You are on page 1of 16

Information and Software Technology 163 (2023) 107285

Contents lists available at ScienceDirect

Information and Software Technology


journal homepage: www.elsevier.com/locate/infsof

An empirical study on secure usage of mobile health apps: The attack


simulation approach
Bakheet Aljedaani a, *, Aakash Ahmad b, Mansooreh Zahedi c, Muhammad Ali Babar d, e
a
Computer Science Department, Aljumum University College, Umm Alqura University, Makkah, Saudi Arabia
b
School of Computing and Communications, Lancaster University Leipzig, Germany
c
School of Computing and Information Systems, University of Melbourne, Australia
d
CREST – the Centre for Research on Engineering Software Technologies, University of Adelaide, Australia
e
Cyber Security Cooperative Research Centre (CSCRC), Australia

A R T I C L E I N F O A B S T R A C T

Keywords: Context: Mobile applications (apps) have proven their usefulness in enhancing service provisioning across a
Mobile computing multitude of domains that range from smart healthcare, to mobile commerce, and areas of context-sensitive
Software engineering computing. In smart healthcare context, mobile health (mHealth) apps - representing a specific genre of mo­
Mobile healthcare (mHealth)
bile apps that manage health information - face some critical challenges relating to security and privacy of device
Empirical study
and user data. In recent years, a number of empirically grounded, survey-based studies have been conducted to
investigate secure usage of mHealth apps. However, such studies rely on self-reported behaviors documented via
interviews or survey questions that lack practical approaches that can simulate attack scenario for monitoring
users’ actions and behaviors while using mHealth apps.
Objective: Our objective was to conduct an empirical study - engaging participants with attack simulation sce­
narios and analyze their actions - for investigating the security awareness of mHealth app users.
Method: We simulated some common security attack scenarios in mHealth context and engaged a total of 105 app
users to monitor their actions and analyze their behavior. We analyzed users’ data with statistical analysis
including correlations test, descriptive analysis, and qualitative data analysis (i.e., thematic analysis method).
Results: Our results indicate that whilst the minority of our participants perceived access permissions positively,
the majority had negative views. Users provide their consent, granting permissions, without a careful review of
privacy policies that leads to undesired or malicious access to health data. Findings also indicated that 73.3% of
our participants had denied at least one access permission, and 36% of our participants preferred no authenti­
cation method.
Conclusion: The study complements existing research on secure usage of mHealth apps, simulates security threats
to monitor users’ actions, and provides empirically grounded guidelines for secure development and usage of
mobile health systems.

1. Introduction patients, medics, public health stakeholders), increased effectiveness,


and reduced costs for healthcare services [1]. Public and private
Mobile and pervasive technologies offer users with a multitude of healthcare providers can leverage mHealth apps to offer digitize
context-aware services that include but are not limited to social healthcare practices such as health and fitness monitoring [3], derma­
networking, mobile commerce, along with smart and connected health tologic care [4], chronic management [5,6], and clinical practices [7]. A
care [1,2]. Mobile health (mHealth) apps, and their enabling in­ recent report by Allied Market Research revealed that the global digital
frastructures such as context-sensitive mobile devices and wireless health market size was valued at $145,884.3 million in 2020, and is
networking have empowered users and transformed the healthcare projected to reach $767,718.9 million by 2030 [8].
sector to provide a wide range of healthcare services. This has resulted in Despite the potential benefits and strategic importance of mobile
a significant improvement in the mHealth adoption by users (e.g., technologies and mHealth initiatives in smart systems context, a number

* Corresponding author.
E-mail address: abhjedaani@uqu.edu.sa (B. Aljedaani).

https://doi.org/10.1016/j.infsof.2023.107285
Received 20 November 2022; Received in revised form 16 May 2023; Accepted 11 June 2023
Available online 13 June 2023
0950-5849/© 2023 Elsevier B.V. All rights reserved.
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

issues such as resource poverty, security of device resources, and privacy results of such studies could be affected by social desirability (i.e.,
of context-sensitive data represent critical challenges to mobile self-reported behavior not supporting the respondents’ claims), and/or
computing solutions [9,5,2]. Specifically, the security of mHealth apps is the sampling method (i.e., relying on a particular group of users). The
considered a challenge due to the pervasive environment that continu­ above-mentioned limitations demand for an attack simulation mecha­
ously ingests health-critical data from embedded sensors (hardware), nism, taking users in the loop to monitor and analyze their actions in a
processes and persists data inside the device (via mobile apps), and real context, simulated as security threats scenarios to their health
transmits it across ad-hoc networks [2,10]. According to a report by critical data. This study aims to investigate the behavior(s) of users (i.e.,
cybercrime magazine in 2020, ransomware has become the fastest users’ actions in a specific security scenario based on their knowledge)
growing and one of the most damaging types of cybercrime. The global when dealing with mHealth apps. Users’ actions and behaviors such as
cost for ransomware damage, including mobile devices, could reach $20 clicking on suspicious links or granting unnecessary permissions could
billion by 2021, which is 57 times more than it was in 2015 [11]. As a lead to compromised security of data. Contrary to asking the users via
typical example, some of the installed apps can be granted (undu­ interview(s) or survey(s) to report their behaviors that surfer measure­
e/excessive) access unintentionally by the users to all of a device’s re­ ment bias [30–32], we engage users to demonstrate their behavior that
sources to gain, use, and share users’ data. Data in mobile devices and can be monitored and analyzed using an attack simulation approach. We
apps, specifically health-critical data in the context of this study, can be use the term attack to refer to the social engineering attacks that aim to
leaked to an external host or a third party through excessive app per­ exploit human vulnerabilities, as conducted in [14,33]. The term also
missions [9,12], phishing attacks [13], or when installing other mobile include the threats, and the actions that lead to a potential compromise
apps from unknown resources [14]. Recent studies (e.g., [15,16]) of resources of mobile devices. The findings provide an indication for
highlight that users have limited security awareness of what they should participants’ ability to mitigate the investigated attacks. Whilst several
do to protect their private and health-critical information. Besides, so­ studies (e.g., [34–36]) used phishing simulation attacks (i.e., a type of
cial engineering methods can be used by hackers to deceive users into experiments that aim to investigate and assess users’ security awareness
leaking their private information [17,12]. Molyneaux et al. in [18] and their ability to understand the associated risks), we used this term to
indicated that it is difficult for users to make security-related decisions monitor and assess users security behavior when they face a certain
when facing security threats. Indeed, most users are unaware of such a simulated attacks (e.g., requesting unnecessary permissions). Our aim is
threat to their data, or are unable to understand the technical mecha­ to find answers for the two Research Questions (RQ) that aim to inves­
nisms behind data leakage, which can lead them to ignore the associated tigate (1) the actions of users, and (2) mistakes made by them while
security risks. Furthermore, employing suitable technical solutions using mHealth apps in a security critical scenario. Thus, we outlined the
including, privacy preserving mechanisms and following (RQs):
two-factor-authentication, cannot address security issues alone; instead,
the role of users and their understanding of how they should react to RQ1: How do end-users react while facing potential security threats
different security threats and attacks is an important factor in ensuring during the usage of mHealth apps?
the secure usage of mobile apps [19]. RQ2: What security-related mistakes do end-users make while using
In mobile systems - enhanced interactivity and context sensitivity are mHealth apps?
considered as ultimate criterion of success - technical measures alone
may not be sufficient to ensure security, unless they are complemented To find the answers, we adopted an attack simulation research
with required human-centric knowledge and practices to protect data approach [14,33] to develop an attack simulation solution and engaged
[20]. Human-centric knowledge and awareness in terms of necessary 105 (Android device) users to monitor their actions for analyzing their
actions and behaviors, e.g., granting only the appropriate access per­ security knowledge. mHealth apps can be classified into different genres
missions or opting-in for multi-factor authentication can significantly such as general health advisory to fitness monitoring and nutritional
influence mHealth security [19]. According to a Proofpoint cyberse­ data apps, our study uses fitness monitoring app as such class of apps are
curity report, 95% of observed attacks exploited the “human factor” considered as most common and widely used apps in mHealth systems.
rather than relying on software and hardware vulnerabilities (such as This study complements our previous works [20,24] that aimed to un­
phishing emails, or granting unnecessary permissions) [21]. Users could derstanding the security awareness of users while using clinical mHealth
become a self-threat to their private data and can be easily deceived into apps. This study involves participants from 14 countries (across 5 con­
revealing or leaking classified information if they are not fully aware of tinents), with different age groups, various educational backgrounds,
the security features they are utilizing [17,12]. This issue can be seen and different IT knowledge. Our decision to select the Android platform
with technology-based solutions that involve using security features in for security attack simulation solution is influenced by two reasons (a) it
such a way that users find them difficult to understand [22]. mHealth is the most widely used mobile platform for mHealth apps, and (b) it is
app developers often undermine the user’s security knowledge and considered as comparatively more vulnerable than other mobile plat­
behavior with a belief of having already delivered a secure app by forms such as iOS. Study participants were monitored based on their
following the principle and practices of secure software development actions and behaviors under simulated attacks on security of mHealth
[23]. However, users find these security features as hard to understand app. In addition, we sought users’ input via an exit survey collecting
and use [17], confirmed with a recently conducted empirical study that user’s demographic and other auxiliary information that compliments
investigated the security knowledge, attitude and behavior of mHealth study results. Data analysis consisted of two steps. The first step involved
app users [24]. The study highlights knowledge as the level of security statistical analysis to measure the correlations of study items, and a
understanding by the users, an attitude refers to how the users feel about descriptive analysis to report the demographic data and our partici­
their knowledge, and behavior refers to their actions that users perform pants’ (re-) actions corresponding to security threats. The second step
to ensure security. The results of the study revealed that users had the included qualitative analysis to present the findings for the open-ended
knowledge, attitude about the security measures of the investigated question. This study makes the following contributions:
apps. However, users’ knowledge did not significantly influence their
behaviors, indicating that users are aware of the risks but are reluctant, • Simulates the most frequently encountered security threats to
or unaware, of appropriate actions that mitigate such security risks (e.g., monitor and investigate the actions and behaviors of mHealth apps
setting privacy preferences to restrict undesired data access). users – at attempt to overcoming the issues and bias in self-reported
To this end, state-of-the-art on secure usage of mHealth apps mainly behaviors.
relies on surveys and interviews to collect and analyze users’ responses • Identify and classify the main reasons considered by users while
based on their security knowledge and behavior [24–29]. However, the facing access permissions’ requests in mHealth context.

