Safeguarding Mobile Users from Violation by Third-party Apps
Abstract
Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on guidelines for safeguarding mobile users from violations by third-party apps. In this regard, empirical data was collected through questionnaires developed to determine the necessary themes that led to the development of the recommendations. The findings showed that a large percentage of participants are not aware of basic security methods to safeguard themselves. Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users’ continuous access to services. Since the findings align to the Confidentiality, Integrity, and Availability (CIA) triad framework, then the recommendations were made as an implementation strategy of the CIA triad for safeguarding mobile users against violation by the third-party apps. Mobile users will benefit immensely on the recommendations as empower them as the first line of defense against cybercrimes.
Downloads
References
Napoleoncat statistics. https://napoleoncat.com/stats/facebook-users-in-south_africa/2023/12/
T. Michael. Data privacy and security: Why mobile apps are the new weak link. Infosecurity Magazine. 2019. https://www.infosecurity-magazine.com/next-gen-infosec/privacy-mobile-apps-weak-link-1-1/
K. O'Loughlin, M. Neary, E.C. Adkins, S.M. Schueller. Reviewing the data security and privacy policies of mobile apps for depression. Internet interventions, 15, pp.110-115, 2019.
A. Nair. Research Recommendations – Guiding policy-makers for evidence-based decision making. Enago. 2024 https://www.enago.com/academy/recommendation-in-research/
J. Moreno, M. Serrano, E. Fernández-Medina. Main issues in big data security. Future Internet, 8(3), pp.44, 2016. https://doi.org/10.3390/fi8030044
M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S. Albahri, A.H. Alamoodi, M.L.M. Kiah, F.M. Jumaah, M. Alaa. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommunication Systems, 72, pp.285-337, 2019.
A. Mathur, G. Acar, M.J. Friedman, E. Lucherini, J. Mayer, M. Chetty, A. Narayanan. Dark patterns at scale: Findings from a crawl of 11K shopping websites. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), pp.1-32, 2019.
P. Maroufkhani, R. Wagner, W.K. Wan Ismail, M.B. Baroto, M. Nourani. Big data analytics and firm performance: A systematic review. Information, 10(7), p.226, 2019.
W.P. Wong, H.C. Tan, K.H. Tan, M.L. Tseng. Human factors in information leakage: mitigation strategies for information sharing integrity. Industrial Management & Data Systems, 119(6), pp.1242-1267, 2019.
B. Awojobi, J. Ding. Data Security and Privacy. Cybersecurity for Information Professionals: Concepts and Applications, 291, 2020.
C. Tode. 5 legal issues that could impede mobile marketing’s progress. Marketing Dive, 2023. Available at: https://www.marketingdive.com/ex/mobilemarketer/cms/news/legal-privacy/10035.html.
M. Christian. Information security and privacy in a digital world: A human challenge. TUprints TU Darmstadt publication service, 2022. TUprints. https://tuprints.ulb.tu-darmstadt.de/21138/
L. Yin, B. Fang, Y. Guo, Z. Sun, Z. Tian. Hierarchically defining the Internet of Things security: From CIA to CACA. International Journal of Distributed Sensor Networks, 16(1), 2020.
C.K. Yee, M.F. Zolkipli. Review on Confidentiality, Integrity, and Availability in Information Security. Journal of ICT in Education, 8(2), pp.34-42, 2021.
I. Yaqoob, I.A.T. Hashem, A. Gani, S. Mokhtar, E. Ahmed, N.B. Anuar, A.V. Vasilakos. Big data: From beginning to future
W. J. Gordon, A. Landman, H. Zhang, D.W. Bates. Beyond validation: getting health apps into clinical practice. NPJ digital medicine, 3(1), pp.14, 2020.
M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S. Albahri, A.H. Alamoodi, M.L.M. Kiah, F.M. Jumaah, M. Alaa. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommunication Systems, 72, pp.285-337, 2019.
D. Trabucchi, T. Buganza, E. Pellizzoni. Give Away Your Digital Services: Leveraging Big Data to Capture Value New models that capture the value embedded in the data generated by digital services may make it viable for companies to offer those services for free. Research-Technology Management, 60(2), pp. 43-52, 2017. https://doi.org/10.1080/08956308.2017.1276390
S. Herath, H. Gelman, L. McKee. Privacy Harm and Non-Compliance from a Legal Perspective. Journal of Cybersecurity Education, Research and Practice, 3(2), 2023.
Z.B. Akhtar. Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques. International Journal of Advanced Network, Monitoring and Controls, 9(1), pp.
D. Hayes, F. Cappa, N. A. Le-Khac. An effective approach to mobile device management: Security and privacy issues associated with mobile applications. Digital Business, 1(1), 2020.
P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, K. Beznosov. Android permissions remystified: A field study on contextual integrity. In 24th USENIX Security Symposium (USENIX Security 15), pp. 499-514, 2015.
Copyright (c) 2025 Latin American Journal of Computing
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This article is published by LAJC under a Creative Commons Attribution-Non-Commercial-Share-Alike 4.0 International License. This means that non-exclusive copyright is transferred to the National Polytechnic School. The Author (s) give their consent to the Editorial Committee to publish the article in the issue that best suits the interests of this Journal. Find out more in our Copyright Notice.
Disclaimer
LAJC in no event shall be liable for any direct, indirect, incidental, punitive, or consequential copyright infringement claims related to articles that have been submitted for evaluation, or published in any issue of this journal. Find out more in our Disclaimer Notice.