Enhancing the Usability of Android Application Permission Model

  • Zeeshan Haider MalikEmail author
  • Habiba Farzand
  • Zahra Shafiq
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 887)


Visualization is an encouraging tool for the study and understanding of text. Effective Visualization refers to visualization of data in a way that it requires minimal training for the user and is easy to understand. Keeping in consideration the user privacy and concern when it comes to android application permission model, the textual representation of permissions is transformed into visualization and the effect is examined deeply. The results depict that the purpose of visualization has been achieved. With the use of technique of visualization, users read, understand, acknowledge and are more aware about the permissions being accessed by the application.


Android permission model Textual vs. visualization Usable security and privacy Human-centric computing 



We would like to use this opportunity to express our gratitude to Dr. Nazim Ashraf for his support in the development of the Exclusive Visual App Store. We would also like to thank all the participants who took part in the study.


  1. 1.
    Liu, B., et al.: Follow my recommendations: a personalized privacy assistant for mobile app permissions. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), June 2016Google Scholar
  2. 2.
    Johnson, R., Wang, Z., Gagnon, C., Stavrou, A.: Analysis of Android applications’ permissions. In: Proceedings of the 2012 IEEE 6th International Conference on Software Security and Reliability Companion (2012)Google Scholar
  3. 3.
    Benton, K., Camp, L., Garg, V.: Studying the effectiveness of Android application permissions requests. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) (2013)Google Scholar
  4. 4.
    Muska, P., Varga, J.: Presenting risks introduced by Android application permissions in a user-friendly way. Tatra Mt. Math. Publ. 60, 85–100 (2014)Google Scholar
  5. 5.
    Porter, A., Ha, F., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (2012)Google Scholar
  6. 6.
    Egners, A., Marschollek, B., Meyer, U.: Messing with Android’s permission model. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Apr 2012Google Scholar
  7. 7.
    Au, K.W.Y., Zhou, Y.F., Huang, Z., Gill, P., Lie, D.: Short paper: a look at smartphone permission models. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2008)Google Scholar
  8. 8.
    Brooke, J.: SUS—a quick and dirty usability scale. In: Jordan, P.W., Thomas, B., Weerdmeester, B.A., McClelland, A.L. (eds.) Usability Evaluation in Industry, vol. 189, pp. 4–7. Taylor and Francis, London (1996)Google Scholar
  9. 9.
    Pouchter, J.: Smartphone Ownership and Internet Usage Continues to Climb in Emerging Economies. Pew Research Center, Washington (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Zeeshan Haider Malik
    • 1
    Email author
  • Habiba Farzand
    • 1
  • Zahra Shafiq
    • 1
  1. 1.Computer Science DepartmentForman Christian College (A Chartered University)LahorePakistan

Personalised recommendations