2
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

• Empirically grounded guidelines for secure usage of mHealth app information safety across the internet, is very limited.
driven by user’s actions in security threat scenarios.
2.2. Experimental research on secure mobile usage
Section 2 presents the related work. Section 3 details the adopted
research methodology. Sections 4 and 5 reports the study findings. The second approach is measuring the security awareness of subjects
Section 6 discusses the findings of the study. Section 7 describes validity during specific events (other studies call it objective data sources) such
threats for this study. Section 8 concludes the paper. as [39,14,33,40–42]. This approach tends to measure the actual
behavior through installing an agent and allows the researcher to
2. Related work monitor the participants’ reactions of a specific security phenomenon.
Producing inaccurate results is one of the limitations for survey-based
We now review the most relevant existing research generally clas­ research due to the self-reported behavior. Thus, studies developed
sified as (i) self-reported survey studies on secure mHealth apps (Section more effective mechanism to measure the security awareness through
2.1) and (ii) measuring the momentary behavior of subjects during measuring the actual behavior of users, namely simulation-based
specific events to understand secure usage of mobile computing (Sec­ approach [14,33].
tion 2.2), detailed below. Simulation-based Understanding of App Access and Permission Re­
actions: In addition to the simulation-based analysis, studies such as [40,
2.1. Self-reported surveys to investigate security awareness of mHealth 42] were found involving other methods, (e.g., interviews, think aloud,
users exit survey) to allow participants to share their thoughts instead of
relying on simulation-based approach only. Specifically, the researchers
In the extent literature on mHealth security, one of the most common in [42] conducted an experiment with 36 participants to examine users’
approaches to assess the security awareness of users is to conduct ability to deny applications access to protected resources. Felt et al. [40]
survey-based studies (i.e., survey, interviews, focus groups, etc.). Such evaluated whether or not Android users pay attention to, understand,
approaches for survey-based studies [24–29], engage mHealth app users and act on permission information during installation. The study con­
to self-report their security-related actions and behaviors in the past and ducted through two usability studies: an Internet survey of 308 Android
the consequences of such actions [37] via pre-defined questionnaire. users, and a laboratory study wherein 25 participants interviewed and
From an empiricism perspective, such self-reported studies may suffer observed.
some inherent bias including but not limited to exaggerated answers, or Experimental Studies to Understand Secure Usage of Mobile Apps: Bitton
a sense of scepticism (often shyness or embarrassment) in sharing pri­ et al. [14] measured the security awareness of smartphone users (i.e.,
vate information that may relates to someone health critical data [38], 162 participants) for specific attack classes. The actual behavior was
resulting in unreliable findings [14]. measured using a developed mobile agent and network traffic monitor
Security actions and habits: A recently published work [24] surveyed and compared the findings with self-reported behavior, which have been
101 participants to measure the security awareness of users about using collected through a survey. Barth et al. [39] examined the privacy
clinical mHealth apps. The study utilized the Human Aspects of Infor­ paradox by focusing on the actual behavior and eliminating the effects of
mation Security (HAIS) model to measure users’ security knowledge, a lack of technical knowledge, privacy awareness, and financial re­
attitude, and behavior. Besides the potential bias in data collection (i.e., sources. The study conducted as an experiment (including a question­
self-reported behavior), the study participants were from only two naire) on the downloading and usage of a mobile phone app among 66
health providers in one region that impacts participants diversity, and Computer science students by giving them sufficient money to buy a
ultimately impacting the generalization of the results. The study by paid-for app. Egelman et al. [33] measured the computer and mobile
Zeybek et al. [29] surveyed 120 participants in a public institution to device security attitudes of users by utilizing the Security Behavior In­
investigate mobile apps users’ security habits (i.e., installation and tentions Scale (SeBIS). Four security sub-scales were mainly investigated
rejection for app’s permissions, the usage of antivirus app, locking including awareness towards phishing attacks, passwords, frequent up­
screen, frequent updates for the apps, and installation for the apps from dates, and locking the devices. The study was conducted through two
official store). The study concluded that awareness training and mal­ surveys (555 participants) and a field study to monitor the security ac­
ware analysis through internal experts or external institutions are tivities of 71 participants. The study found that: (i) testing high on the
required. The results can be biased due to the fact that employees might awareness sub-scale correlated with correctly identifying a phishing
report their best behavior as they have been informed that the study website, (ii) testing high on the passwords sub-scale correlated with
outcomes might be view by their senior managers. creating passwords that could not be quickly cracked, (iii) testing high
Cyber Security awareness: Watson and Zheng [28] surveyed 94 on the updating sub-scale correlated with applying software updates,
participants and Mylonas et al. [27] surveyed 458 participants to and (v) testing high on the securement sub-scale correlated with
investigate the security awareness of mobile devices users about critical smartphone lock screen usage (e.g., PINs).
security options (e.g., device settings, user behaviors, etc.). While the Conclusive Summary: We now present a conclusive summary and
findings of Watson et al. revealed that participants, especially those comparative analysis of the most relevant existing research, as in
without strong IT knowledge, tend to ignore or are unaware of many Table 1. Comparative analysis is based on four-point criteria including
critical security options, Mylonas et al. found that users were not (i) research challenge(s), (ii) focus and contributions, (iii) evaluation
adequately prepared to make appropriate security decisions. Further­ context, and (iv) research limitations. The study reference points to an
more, users had poor adoption of ‘pre-installed’ security controls, such individual research work under discussion and its year of publication.
as encryption, remote data wipe, and remote device locator. The limi­ Existing studies including [24–29] measured the security awareness of
tations that could affect the results can be relying solely on the users about using mHealth apps. However, all the indicated studies were
self-reported behavior, and focusing on specific group of participants measuring security behavior through a questionnaire, which is not suf­
(age 15–30). A study by Alotaibi et al. in 2016 [25] surveyed 629 Saudi ficient to report accurate measurement. Alternatively, studies including
Arabia based participants to investigate the cyber security awareness of [39,14,33,40–42] tend to measure the security awareness using
computer and mobile users by focusing on three contexts, namely, cyber simulation-based research that can provide better results. However,
security practices, cybercrime awareness, and incident reporting. The none of the simulation-based research studies were focused on mHealth
study found that, although the participants had a good knowledge of IT, apps. To the best of our knowledge, there has been no experimental
their awareness of the threats associated with cybercrime, cyber security research study to measure users’ security awareness about using
practices, and the role of government and organizations in ensuring mHealth apps. We investigated the security awareness for users of

