Users Comprehension and Behaviour Study on Android Permissions





The Android Market has become the main source of applications (apps) download for Android based devices. The majority of users trust that the apps that they downloaded are safe and trustworthy. However, it is not always the case since a large numbers of apps contain several unnecessary permissions that will potentially provide threats to the users’ privacy and security by stealing their important data, and also offer services that will cost money to the users. The main objective of this paper is to investigate the level of knowledge, understanding and behaviour of the users towards these permissions. The results obtained show that the awareness regarding these permissions among the users is still low and they need to be warned against the potential threats of these permissions to ensure that they can make a more informed decisions whether to install the apps or not.


[2] M. Butler, “Android: Changing the Mobile Landscape”, Pervasive Computing, January-March 2011, pp. 4-7.
[3] A. Felt, E. Ha, S. Egelman, A. Hanet, E. Chin and D. Wagner, “Android permissions: User attention, comprehension and behaviour”, Technical Report No. UCB/EECS-2012-26, 2012. University of California at Berkeley.
[4] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, D. Wetherall, “A conundrum of permissions: Installing applications on an Android smartphone”, LC 2012 Workshops, LNCS 7398, pp. 68-79, 2012.
[5] A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. “Android permissions demystified”. In CCS '11, pages 627-638, New York, NY, USA, 2011.
[6] R. Stevens, J. Ganz, V. Filkov, P. Devanbu and H. Chen, “Asking for (and about) permissions used by Android apps”, Mining Software Repositories (MSR) 2013, San Francisco, California, May 2013.
[7] T. Vidas, N. Christin and L. F. Cranor, “Curbing Android permission creep”, Proccedings of the 2011 Web 2.0 Security and Privacy Workshop. Oakland, California, May 2011.
[8] J.Kang, S.Seo, J.W.-K Hong, "Usage pattern analysis of smartphones," Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific, Vol., no., pp.1-8, 21-23 Sept. 2011.
[9] N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, “Stealthy video capturer: a new video-based spyware in 3G smartphones.” Proceedings of the second ACM conference on Wireless network security (WiSec '09). ACM, New York, NY, USA, 69-78, 2009.
[10] J. Sellwood and J. Crampton, “Sleeping Android: The Danger of Dormant Permissions”, SPSM’13, Berlin, Germany, 55-66, November 8, 2013.
[11] L. Kraus, I. Wechsung and S. Möller, “Using Statistical Information to Communicate Android Permission Risks to Users”, 4th Workshop on Socio-Technical Aspects in Security and Trust, Vienna, Austria, 49-55, 2014.
[12] D. Bornstein, Dalvik vm internals (2008), (accessed May 25, 2016)
[13] C. Gibler, J. Crussell, J. Erickson and H. Chen, “AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale”, TRUST 2012, LNCS 7344, pp. 291-307, 2012.
[14] Android developer reference, (accessed April 10, 2016)




How to Cite

AWANG ABU BAKAR, N. S. (2016). Users Comprehension and Behaviour Study on Android Permissions. International Journal on Perceptive and Cognitive Computing, 2(2).

Most read articles by the same author(s)