Borderline Android Apps
Published in Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos, Intrusion Detection and Prevention for Mobile Ecosystems, 2017
Andrea Saracino, Fabio Martinelli
As a matter of fact, we have witnessed in the last 2 years a progressive reduction of the paid apps on Google Play Store. Paid apps should be the most straightforward monetization strategy for app developers, that is, when a user wants to install an app in its device, the user will pay a price, specified by the app developer to Google Play Store, which will give the money to the developer, keeping a certain percentage. However, the greatest majority of apps can be downloaded completely for free, including the most popular ones. It is hence possible to infer that app sale is not the most common and rewarding monetization strategy. Several apps have replaced the price of the app with the possibility to buy additional app features, after the app has been installed for free. This strategy, known as in-app purchase, allows to generate much higher revenue than the app price itself. This model is also used by apps requiring periodic subscriptions to provide premium services, such as the extremely popular music streaming app Spotify, which removes advertisement between songs only to premium accounts, on a monthly fee.
Healthcare Data Analytics Over Big Data
Published in N. Jeyanthi, Kun Ma, Thinagaran Perumal, R. Thandeeswaran, Managing Security Services in Heterogenous Networks, 2020
When developing IoT applications, be sure to apply secure engineering practices to avoid vulnerabilities such as the OWASP Top Ten vulnerabilities. Just like devices, apps should also support secure authentication, both for the apps themselves and the users of the applications, by providing options such as 2FA and secure password recovery options.
Privacy risk in contact tracing systems
Published in Behaviour & Information Technology, 2023
Privacy risk is reduced when IT security is enhanced. Both centralised and decentralised approaches to automated contact tracing have security weaknesses. Restrict access in centralised systems to public health officials since proximity identifiers are linked to specific individuals. Automate data retention strategies to ensure location and contact histories are promptly and securely removed from client devices and central servers. Employ strong encryption on stored and transmitted application data to protect app user confidentiality. Identify, design, build, and implement security safeguards that counter known types of attacks, such as Bluetooth impersonation attacks (Antonioli, Tippenhauer, and Rasmussen 2020); relay attacks (Baumgärtner et al. 2020); phishing scams (Morgan 2020) and other Bluetooth (Gvili 2020) and ICT-specific security weaknesses. Conduct routine penetration testing (i.e. simulated attacks) and system audits to verify and continuously improve IT security.
Mobile Application User Experience Checklist: A Tool to Assess Attention to Core UX Principles
Published in International Journal of Human–Computer Interaction, 2021
Brianna Richardson, Marsha Campbell-Yeo, Michael Smit
Although Apple and Android operating systems have a variety of built in functions for accessibility, apps may not always be designed to utilize those functions appropriately or include basic accessibility features (Egorina, 2017). Thus, the fifth principle evaluates app accessibility through content, including language and photos or graphics (Egorina, 2017; Johnson, 2014), and app function based on recommendations from the Web Accessibility Initiative and User Agent Accessibility Guidelines (W3C, 2016). The sixth principle, credibility, addresses the trustworthiness of information presented by the app based on design elements and content transparency derived from recognized criteria to assess apps credibility (Jonas-Dwyer et al., 2012) and additional criteria adapted from credibility assessment of Web resources (Fogg, 2002; Hartley, 2016). The last principle is that an app should be valuable to its users. Without accessing market metrics or data from user studies, this is approximated using quantitative data easily accessible from the app store, such as number of reviews and downloads, as well as overall star rating. Additionally, value can be evaluated by assessing if the brand and content of an app is suitable for their target audience and the perceived needs and interests of the targeted audience (Walter, 2011). Table 1 (Appendix I) outlines each principle in the first iteration of MAUX-C-alpha and the number of items that correspond to each principle, which together provide an overall picture of the quality of the user experience.
Apps to increase student engagement: a case of textiles and apparel sustainability education
Published in International Journal of Fashion Design, Technology and Education, 2019
Apps are software applications that can be downloaded to devices, such as computers, mobile phones and tablets (Karch, 2016). Apps can be used in multiple ways, such as for communication and entertainment (e.g. Facebook and Twitter), as well as education (e.g. Wikipedia) (Zhang, Gupta, & Mohapatra, 2012). Jurate, Washington, Wankel, and Blessinger (2013) stated that mobile technologies can help professionals do their jobs more efficiently and effectively and can be used by educators to transform how they interact with students. Some corporations create apps for use by professionals; these industry-related apps (IRA) have more specific uses related to certain career fields.