3
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Table 1
Comparative analysis of most relevant existing studies compared to our study.
Study Research Challenges Focus and Contributions Evaluation Context Research Limitations Pub.
Refs. Year
Survey-based Studies

[4] to exploit the human aspects of the - analyze users’ security knowledge, - Survey of mHealth app - Bias in data collection 2020
information security (hais) model to attitude, and behavior towards mhealth users (101 participants) (diversity and types of
investigate the security awareness of users apps Quantitative data participants)
regarding the usage of mhealth apps. - investigate prominent security issues for - Self-reported behavior by
users such as privacy and usability. users
[60] To investigate, through empirical study, the - Investigate Security habits of users - Survey of workspace - Bias in data collection 2019
security awareness of public institution personnel (apps’ permissions, usage of antivirus and users (120 participants)
towards using mobile devices. protection mechanisms, lock screen, etc.) - Quantitative data - Self-reported intentions of
users
[57] To analyze the usage of security settings and - analyze security recommendations to - Survey of mobile app - Bias in data collection (self- 2017
control by mobile device users. users (e.g., device settings, user behaviors, users (94 participants) reported behavior of users)
and applications) - Survey-based - Diversity of users (i.e.,
qualitative data. students, faculty, and staff of
- Quantitative data one institute)
[5] To conduct an empirical Investigation into the - analyze challenges of cyber security. - User survey - Data collected from users of 2016
cyber security awareness of users - Investigate cyber security awareness questionnaire (629 mobile and PCs.
(cyber security practices, cybercrime users) - Bias in data collection (self-
awareness, and incident reporting.) - Quantitative and reported intention)
qualitative data
Controlled Experiments
[8] To investigate the privacy and security The study eliminated the effects (i.e., lack Experiment and survey - Bias in recruiting users 2019
paradox of mobile users by focusing on the of technical knowledge, privacy awareness, (66 participants) (High knowledge in IT).
actual behavior. and financial resources). - App selection might affect
participants’ consideration of
security and privacy.
[11] To classify types of security threats and - Measuring security awareness of users - Survey of the mobile user - No specific type of apps to 2020
investigate information security awareness of - Measuring users’ behavior by mobile (162 participants) be investigated
mobile users for different classes of threats. agent and network traffic monitor - Monitoring of mobile
agents and mobile
network traffic
[15] To exploit the Security Behavior Intentions - analyze the security attitude of users - User survey - No specific type of apps to 2016
Scale (SeBIS) to analyze the security attitudes - Supporting users’ security knowledge (e. questionnaire (555 be investigated
of users g., awareness of phishing attacks, frequent participants) - Bias in data collection
updates, passwords, and device locking). Experimental monitoring (creating passwords for low-
of users (71 participants). risk accounts)
Proposed To monitor the security awareness of users of - understanding users’ security behavior - utilizing a simulation - Focusing on mHealth apps. NA
Study mHealth apps via a security attack simulation. when they are facing certain security system and a survey to - Multiple data sources (i.e.,
threats/attacks. collect data. simulation-based, survey)
quantitative and Engaging users with diverse
qualitative data backgrounds (e.g., age,
education level, etc.).

mHealth apps via an attack simulation approach. We measured users’ simulation app. We investigated three major security threats, including
reactions through posing a few security threats, and monitor their user privacy and app permissions, authentication, and application
spontaneous reactions. Furthermore, our study followed by an exit phishing. It should be noted that each major security threat has a few
survey to collect demographic data from the participants and capture potential security threats and at least one attack scenario, as highlighted
their security views. in Table 2. We also gave the participants the option of reporting any
security threats that they found and their interest in receiving security
3. Research method advice or training. Furthermore, we concluded our experiment with an
open-ended question to capture users’ thoughts in regards to the reasons
In this section, we discuss the research methodology that we fol­ behind paying attention to app permissions and the impact of giving an
lowed to investigate the security awareness of users of mHealth apps app more access permissions.
through a simulation-based attack. The adopted method comprises of Identification of Security Scenarios: Studies such as [20,24,15,43,44]
three phases, each detailed below, as per the illustrations in Fig. 1. examined users’ views about the security of mHealth apps. The surveyed
participants agreed that mHealth apps need to implement the security
countermeasures that ensure confidentiality, availability, and integrity
3.1. Phase 1 – Designing the study protocol of health-critical data. However, there is a lack of evidence based on
what participants’ reactions are in a real scenarios. Studies such as [39,
Our literature review in Section 3.2 helped us understand state-of- 14,33,40–42] conducted experimental research to measure the security
the-art on users security issues, concerns, and preferences when using behaviors for users of mobile apps when they face certain security
mHealth apps. In addition, we reviewed the literature to identify the challenges (e.g., phishing attacks, app permissions). These studies have
existing methods to measure users’ security awareness when using inspired our research and significantly helped us to identify four security
mobile apps (Section 3.3). Consequently, we understand and analyze the threats and eight security scenarios to be examined as illustrated in
impact of the current research, highlighting proposed solutions and their Table 2. To further understand the participants’ reaction about these
limitations, specifying the research questions, and designing our study security threats, we included an option to report the security issues that
as in Fig. 1. In the study protocol, we (i) specified the research questions they may notice. In addition, we asked our participants in case they want
(RQ1, and RQ2 outlined in Section 1) (ii) identified the security sce­ to learn about security which can help us to plan further research. This
narios that we plan to investigate, as in Table 2, and (iii) developed the

4
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Fig. 1. Overview of research method for simulation-based attack.

Table 2
The investigated security threats and scenarios in the simulation-based attack study.
Major security Minor sub-security threats The defined goals for the investigated security Example
threats (Potential Security Threat) threats (Scenarios/use-cases)

A. User Privacy and 1. Reading privacy policy • Major: Exploiting users’ lack of awareness • Show privacy policy to end-users to investigate
Permissions toward reviewing privacy policy. the time that spent to read it.
• Minor: To understand the actual time that
users spent to review the privacy policy.
2. Request access permission to device resources • Major: Exploiting users’ privacy to gain • Request access permissions that are not
(e.g., user location, contacts, photos, microphone, access to devices resources. mandatory for the app. The given permission for
camera, data of other apps) • Minor: To understand the readiness of users users can be either accept, or deny.
to protect the existing resources on their
devices.
B. Authentication 3. Selecting secure authentication methods (e.g., • Major: Identify the preferred authentication • Provide a few options for authentication to
none, PIN, 2FA, etc.). methods. investigate end-users’ preferences.
• Minor: To understand users’ preferences
when they have the option to customize the
authentication method.
C. Application 4. Pop-up window that requests users to share • Major: Exploiting users’ reactions towards • Show a pop-up window to request information
Phishing their private information. scams. from end-users given them the options to allow
• Minor: To understand users’ reaction when a pop-up, or discard pop-up.
phishing link popped on the screen.
D. Feedback and 5. Reporting security issues to developers. • Major: Identifying users’ behaviors towards • Ask participants if they want to contact
reporting security issues. developers to report any security issues.
• Minor: To understand users’ rules when
noticing a security issue that can be harmful.
6. Understanding users interest in security • Major: Identifying users’ interest in • Provide a signup option to receive frequent
education and training. supporting their security knowledge. emails on secure mobile app usage.
• Minor: To understand users’ interest in
receiving security education and training.

