Safeguarding Mobile Users from Violation by Third-party Apps

Keywords: CIA cybersecurity, third-party apps security., third-party apps security

Abstract

Insecure third-party mobile applications (apps) can have a detrimental impact on mobile users in terms of information security and data privacy. Insufficient protection for third-party mobile apps platforms may result in harmful installations. The purpose of this paper was to make recommendation on guidelines for safeguarding mobile users from violations by third-party apps. In this regard, empirical data was collected through questionnaires developed to determine the necessary themes that led to the development of the recommendations. The findings showed that a large percentage of participants are not aware of basic security methods to safeguard themselves. Secondly, there is a need for increased confidence in data integrity protocols, and the necessity to ability for emphasizing strong availability controls and backup strategies for mobile users’ continuous access to services. Since the findings align to the Confidentiality, Integrity, and Availability (CIA) triad framework, then the recommendations were made as an implementation strategy of the CIA triad for safeguarding mobile users against violation by the third-party apps. Mobile users will benefit immensely on the recommendations as empower them as the first line of defense against cybercrimes.

Downloads

Download data is not yet available.

References

Napoleoncat statistics. https://napoleoncat.com/stats/facebook-users-in-south_africa/2023/12/

T. Michael. Data privacy and security: Why mobile apps are the new weak link. Infosecurity Magazine. 2019. https://www.infosecurity-magazine.com/next-gen-infosec/privacy-mobile-apps-weak-link-1-1/

K. O'Loughlin, M. Neary, E.C. Adkins, S.M. Schueller. Reviewing the data security and privacy policies of mobile apps for depression. Internet interventions, 15, pp.110-115, 2019.

A. Nair. Research Recommendations – Guiding policy-makers for evidence-based decision making. Enago. 2024 https://www.enago.com/academy/recommendation-in-research/

J. Moreno, M. Serrano, E. Fernández-Medina. Main issues in big data security. Future Internet, 8(3), pp.44, 2016. https://doi.org/10.3390/fi8030044

M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S. Albahri, A.H. Alamoodi, M.L.M. Kiah, F.M. Jumaah, M. Alaa. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommunication Systems, 72, pp.285-337, 2019.

A. Mathur, G. Acar, M.J. Friedman, E. Lucherini, J. Mayer, M. Chetty, A. Narayanan. Dark patterns at scale: Findings from a crawl of 11K shopping websites. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), pp.1-32, 2019.

P. Maroufkhani, R. Wagner, W.K. Wan Ismail, M.B. Baroto, M. Nourani. Big data analytics and firm performance: A systematic review. Information, 10(7), p.226, 2019.

W.P. Wong, H.C. Tan, K.H. Tan, M.L. Tseng. Human factors in information leakage: mitigation strategies for information sharing integrity. Industrial Management & Data Systems, 119(6), pp.1242-1267, 2019.

B. Awojobi, J. Ding. Data Security and Privacy. Cybersecurity for Information Professionals: Concepts and Applications, 291, 2020.

C. Tode. 5 legal issues that could impede mobile marketing’s progress. Marketing Dive, 2023. Available at: https://www.marketingdive.com/ex/mobilemarketer/cms/news/legal-privacy/10035.html.

M. Christian. Information security and privacy in a digital world: A human challenge. TUprints TU Darmstadt publication service, 2022. TUprints. https://tuprints.ulb.tu-darmstadt.de/21138/

L. Yin, B. Fang, Y. Guo, Z. Sun, Z. Tian. Hierarchically defining the Internet of Things security: From CIA to CACA. International Journal of Distributed Sensor Networks, 16(1), 2020.

C.K. Yee, M.F. Zolkipli. Review on Confidentiality, Integrity, and Availability in Information Security. Journal of ICT in Education, 8(2), pp.34-42, 2021.

I. Yaqoob, I.A.T. Hashem, A. Gani, S. Mokhtar, E. Ahmed, N.B. Anuar, A.V. Vasilakos. Big data: From beginning to future

W. J. Gordon, A. Landman, H. Zhang, D.W. Bates. Beyond validation: getting health apps into clinical practice. NPJ digital medicine, 3(1), pp.14, 2020.

M. Talal, A.A. Zaidan, B.B. Zaidan, O.S. Albahri, M.A. Alsalem, A.S. Albahri, A.H. Alamoodi, M.L.M. Kiah, F.M. Jumaah, M. Alaa. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommunication Systems, 72, pp.285-337, 2019.

D. Trabucchi, T. Buganza, E. Pellizzoni. Give Away Your Digital Services: Leveraging Big Data to Capture Value New models that capture the value embedded in the data generated by digital services may make it viable for companies to offer those services for free. Research-Technology Management, 60(2), pp. 43-52, 2017. https://doi.org/10.1080/08956308.2017.1276390

S. Herath, H. Gelman, L. McKee. Privacy Harm and Non-Compliance from a Legal Perspective. Journal of Cybersecurity Education, Research and Practice, 3(2), 2023.

Z.B. Akhtar. Securing Operating Systems (OS): A Comprehensive Approach to Security with Best Practices and Techniques. International Journal of Advanced Network, Monitoring and Controls, 9(1), pp.

D. Hayes, F. Cappa, N. A. Le-Khac. An effective approach to mobile device management: Security and privacy issues associated with mobile applications. Digital Business, 1(1), 2020.

P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, K. Beznosov. Android permissions remystified: A field study on contextual integrity. In 24th USENIX Security Symposium (USENIX Security 15), pp. 499-514, 2015.

Published
2025-01-07
How to Cite
[1]
V. Malele and K. Mphasane, “Safeguarding Mobile Users from Violation by Third-party Apps”, LAJC, vol. 12, no. 1, pp. 27-34, Jan. 2025.
Section
Research Articles for the Regular Issue