Learn More
copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. Please cite this paper as: Mylonas A., Kastania A., Gritzalis D., " Delegate the smartphone user? Security awareness in smartphone platforms "(More)
most cases, these works may not be reposted without the explicit permission of the copyright holder. Abstract: The adoption of smartphones, devices transforming from simple communication devices to 'smart' and multipurpose devices, is constantly increasing. Amongst the main reasons are their small size, their enhanced functionality and their ability to host(More)
material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the(More)
The increasing presence of privacy violating apps in app marketplaces poses a significant privacy risk for smartphone users. Current approaches assessing privacy risk, lack user input, assuming that the value of each smartpho-ne sub-asset (e.g. contact list, usage history) is perceived similarly across users. Thus, per user privacy risk assessment is not(More)
Smartphones constantly interweave into everyday life, as they accompany individuals in different contexts. Smartphones include a combination of heterogeneous data sources, which can prove essential when combating crime. In this paper we examine potential evidence that may be collected from smartphones. We also examine the available connection channels for(More)