study is approved by the Human Research Ethics Committee at the study procedure.
University of Adelaide (H-2021–106).
Simulation Mobile App: We developed a health and fitness app called 3.2. Phase 2 – Collect users’ responses
"Workout" to convince participants to be a part of the study. Due to time
limit that we had to complete this research, we made the app (.APK file) Recruitment for Participants: We targeted anyone who uses Android
downloadable directly from a designed webpage instead of uploading it device since our simulation app is only compatible with Android OS. We
to apps stores. In fact, some participants were in doubt about installing advertised for our study by posting our study invitation on social
the simulation app on their devices, which can be considered as a study network (e.g., Twitter, Reddit, WhatsApp groups, etc.) to recruit par­
limitation. The .APK file is available in [45]. Thus, we assured them in ticipants. Our app was available to download by visiting a designed
the study preamble that this is a part of a research study and we received webpage that also include instructions to involve in the study. Partici­
ethical approval from concerned authorities and institutes to conduct pant has to be at least 18 year-old to engage in the study. We were able to
this research and that the collected data will be anonymous and will be monitor participants’ reactions from the moment they install the app
used solely for research purposes. Fig. 2 presents the flowchart of our and we recorded their security reactions. Participants faced many

5
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Fig. 2. Flowchart of our study procedure.

challenges related to the security aspects of mobile health apps, as make certain security decisions during using the simulation app.
illustrated in Table 2. Fig. 3 shows six examples (screenshots) of the Statistical analysis: SPSS version 28 (a popular data analysis software)
research activities that our participants faced. Additional screenshots for was used to perform all statistical analysis. We also evaluated the cor­
our simulation app are available in [45]. At the end, we provided an exit relation between the permission requests responses using Spearman’s
survey to collect demographic data and an open-ended question to allow statistical test [46]. This test helped us to understand the correlation (i.
them to share their thoughts. We carried out a pilot testing for our study e., strength and direction of association) between the permission re­
with at least 10% of the participants to ensure the reliability and val­ quests items. Furthermore, we used statistical significance to compare
idity. Participants were given the option to withdraw their data during our participants’ reactions to the requested access permissions among
the study by simply deleting the app. As a result, their responses would multiple groups of users. Mann–Whitney U test was performed to
be considered as incomplete and hence excluded from further analysis. compare the gender group since we have two independent samples (i.e.,
After removing incomplete responses, we were able to collect data from male and female) [47]. The Kruskall-Wallis H test [48,49] was per­
105 participants (referred to as P1 to P105). Collected data along with formed to compare the participants’ reactions for more than two inde­
the exit survey questions are available in [45]. pendent samples (e.g., IT knowledge level, age group). We followed our
Participants’ characteristics: As depicted in Fig. 4, our study engaged statistical analysis by performing a post hoc test once required [50] (e.g.,
105 Android devices users from various countries (i.e., 14 countries, five Bonferroni correction) to examine the significance of differences using
continents), and with different age groups. Our participants were having the adjusted alpha value (alpha level divided by the number of tests). For
various educational backgrounds and different IT knowledge. The each demographic data, we tested the null hypothesis (i.e., H0: there is no
demography analysis presented in Fig. 4 complements the exit survey significant difference) against the alternative hypothesis (i.e., H1: there is a
responses (Q1-Q6), available in [45], helps us with fine-grained analysis significant difference), whereas μ1, μ2, …, μk refers to population means.
of the study results. For example, the analysis helped us to understand Qualitative analysis: For the open-ended question, we used thematic
the difference in male and female reactions about access permissions. analysis method [51–53] to identify the reasons that users reported
about paying attention to the requested access permissions. Thematic
analysis supports extracting the data and synthesizing the results. We
3.3. Phase 3 – Perform data analysis used NVivo1 software, a popular computer-based tool, to organize and
analyze data. Coding was initially done by one of authors in the team
We collected quantitative and qualitative data that help us to answer that was reviewed and revised (wherever required) by the second author
the outlined RQs. Based on the nature of data and the purpose of the to avoid potential bias. It should be noted that we considered the five
analysis, we performed three techniques. Each technique is detailed
below as per the illustrations in Fig. 1.
Descriptive analysis: We reported the participants’ demographic data
by using descriptive analysis as presented in Fig. 4. We also used this 1
https://www.qsrinternational.com/nvivo-qualitative-data-analysis-softw
technique to report the participants’ reactions when we asked them to are/home/

6
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Fig. 3. Examples of research activities for simulation-based attack study.

steps of the conceptualized thematic analysis method: (1) reviewing and the relationships by relying on the obtained quantitative data. It also
examining the provided responses to determine the parts that were helps to determine the significant results within the different de­
relevant to each other; (2) generating initial codes, which involved mographic data.
extracting the initial lists themes; (3) searching for themes, which
involved trying to combine different initial codes generated from the 4.1. Measuring the correlations of the study items
second step into potential themes; (4) reviewing and refining themes,
which involved checking the identified themes from step 3 against each To further assess the relationship between the permissions request
other to understand what themes had to be merged with others or items (i.e., strength and direction of the linear relationship), we con­
dropped; and (5) defining and naming themes, which involved defining ducted Spearman’s statistical test to whether there is a statistical sig­
a name for each theme. nificant correlation or not among the obtained data. It also helps to
Findings of the study: We now present the findings to answer RQ1, understand the direction of the relationship [54]. Such an investigation
and RQ2 as outlined in Section 1. We divided our results section into two can help us to understand when one access permission type changes in
main sections: (i) Section 4 that reports the statistical and the descriptive value, the other access permission type tends to change in a specific
analysis, and (ii) Section 5 that provides a thematic analysis for the direction. As illustrated in Table 3, we found that all the investigated
open-ended question to investigate the rationale for paying attention to permissions have a positive and statistical significant correlations at
the app permissions based on our participants’ perspectives. 0.01 level. For example, there is a statistically significant correlation
between access to device storage and device camera and the chances of
4. Statistical and descriptive analysis observing the obtained correlation (0.792) through random error are
less than 0.01. The correlation results ranged from a strong (e.g., 79%:
In this section, we enhance our results by including a few statistical permission to storage and permission to access device camera) to a
analyses, as indicated in Fig. 1. Such analyses would help to investigate moderate (e.g., 53%: respond to permission to storage and permission to

7
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Fig. 4. Demographic details of the participants of attack-simulation study (sample size =105).

Table 3
Correlation for the permissions requests.
Permission type Permission to Permission to Permission to Permission to audio Permission to
storage Camera contacts recording location

Permission to storage Correlation coefficient 1.000


95% Confidence Interval: 1.000
Lower 1.000
Upper
Permission to Camera Correlation coefficient .792** 1.000
95% Confidence Interval: .668 1.000
Lower .892 1.000
Upper
Permission to contacts Correlation coefficient .602** .770** 1.000
95% Confidence Interval: .438 .641 1.000
Lower .747 .886 1.000
Upper
Permission to audio Correlation coefficient .526** .694** .730** 1.000
microphone 95% Confidence Interval: .347 .545 .591 1.000
Lower .680 .831 .848 1.000
Upper
Permission to location Correlation coefficient .581** .639** .641** .717** 1.000
95% Confidence Interval: .399 .477 .489 .581 1.000
Lower .734 .774 .772 .848 1.000
Upper
**
Correlation is significant at the 0.01 level (2-tailed).

access device location) relationship [55]. To further elaborate on one exploit specific targets (e.g., device contacts) to gain an understanding
example, the correlation indicates that when the score of permission to of how the users’ reacted (i.e., denied or granted access). Based on the
access storage increases, we expect (i.e., more likely) the score of type of the app that we developed for our simulation, no access per­
accessing device camera to increase positively (it is not a causality missions were mandatory for the app to be functioning. Denying these
relationship). Additionally, our analysis revealed that all the tested permissions would create no issue for app usage, and granting access
items were significantly correlated at 0.01 level. could put users data at risks (e.g., allow third-party to access sensitive
data). Overall, we requested 630 permissions (i.e., six per participants)
in simulation app and we recorded their reactions without reaching the
4.2. Participants reaction about permissions requests and pop-up window
requested resources (including the pop-up window). We found that 296
access permissions (i.e., 47%) were granted to our simulation app, and
The security awareness for users towards using smartphones, in
334 access permissions (i.e., 53%) were denied. Whilst 33 participants
general, can be measured by understanding how users deal with four
out of 105 (31.4%) had denied all the requested permissions, 77 par­
technological aspects, namely applications, communication and
ticipants out of 105 (73.3%) had prevented at least one permission, 28
browsing, channels, and device [56]. Each aspect has a few attack sce­
participants out of 105 (26.7%) had responded to grant all the requested
narios that can be further investigated [56]. For example, access per­
permissions for our simulation app. To be specific, we examined our
missions and users reaction towards fake links were classified as
participants’ behaviors when they face a phishing link. We presented a
examples of applications security. In our study, we explicitly attempted
pop-up window that offer them with free exercises which were not
to exploit the human vulnerability (i.e., lack of security awareness) to

