ISSN:1390-9266 e-ISSN:1390-9134 LAJC 2025
33
DOI:
LATIN-AMERICAN JOURNAL OF COMPUTING (LAJC), Vol XII, Issue 1, January 2025
10.5281/zenodo.14448505
V. Malele, and K. Mphsane,
“Safeguarding Mobile Users from Violation by Third-party Apps”,
Latin-American Journal of Computing (LAJC), vol. 12, no. 1, 2025.
R
EFERENCES
[1] Napoleoncat statistics. https://napoleoncat.com/stats/facebook-users-
in-south_africa/2023/12/
[2] T. Michael. Data privacy and security: Why mobile apps are the new
weak link. Infosecurity Magazine. 2019. https://www.infosecurity-
magazine.com/next-gen-infosec/privacy-mobile-apps-weak-link-1-1/
[3] K. O'Loughlin, M. Neary, E.C. Adkins, S.M. Schueller. Reviewing the
data security and privacy policies of mobile apps for depression.
Internet interventions, 15, pp.110-115, 2019.
[4] A. Nair. Research Recommendations – Guiding policy-makers for
evidence-based decision making. Enago. 2024
https://www.enago.com/academy/recommendation-in-research/
[5] J. Moreno, M. Serrano, E. Fernández-Medina. Main issues in big data
security. Future Internet, 8(3), pp.44, 2016.
https://doi.org/10.3390/fi8030044
[6] M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S.
Albahri, A.H. Alamoodi, M.L.M. Kiah, F.M. Jumaah, M. Alaa.
Comprehensive review and analysis of anti-malware apps for
smartphones. Telecommunication Systems, 72, pp.285-337, 2019.
[7] A. Mathur, G. Acar, M.J. Friedman, E. Lucherini, J. Mayer, M. Chetty,
A. Narayanan. Dark patterns at scale: Findings from a crawl of 11K
shopping websites. Proceedings of the ACM on Human-Computer
Interaction, 3(CSCW), pp.1-32, 2019.
[8] P. Maroufkhani, R. Wagner, W.K. Wan Ismail, M.B. Baroto, M.
Nourani. Big data analytics and firm performance: A systematic
review. Information, 10(7), p.226, 2019.
[9] W.P. Wong, H.C. Tan, K.H. Tan, M.L. Tseng. Human factors in
information leakage: mitigation strategies for information sharing
integrity. Industrial Management & Data Systems, 119(6), pp.1242-
1267, 2019.
[10] B. Awojobi, J. Ding. Data Security and Privacy. Cybersecurity for
Information Professionals: Concepts and Applications, 291, 2020.
[11] C. Tode. 5 legal issues that could impede mobile marketing’s progress.
Marketing Dive, 2023. Available at:
https://www.marketingdive.com/ex/mobilemarketer/cms/news/legal-
privacy/10035.html.
[12] M. Christian. Information security and privacy in a digital world: A
human challenge. TUprints TU Darmstadt publication service, 2022.
TUprints. https://tuprints.ulb.tu-darmstadt.de/21138/
[13] L. Yin, B. Fang, Y. Guo, Z. Sun, Z. Tian. Hierarchically defining the
Internet of Things security: From CIA to CACA. International Journal
of Distributed Sensor Networks, 16(1), 2020.
[14] C.K. Yee, M.F. Zolkipli. Review on Confidentiality, Integrity, and
Availability in Information Security. Journal of ICT in Education, 8(2),
pp.34-42, 2021.
[15] I. Yaqoob, I.A.T. Hashem, A. Gani, S. Mokhtar, E. Ahmed, N.B.
Anuar, A.V. Vasilakos. Big data: From beginning to future
[16] W. J. Gordon, A. Landman, H. Zhang, D.W. Bates. Beyond validation:
getting health apps into clinical practice. NPJ digital medicine, 3(1),
pp.14, 2020.
[17] M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S.
Albahri, A.H. Alamoodi, M.L.M. Kiah, F.M. Jumaah, M. Alaa.
Comprehensive review and analysis of anti-malware apps for
smartphones. Telecommunication Systems, 72, pp.285-337, 2019.
[18] D. Trabucchi, T. Buganza, E. Pellizzoni. Give Away Your Digital
Services: Leveraging Big Data to Capture Value New models that
capture the value embedded in the data generated by digital services
may make it viable for companies to offer those services for
free. Research-Technology Management, 60(2), pp. 43-52, 2017.
https://doi.org/10.1080/08956308.2017.1276390
[19] S. Herath, H. Gelman, L. McKee. Privacy Harm and Non-Compliance
from a Legal Perspective. Journal of Cybersecurity Education,
Research and Practice, 3(2), 2023.
[20] Z.B. Akhtar. Securing Operating Systems (OS): A Comprehensive
Approach to Security with Best Practices and Techniques. International
Journal of Advanced Network, Monitoring and Controls, 9(1), pp.
[21] D. Hayes, F. Cappa, N. A. Le-Khac. An effective approach to mobile
device management: Security and privacy issues associated with
mobile applications. Digital Business, 1(1), 2020.
[22] P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, K.
Beznosov. Android permissions remystified: A field study on
contextual integrity. In 24th USENIX Security Symposium (USENIX
Security 15), pp. 499-514, 2015.