skip to main content
10.1145/3494885.3494931acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsseConference Proceedingsconference-collections
research-article

The Assessment Method of Mobile privacy security Based on AHP and Risk Matrix

Published: 20 December 2021 Publication History
First page of PDF

References

[1]
Zhang Tao. Research on risk factors and risk assessment methods of user privacy disclosure in mobile commerce [D]. Yunnan University of Finance and economics, 2021.
[2]
Farid S., Amna I. Community clouds within M-commerce: a privacy by design perspective[J]. Journal of Cloud Computing, 2017, 6(1):22-33
[3]
Yosef A., Qusay H. Cyber physical systems security: Analysis, challenges and solutions[J]. Computers & Security, 2017, 68:81-97.
[4]
Anabel G., Simon R., Yogesh K. Dwivedi, Tatiana C. Using privacy calculus theory to explore entrepreneurial directions in mobile location-based advertising: Identifying intrusiveness as the critical risk factor[J]. Computers in Human Behavior, 2019, 95:295-306.
[5]
Wang Chi-Heng, Chen Jing, Su Han Mobile advertising Loophole attack technology based on host app's permission [J]. Journal of software, 2018, 29 (05): 1392-1409.
[6]
Zhu Hou,Zhang Ming-Xin. Research on influencing factors and configuration effects of privacy information setting behavior of mobile app users [J]. Information science, 2021,39 (07): 54-62.
[7]
Mylonas A., Theoharidou M., Gritzalis D. Assessing privacy risks in android: A user-centric approach[C]. International Workshop on Risk Assessment and Risk-driven Testing. Springer, Cham, 2013: 21-37.
[8]
Liu Bai-Ling, Yang Shi-Long, Li Yan-Hui. Empirical Study on the impact and interaction of privacy preference setting and privacy feedback on Mobile Commerce Users' behavior intention [J]. China management science, 2018, 26 (08): 164-178.
[9]
Gao T., Li T., Yang M., et al. Research on a Trustworthiness Measurement Method of Cloud Service Construction Processes Based on Information Entropy[J]. Entropy, 2019, 21(5): 462.
[10]
Zhu Guang, Feng mining, CHEN Ye, Yang Jiayun. Research on fuzzy evaluation of privacy risk of social networks in big data environment [J]. Situation Journal of science, 2016, 34 (09): 94-98.
[11]
Yang M, Jia L, Xie W, Research on Risk Assessment Model of Epidemic Diseases in a Certain Region Based on Markov Chain and AHP[J]. IEEE Access, 2021, PP(99):75826-75839.
[12]
Yang Ming, Li Tie-bing, Jiang Rong, Research on model of Big data Usability and mining strategy based on AHP [J]. Computer technology and development, 2018, 28 (05): 57-60 + 64.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSSE '21: Proceedings of the 4th International Conference on Computer Science and Software Engineering
October 2021
366 pages
ISBN:9781450390675
DOI:10.1145/3494885
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 December 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AHP
  2. Mobile privacy security
  3. Risk Matrix
  4. Security assessment

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CSSE 2021

Acceptance Rates

Overall Acceptance Rate 33 of 74 submissions, 45%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media