8
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

available in the app. We found that 47% have granted our request and through applying Bonferroni correction whenever applicable.
53% denied it. Additionally, we requested our participants to grant our
simulation app unreasonable permissions to their device software, and (A) Access Permissions Based on Gender
hardware, namely, access to the device storage, contacts, camera,
microphone, and location. Surprisingly, our findings indicated that To understand and compare how male (n = 67) and female (n = 38)
47.5% (± 2.5) of our participants have granted our simulation app ac­ participants reacted with the requested access permissions, we per­
cess to the requested permissions. Fig. 5 presents our participants re­ formed a statistical test (i.e., Mann–Whitney U test) to show if there is
actions towards the requested permissions. Our findings also indicated any significant difference. It should be noted that since we had unequal
that granting the app to access the device storage and location were the sample size for male and female, this could reduce the power of using
highest among other permissions (i.e., 50% each). Mann-Whitney U Test. The overall result indicated that there was no
significant difference between male and female, as in Table 4, z =
-1.468, p = 0.142, d = 2.957, 95% CI [0.135, 0.149]. However, we ran
4.3. Relationship between demographic characteristics and participants
the same test to determine differences in each access permission be­
reactions to access permissions
tween male and female. We found that access permission to device
storage is statistically significant (z = -2.757, p-value= 0.006). The
As indicated in (Section 3.3 Phase 3 – Perform data analysis), we
mean rank for female = 62.42 which is higher than the mean rank for
performed Mann–Whitney U test for gender since we were comparing
male = 47.66 indicating that female have a higher attention to granting
two independent samples (i.e., male and female), and Kruskall-Wallis H
our simulation app access to the device storage. Thus, we concluded that
test for more than two independent samples (e.g., IT knowledge level,
both male and female in our sample have reacted equally to the
age group, etc.). These statistical tests helped us to determine whether
requested access permissions excluding accessing device storage.
there were statistically significant differences in regards to our partici­
pants’ reactions to the requested access permissions (pop-up window
(B) Access Permissions Based on IT Knowledge Level
request were excluded from these tests) among the defined groups of
users (i.e., male vs. female, little or no IT knowledge vs. moderate IT
We conducted the Kruskall-Wallis H test to investigate the signifi­
knowledge vs. advanced IT knowledge, etc.). We performed
cance of granting or denying access permissions based on the partici­
Kolmogorov-Smirnov normality test for the obtained responses to check
pants’ IT knowledge (i.e., Little or no knowledge, Moderate knowledge,
the assumptions of the statistical tests used in this study. The result (p <
and Advanced knowledge), as in Table 4. Our findings revealed that
0.05) suggested that the data were skewed (i.e., violated the normality
reacting to access permissions is differed significantly p = 0.001, d =
assumption). As a result, we supported the usage of the statistical tests
0.283, 95% CI [0.000, 0.001]. For the Moderate IT knowledge mean
with the concept of central limit theorem [57], indicating that a suffi­
rank = 63.14 which is less than Advanced IT knowledge mean rank =
ciently large (i.e., 105 in our case), has an approximate normal distri­
bution. In addition, we considered the argument, has been verified by
Table 4
simulation results, that nonparametric tests (i.e., Spearman’s test,
Differences towards permissions requests based on the characteristics of study
Mann–Whitney U test, Kruskall-Wallis H test) are not sensitive to the
respondents.
non-normality assumption [49,58,54]. The findings provides
fine-grained analysis of the security reactions to access permissions for Demography Data Category Identified groups N (%) p-value

each specific group. For example, which access permissions received the Gender Male 67 (64%) 0.142
highest allowance by female participants, which group of users are more Female 38 (36%)
IT Knowledge Level Little or no knowledge 48 (46%) 0.001
likely to click on a phishing link, etc. We further investigated the sig­
Moderate knowledge 42 (40%)
nificant differences for the groups whenever applicable (i.e., whenever Advanced knowledge 15 (14%)
p-value < 0.05). We used the Mann Whitney U test to compare the Age Group 18 – 29 young adult 47 (45%) 0.001
median differences between the overall extents [47,48]. For each de­ 30 – 49 adult 53 (50%)
mographic data, we tested the null hypothesis (i.e., H0: there is no sig­ Above 50 senior 5 (5%)
Formal Education High school or less 11 (10%) 0.053
nificant difference) against the alternative hypothesis (i.e., H1: there is a Diploma 14 (13%)
significant difference), whereas μ1, μ2, …, μk refers to population means. Bachelor degree 53 (50%)
Due to the multiple hypotheses testing we carried out, our results can be Master’s or PhD 27 (26%)
inflated by family-wise error rate. Hence, the p-values were corrected

Fig. 5. Participants’ reactions for the requested access permissions.

