Differences between Android and iPhone Users in Their Security and Privacy Awareness

  • Lena Reinfelder
  • Zinaida Benenson
  • Freya Gassmann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8647)


This work compares Android and iPhone users according to their security and privacy awareness when handling apps. Based on an online survey conducted with over 700 German respondents (mostly university students) we found out that Android users seem to be more aware of the risks associated with the app usage than iPhone users. For example, iPhone users almost never consider the possibility of apps sending premium-rate SMS or causing other hidden costs. Furthermore, Android users more often mention security, trust and privacy issues as important factors when they decide to use a new app. We hypothesize that the cause of these differences they are likely to arise through differences in app market policies, in app review processes and in presentation of data usage by the apps.


Smartphone iOS Android security awareness privacy awareness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Arthur, C., Dredge, S.: iOS v Android: Why Schmidt was wrong and developers still start on Apple (June 10, 2012),
  2. 2.
    Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012 (2012)Google Scholar
  3. 3.
    Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: SOUPS (2012)Google Scholar
  4. 4.
    Dediu, H.: Android economics: An introduction (April 2, 2012),
  5. 5.
    Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Apllications. In: NDSS (2011)Google Scholar
  6. 6.
    Elmer-DeWitt, P.: 6 ways iPhone and Android users differ (February 25, 2010),
  7. 7.
    Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: SPSM (2011)Google Scholar
  8. 8.
    Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. In: SOUPS (2012)Google Scholar
  9. 9.
    Google: Protect against harmful apps (February 28, 2014),
  10. 10.
    Han, J., Yan, Q., Gao, D., Zhou, J., Deng, R.H.: Comparing Mobile Privacy Protection through Cross-Platform Applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2013)Google Scholar
  11. 11.
    Kelley, P.G., Sadeh, L.F.C.N.: Privacy as part of the app decision-making process. In: ACM (2013)Google Scholar
  12. 12.
    Kelloway, E.K.: Using LISREL for Structural Equation Modeling. Sage, Thousand Oaks (1998)Google Scholar
  13. 13.
    King, J.: How Come I’m Allowing Strangers to Go Through My Phone?: Smart Phones and Privacy Expectations, under review (2012)Google Scholar
  14. 14.
    Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin’s studies. Tech. Rep. Paper 856, Carnegie Mellon University, Institute for Software Research (January 2005)Google Scholar
  15. 15.
    Leontiadis, I., Efstratiou, C., Picone, M., Mascolo, C.: Don’t kill my ads!: Balancing privacy in an ad-supported mobile application market. In: HotMobile (2012)Google Scholar
  16. 16.
    Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J.I., Zhang, J.: Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In: ACM UbiComp (2012),
  17. 17.
    Lipsman, A., Aquino, C.: 2013 Mobile Future in Focus (February 22, 2013),
  18. 18.
    Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15(4), 336–355 (2004)CrossRefGoogle Scholar
  19. 19.
    Mayring, P.: Qualitative Inhaltsanalyse, 11th edn. Beltz Verlag (2010)Google Scholar
  20. 20.
    Mylonas, A., Gritzalis, D., Tsoumas, B., Apostolopoulos, T.: A qualitative metrics vector for the awareness of smartphone security users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2013. LNCS, vol. 8058, pp. 173–184. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  21. 21.
    Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security Awareness in Smartphone Platforms 34, 47–66 (2013)Google Scholar
  22. 22.
    Percoco, N.J., Schulte, S.: Adventures in bouncerland. In: Black Hat USA (2012)Google Scholar
  23. 23.
    Pötzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  24. 24.
    Raphael, J.: How Google’s Android security is about to get even smarter (February 27, 2014),
  25. 25.
    Seriot, N.: iPhone Privacy. In: Black Hat USA (2010)Google Scholar
  26. 26.
  27. 27.
    Spreitzenbarth, M., Freiling, F.: Android malware on the rise. Tech. Rep. CS-2012-04, University of Erlangen (April 2012)Google Scholar
  28. 28.
    Travlos, D.: Five Reasons Why Google Android versus Apple iOS Market Share Numbers Don’t Matter (August 22, 2012),
  29. 29.
    Wang, T., Lu, K., Lu, L., Chung, S., Lee, W.: Jekyll on iOS: when benign apps become evil. Presented as Part of the 22nd USENIX Security Symposium, Washington D.C, USA (August 2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Lena Reinfelder
    • 1
  • Zinaida Benenson
    • 1
  • Freya Gassmann
    • 2
  1. 1.University of Erlangen-NurembergErlangenGermany
  2. 2.Saarland UniversitySaarbrueckenGermany

Personalised recommendations