9
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

60.43 and less than Little or no knowledge mean rank = 41.80. Specif­ without developers having any thought about how that occurred [60].
ically, significant differences were found (using post-hoc Mann-Whitney Hence, the privacy policy should be carefully read by users before
U Test) between Little or no knowledge group compared with Moderate agreeing. In our simulation app and as most mobile apps do, we pre­
knowledge group (adjusted p = 0.002). Whilst we found that there is no sented the privacy policy before the installation for our participants, as
statistically significant difference on the security awareness between in Fig. 3(a). Our aim was to investigate how the participants would react
Moderate knowledge group, and Advanced knowledge group (adjusted and how much time they spent on reading it. To calculate the time, we
p = 1.000), and there is no statistically significant difference on the recorded the time once the privacy policy was presented and the time
security awareness between Little or no knowledge group, and the participants clicked on the "Continue" button. The average time
Advanced knowledge group (adjusted p = 0.094). Therefore, we reject spent on reviewing the privacy policy for all participants was 8.02 ms to
H0 and concluded that IT knowledge level had an impact on their de­ review about 500 words, which requires at least a minute. Only nine
cisions to grant or deny access permissions for our participants. participants (8%) spent more than 20 s reviewing the privacy policy,
presented in Fig. 3(a). Interestingly, three participants spent rational
(C) Access Permissions Based on Age Group time reviewing it (i.e., a minute and 55 s, a minute and 13 s, a minute
and 3 s, respectively).
We conducted Kruskall-Wallis H test to determine any significant Due to the fact that IT knowledge can make a difference in regards to
difference among the three age groups (i.e., n = 47; young adult, n = 53; dealing with mobile apps, we further investigated reviewing the privacy
adult, n = 5; senior) regarding to how they reacted to the requested policy behavior by our participants by looking into their IT knowledge
access permissions. Our simulation app was developed to help the par­ level. We found that participants with advanced IT knowledge (n = 15)
ticipants to do exercises as we were advertising for our study. We believe spent an average time 19.61 ms. While participants with moderate IT
that we were not attracting as many seniors as we should. This could be knowledge (n = 42) spent an average time 7.26 ms, and the participants
the main reason that we had a very low number of Senior group (5 out of with little or no knowledge on IT (n = 48) spent an average time 5.06 ms.
105). As in Table 4, our findings suggested that there is a statistically The participant identified as P96 who spent 5 s in reviewing privacy
significant p = 0.001, d = 0.283, 95% CI [0.000, 0.001] when reacting to policy wrote “I don’t pay attention to the privacy policy except when the
the requested access permission for the three age groups. Adult group duties and financial responsibility towards the app are mentioned. For
(mean rank = 62.36) were less than Young Adult group (mean rank = example, the policy of cancelling the subscription if the app requires payment
45.86), were less than Senior group (mean rank = 24.20). Bonferroni or financial fees”.
Correction was performed to understand the significant differences
among the three groups. Whilst we found that there is no statistically 4.5. Preferred authentication method for our participants
significant difference between Senior group and Young Adult group
(adjusted p = 0.345), our results revealed that there is a statistically User authentication in our context refers to how the participant
significant difference between Senior group and Adult group (adjusted p wants to log into the simulation app and what method can be used to
= 0.016). We also found that there is a statistically significant difference prove that s/he the legitimate app user. In our previous study [20], we
between Young Adult group and Adult group (adjusted p = 0.015). surveyed 101 mHealth apps users to investigate the desired security
Therefore, we reject H0: μ1 = μ2 = μ3 and conclude that age did have an features they want to be employed. We found that users were having
impact on the participants when reacting with the requested access different opinions about the authentication method (e.g., employing
permissions. biometric authentication, interactive authentication, direct access, etc.).
Hence, in our simulation app, we provided a variety of options for
(D) Access Permissions Based on Level of Formal Education authentication (ranging from weak, moderate or robust security) to
investigate users selection. We asked our participants to customize the
We also wanted to investigate respondents’ differences by consid­ simulation app by selecting their preferred authentication method. We
ering the impact of the level of formal education on our participants. We presented five common authentication methods, namely, none (i.e.,
conducted Kruskall-Wallis H test on the four groups, which we identified without authentication), pattern, Personal Identification Number (PIN),
in Table 4. Our results indicated that there is no statistically significant username and password, and Two-factor authentication (2FA). 38 (36%)
difference among the four groups p = 0.053, d = 0.347, 95% CI [0.047, of our participants preferred no authentication method. Using Personal
0.056]. We found that reacting to requested permissions of those with a Identification Number (PIN) to access the app was selected by 20 par­
postgraduate qualification (n = 27, mean rank= 59.57) was lower, than ticipants (i.e., 19%). Using pattern was the preferred option for 13
those with an education level of Bachelor (n = 53, mean rank= 56.06), participants (12%). 23 participants (22%) preferred to have a username
less than those who are having Diploma (n = 14, mean rank= 42.43), and password to log in to the app, and only 11 participants (10%)
and less than those with High School or less (n = 11, mean rank= 35.59). preferred 2FA.
Since there was no statistical significant difference based on the edu­
cation level, we did not perform multiple comparisons (i.e., Bonferroni 4.6. Participants interest in reporting security issue and receiving security
Correction). Our conclusion based on the obtained results suggested to advice
accept H0: μ1 = μ2 = μ3 = μ4. Thus, the level of formal education did not
have an impact on the participants when dealing with access In our simulation app, we wanted to investigate the participants’
permissions. behaviors towards reporting security issues within the simulation app in
case they noticed. Our findings indicate that only 36 (34%) participants
4.4. Time spent of reviewing privacy policy by our participants wanted to report security issue and 69 (66%) participants did not want
to report any security issue. However, we are unsure whether these
App privacy policy is a legal statement that regulates the engagement participants actually noticed an issue or not. One possible reason is that
with users. It presents to the users how and when their personal data participants ignored what they have seen and did not want to bother
would be collected, retained, or shared with a third party. It also ex­ about these issues. In fact, P97 wrote “When I see a security issue with the
plains what resources the app is requesting, and for what purpose app, I just uninstall it”. For further analysis, we looked into the level of IT
including access permissions, and the financial obligations for the app knowledge for the participants who wanted to report security issue(s)
usage [59]. Some installed app can do an activity that is risky for user within the simulation app. We found that 9 participants with advanced
without they being realized [16]. App developers may share users’ data IT knowledge (n = 15), 12 participants with moderate IT knowledge (n
with third parties for advertising purposes, or data can be leaked = 42), and 15 participants with little or no IT knowledge (n = 48).

10
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

We also asked our participants whether they want to receive frequent necessary for the app functionality. The participants assumed that the
security advices or not. Our results indicated that 76 (72%) participants simulation app was requesting permissions to perform relevant tasks.
accepted getting security advices and 29 (28%) participants refused this P30 mentioned, “I assume the app needs permissions to help me to have
idea. For further analysis, we looked into the level of IT knowledge for better usage”, and P87 wrote, “It is ok to grant the app to access my location
the participants who decided on not to receive any security advice. because it is already the case with all other apps”.
Interestingly, the participants were from different levels of IT knowl­
edge. 4 participants with advanced IT knowledge (n = 15), 13 partici­
pants with moderate IT knowledge (n = 42), and 12 participants with 5.2. Fear of data leakage
little or no IT knowledge (n = 48).
Data leakage can be defined as the unauthorised distribution for any
5. Reasons for paying attention to the app permissions confidential or sensitive users data [61]. Whilst app permissions is not
the only method for data leakage, providing personal information when
In this section, we provide our analysis for the open-ended question registering for the app could potentially leaked without app’s provi­
that we included in the exit survey, as detailed in Section 3.3. We aimed der/developer awareness [62]. We are reporting the participants’
to identify the reasons that make our participants pay attention to the feedback regarding the reasons for granting or denying app permissions.
requested app permissions based on their views. Based on the obtained Our findings revealed that 16 participants P34, P36, P46, P51, P53, P54,
responses, we used the qualitative descriptive analysis (Section 3.3 – P65, P68, P71 - P74, P84, P89, P92, P98 were having fear of data leakage
Phase 3 – Perform Data Analysis) to create the conceptualization, as in for either their personal information (e.g., contact number, email
Fig. 6. Whilst a few participants perceived the requested permissions address) or device data (e.g., contacts, photos, location). Four partici­
positively (Section 5.1), the majority had a negative views about the pants P34, P51, P53, and P89 specified that app permissions would
requested permissions as in (Section 5.2–5.5). Violating/losing privacy permit the app’s provider/developer to access their private data. P89
were explicitly mentioned by some participants, e.g., P46, P47, P51, wrote, “App permission, based on my knowledge, allow the developer to
P54, P68, P82, P83, P88, P89, P92, and P98. Four participants P42, P47, access my data in the device”, P51 stated, “Giving access to your photos and
P66, and P71 indicated that the requestion permissions were unnec­ contacts when it is not necessary can lead to giving the app access of trans­
essary. P71 stated, “[the app] should not access my contacts, photos, or ferring sensitive content to the developers”, and P53 indicated “when I have
location because the app does not need access to my information”. We sensitive data on my phone, [access permissions] my take sms, contacts, or
provided cherry-picked examples for each theme to support our findings mails to do some things I don’t like. ” Four participants, P51, P68, P72, P92
in Fig. 6. Each theme is discussed in the following sections. indicated that they want to protect and maintain their private data. P51
added, "…I value my privacy and everything that is on my phone", and P68
wrote, "To maintain the privacy of my data", and P92 wrote, "Protecting my
5.1. App permissions provide a better usage personal information and data". Three participants P54, P65, and P71
mentioned that access permissions would lead to intentionally releasing
The ideal permission for our simulation apps which would make or making the information publicly available to others. P71 stated, "The
sense to request is accessing fitness data such as Health app in iOS. This impact can be sharing data publicly such as the app that store the contacts
permission would help to retrieve the data (e.g., steps count, burnt and make it available to others", and P65 wrote, "Protect my data from being
calories, etc.) into our app and perform the required analysis for users. spread out on the internet". Five participants indicated giving access
However, we did not request this permission purposefully. Instead, we permissions can make their private data vulnerable to data leakage. P84
requested permissions to camera, contacts, microphone, location, wrote, "I pay attention because I have private pictures on my phone and I
photos that would make no logic to be granted. Five participants P30, don’t want it to be stolen", P73 wrote, “It may be leaked my location in­
P45, P65, P82, P87 considered the requested permissions were formation and mobile number”, and P74 wrote, “may lose my personal

Fig. 6. Participants’ views on the reasons for paying attention to access permissions with some cherry-picked example for each theme.

11
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

information”. 5.5. Fear of using data for objectionable processing purposes

5.3. Fear of their devices being hacked Gathering users’ data (e.g., contacts, location, etc.) through app
permissions can be done easily. However, it becomes a problematic in
Access permissions can be the role of attack surface that could be case the app providers share that data without declaration or consent
exploited. A compromised app would allow attackers to exploit what­ from users. This data processing would be objected by users if they were
ever the app is already connected with including camera, microphone asked in advance. Four participants pointed out this concern and indi­
[63]. Six participants P42, P46, P49, P86, P95, P102 expressed their cated that app permissions would gather data to make profits (P46, P47,
fears of giving more permissions to our simulation app may lead to make P49, R68). For instance, P68 stated “Saving the data and distribute it to
their devices insecure. The participants indicated that doing so may private parties. Some companies enable some apps to sell their clients’ data”,
make their devices vulnerable for malicious activities such as spying P47 wrote “Transforming users into products, by selling their information”,
(P42, P46), or their devices may become hackable (P49, P86, P95, and P49 indicated “It collects a huge data from the user, and the developer
P102). Specifically R42 stated “It will be a back door that will open vul­ usually sell that data to someone else”. In addition, two participants re­
nerabilities to be used to harm the device and its data”, and R46 wrote, “Spy ported that the purpose of requesting more permissions is sending ad­
on my data and activity”. Furthermore, P86 indicated “Sometimes vertisements (P30, P73). P73 wrote, “It may continue to sent my mobile
permission can be hackable if it not well secured”, and P49 mentioned “To some useless messages latterly”, and P30 stated “Sending ads to me”.
protect myself from hacks”.
6. Discussion
5.4. Excessive permission triggers a lack of trust
We now discuss the results that highlight the core findings of this
As indicated in Section 2.4.1, we developed our simulation app and study, based on methodological details in Fig. 1, and outline the po­
we hosted it on our storage. Since participants had to download from tential future work. Table 5 guides the discussion and presents a sum­
unknown source, most likely this process gave an impression that our mary of the key findings. The discussion highlights reviewing privacy
app was suspicious (no reviews or rating available to view). When we policy (Section 6.1). We then discuss the results of participants’ re­
asked our participants the reasons of granting or denying the requested actions about requesting access permissions (Section 6.2), and finally
permissions, four participants P66, P73, P90, and P105 indicated that the reasons for paying attention to the requested permissions is dis­
the simulation app is not trusted to be granted the requested permis­ cussed in Section 6.3.
sions. For example, P73 stated, “I will be unhappy about the more
permission than needs and don’t trust this app using, so that I will stop the app
6.1. Time spent on privacy policy
from accessing my information”. R66 found that app permissions should
not be requested. R66 wrote, “I don’t let it go easily. I denied the requested
As we presented in (Section 4.5), most of participants skipped
permissions because the app does not need them. Only malicious app would
reading through the privacy policy and look for required action (ticking
ask for these access privileges.”
the box) to install the app. Our finding of this is consistent with previous
research such as [64,65,60]. It should be noted that the entire time
which our participants spent on the privacy policy page does not mean

Table 5
Summary of the core findings for attack simulation approach study.
Measuring the Security Awareness of Users about Using mHealth Apps: Attack Simulation Approach
Gender Classification Age Group Formal Education IT Knowledge Country
Level

• 64% Male • 45% 18 – 29 • 10% High school or less • 46% little/no • 39% Saudi Arabia
• 36% Female • 50% 30 – 49 • 13% Diploma knowledge • 19% Australia
• 5% above • 50% Bachelor’s • 40% moderate • 18% India
50 • 26% Postgraduate level knowledge • 10% China
• 14% advanced • 14% Others
knowledge
Users security reactions when facing potential security threats
Reviewing Privacy Policy Selecting Reactions about requesting access Reporting Interest in receiving security learning and
authentication permissions and phishing security advice
method for the app issue
• All participants (n = 105) spent 14 min and 03 • 36% None Permission Granted Denied • 34% • 72% Yes
s. • 19% PIN Type Yes • 28% No
• Average of 8.02 ms per participant • 12% Pattern Pop-up window 47% 53% • 66% No
• 22% Username/ Device storage 50% 50%
password Contacts 47% 53%
• 10% 2FA Camera 45% 55%
Microphone 45% 55%
Location 50% 50%
Reasons for paying attention to the requested access permissions
• App permissions provide a better usage
• Fear of data leakage
- Access permissions make private data vulnerable
- Releasing or sharing private data
- App provider access private data
• Fear of their devices being hacked
• Excessive permission triggers a lack of trust
• Fear of using data for objectionable processing purposes
- Making profit out of data
- Sending unwanted advertisements

12
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

that participants were reviewing it. The time was calculated from the female who granted/denied the access permissions. R51 (MBM4) wrote,
time that privacy policy page loaded until the participants clicked on “giving access to your photos and contacts when it is not necessary can lead to
continue button. Therefore, future research could consider employing giving the app access of transferring sensitive content to the developers”. In
accurate mechanisms such as eye-tracking (requires accessing the device our study conclusion, females have a higher concern about requesting
camera) to record the time which participants are actually spending. access to the device storage. Device storage store their private photos
Whilst there are several studies that indicated that there is a lack of that cannot be shared others.
clarity and transparency in presenting such policies for mHealth apps [2,
64,65], and recommendations to improve the privacy policy for users 6.3. Paying attention to the requested permissions
[66,9,67,68], further work can be done to examine users reactions when
presenting the privacy policy through using innovative methods Almost 50% of our participants granted the simulation app permis­
including summarizing the main points, using visualization, or a dis­ sions. Interestingly, a few participants claimed that they paid attention
playing it in video. This approach would be effective to encourage users, to app permissions because they were worried about their privacy.
especially those who have little or no IT knowledge, to spend more time However, we found contradiction with their responses in the exit survey.
to understand what data the app requires, and how their data are being For example, R34 (MBM4), and R73 (MHM5) fully granted our simula­
handled. Such a study would help to understand how users review pri­ tion app the requested permissions. R34 wrote, “To not get permissions to
vacy policy and their understanding of the associated risks of using the private images”, and R73 wrote, “I will be unhappy about the more
apps. permission than needs and don’t trust this app using, so that I will stop the app
from accessing my information”. The results also indicated that users can
6.2. Access permissions for the simulation app be easily fall into the ambush of sharing their data and devices. This
triggers the alarm that users need to pay careful attention when
Interestingly, 52 participants (50%) granted the simulation app ac­ installing and using mobile apps. Further work can be done using similar
cess to their location. Table 6 presents further details about the partic­ approach with allowing the participants to share their views about
ipants who granted or denied accessing to their location based on the IT granting or denying permissions after every single request. In addition, a
knowledge. R87 (FBL2) wrote “It is ok to grant the app to access my summary report can be shared with each participants as soon as s/he
location because it is already the case with all other apps”. Most likely that completes the study. Such a summary should explain what mistakes the
users have trust in giving some permissions, such as location or specific participant has done with their potential impacts, and what could have
hardware (e.g., microphone). This could lead to further work to inves­ been done better when facing these access permissions. Consequently,
tigate what other access permissions that users trust, and the reasons this would help to increase the security awareness of the users before
that make them trust. thinking to grant any app a permission.
The findings in Section 4.4 (a) indicated that there was no statistical We reported the different reasons that our participants considered
significant difference for access permissions request based on the for granting/denying the requested access permission. Overall, users are
gender, as in Table 4. However, we further found that 53 participants required to understand what, why permissions such as app needs by
(50%) denied the simulation app access to the storage of their device. To reviewing the privacy policy. App providers needs to minimize the
provide further analysis, we looked into the denied permissions based on requested permissions as possible and justify the needed permissions for
gender, as in Table 7. We found that females have a higher concern users
about granting access to their devices. Due to the fact that device storage Despite the fact that we had limited security scenarios (Table 2) that
store their private photos which cannot be shared, accessing device we investigated, we believe our study contributed to the existing
storage received the highest denial by 26 females (68%). This point knowledge through presenting real-life security scenarios that end-users
confirms our results in Table 5 which indicates a statistical significant may face every day. We applied an attack simulation approach which
difference between female and male participants in regards to accessing helped us to measure users’ reactions through posing a few security
device storage. Accessing to the device location had the lowest denial by threats, and monitor their reactions. Our study helped to understand the
21 females (55%). R71 (FBM3) wrote, “[The app] should not access my common weaknesses that end-users fall into when using mobile apps.
contacts, photos, or location because the app does not need access to my Our results are expected to make significant contributions to the
information”. On the other hand, we found that out of 67 males, 27 (40%) growing body of evidential knowledge about end-users’ reactions when
denied access to device storage which is the lowest denial. The highest reviewing privacy policy, access permissions and what reasons to grant/
denial from males were contact and microphone (i.e., 36 males (54%) deny such permissions.
for each permission request). Table 7 presents the numbers of male and
7. Threats to validity
Table 6
Participants responses to requesting access permission to their devices’ locations We now discuss some threats to the validity that represent potential
and storage based on IT knowledge level. limitations that might impact the finding of the study.
Access Options Little or no IT Moderate IT Advanced IT
Internal validity: We collected data through a simulation app, and
Permission knowledge (n knowledge (n knowledge (n presented some real-life security scenarios that any users face during
Type = 48) = 42) = 15) mobile apps usage. Findings might get affected since we had to explicitly
Access to Granted, 31 (64%) 16 (38%) 5 (33%) indicate to the participants that we were investigating their security
Location 52 (50%) awareness. Initially our plan was to hide the aim of the study by
Denied, 53 17 (36%) 26 (62%) 10 (67%) mentioning that we are going to investigate participants’ habits and
(50%) behaviors towards mHealth apps. Yet, due to the limited-disclosure of
Access to Granted, 29 (60%) 16 (38%) 7 (47%)
Device 52 (50%)
the study aim, we were not able to get the ethical approval. Indeed, the
Storage Denied, 53 19 (40%) 26 (62%) 8 (53%) application of our study was elevated to a high-risk review, and it took so
(50%) many reviews until we addressed the concerns of the ethics committee
(i.e., explaining the aim of the study for participants in advance).

2 4
FBL refers to a Female with a Bachelor degree, and Little or no knowledge MBM refers to Male with a Bachelor degree, and Moderate IT knowledge
3 5
FBM refers to a Female with a Bachelor degree, and Moderate IT knowledge MHM refers to Male with a Higher education, and Moderate IT knowledge

13
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Table 7
Participants responses to deny the requested access permission based on gender.
Denied access permissions requests based on gender Device storage Camera Contacts Microphone Location pop-up Window

Female (n = 38) 26 (68%) 24 (63%) 22 (58%) 22 (58%) 21 (55%) 22 (58%)


Male (n = 67) 27 (40%) 32 (48%) 36 (54%) 36 (54%) 32 (48%) 34 (51%)

Additionally, our simulation app was not downloadable from the official access to the unnecessary permissions (e.g., accessing contacts,
app stores (i.e., Google Play store). Thus, our participants were skeptical camera, location, etc.).
to involve in our study. Even those who have participated, we are unsure • The majority of participants had negative views about the requested
whether the participants provide truthful reactions towards the access permissions (fear of data leakage, fear of their devices being
requested access permissions. They might have reacted in a way that is hacked, excessive permission triggers a lack of trust, fear of using
different than they would have otherwise reacted. data for objectionable processing purposes).
Construct validity: Our study could be also impacted by the limited
security scenarios that we already measured. Some security scenarios (e. Dimensions for potential future work: This study examined users’ se­
g., password strength, password changing habits) were questionable by curity awareness through an attack simulation approach, and it has
the ethics committee; hence, we had to drop them during the study uncovered some possible directions for future work. It could be further
design phase to ensure carrying out the study. In addition, we have extended to include a larger number of participants with different de­
limited number of some categories (e.g., only English version, a few mographic information. Future studies could also include other security
participants above the age of 50). threats which have not been covered in this study (such as strength of
External validity: Our simulation app is only compatible with Android passwords, changing passwords, data security at rest and data in transit,
devices. The given time to finish the research has limited us to configure etc.). It could be further extended by using the same approach but by
the app with iOS devices of the study. The findings of our study cannot also providing a summary report to be shared with each participants as
be generalizable. soon as s/he completes the study. Such a summary could explain what
Conclusion validity: To ensure the credibility of the study conclusions, mistakes the participant has made and potential impacts of those mis­
the first three authors were continuously involved in the survey in­ takes, and what could have been done better when facing these access
strument development and data analysis process. However, all other permissions.
authors occasionally (consent meetings) reviewed the data and provided Implications of research: The study can have the following implica­
their feedback to tackle the conflicts that appeared during the data tions for research and development of secure and usable mobile health
collection and analysis process. Finally, brainstorming sessions were solutions.
conducted, and all the authors participated in discussing the study
findings and drawing conclusions. • Researchers who are interesting in exploring security awareness of
users or specific group of users (e.g., male vs. female). We suggest
8. Conclusions and future work formulating new hypothesis to be tested for secure mHealth apps (e.
g., evaluating how users’ perceive reviewing privacy policy as well as
Mobile computing as the backbone of context-sensitive digital employing eye-tracking feature, evaluating users’ reactions in
servicing is revolutionizing the smart and mobile health across various regards to granting the common requested permission such as loca­
domains of medical practices that range from clinical apps, to fitness tion). Interested researchers on secure mobile computing could uti­
trackers to diet and nutrition decision support [2]. Despite the offered lize an attack simulation research to measure user’ reactions as it
benefits such as autonomy, efficiency, and pervasiveness of healthcare helps to avoid biased data collection.
services, mHealth apps face some challenges pertaining to security and • Developers and stakeholders to understand security specific knowl­
privacy of health critical data. In addition to developing secure mHealth edge and behaviors of user, monitored by our proof of the concept
apps and optimizing the methods and techniques for secure storage, attack simulator to develop and provide emerging and futuristic class
processing, and transmission of data, there is a need to understand and of mHealth apps that are secure and usable.
enhance the security awareness of the users. Security understanding of
mHealth app users relates to their knowledge and behavior (often CRediT authorship contribution statement
translating into actions) to ensure secure usage. In addition to the
technical measures that ensure security of mHealth apps, enhancing the Bakheet Aljedaani: Methodology, Validation, Data curation,
security awareness of mobile users is critical due to the high number of Formal analysis, Visualization, Writing – review & editing. Aakash
security threats and the numerous malicious activities. Such an aware­ Ahmad: Methodology, Formal analysis, Visualization, Writing – review
ness would help to secure confidential data stored within the devices. & editing. Mansooreh Zahedi: Writing – review & editing. Muhammad
We conducted an empirical study to monitor and analyze the actions and Ali Babar: Methodology, Writing – review & editing, Supervision.
behaviors of mHealth app users – relying on an attack simulation
approach – to overcome the inherent bias and limitations of the Declaration of Competing Interest
self-reported surveys. The key findings of our study are:
The authors declare that they have no known competing financial
• mHealth users most often overlook the privacy policies while interests or personal relationships that could have appeared to influence
installing or updating the apps, resulting in issues of apps accessing the work reported in this paper.
classified data with user granted permissions. We noted that the
average time spent on reviewing privacy policies was 8.02 ms, that is Data availability
67% less than bare minimum time to go through the policies (at least
a minute to review). Reference 45
• Users (i.e., 36% of our participants) selected no security method for
the simulation app as their favourable method to access the app and
47.5% (± 2.5) of our participants have granted our simulation app

14
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

Acknowledgments [29] M. Zeybek, E.N. Yılmaz, İ.A. Doğru, A study on security awareness in mobile
devices, in: Proceedings of the 1st International Informatics and Software
Engineering Conference (UBMYK), 2019, pp. 1–6.
We thank Abdulrahman Gharwi for sharing his experience that hel­ [30] E.M. Redmiles, Y. Acar, S. Fahl, and M.L. Mazurek, "A summary of survey
ped to develop the simulation app. We also thank Leonardo Iwaya for his methodology best practices for security and privacy researchers," 2017.
input during the different phases of the study. [31] R. Tourangeau, T.W. Smith, Asking sensitive questions: the impact of data
collection mode, question format, and question context, Public Opin. Q. 60 (1996)
275–304.
References [32] R. Tourangeau, T. Yan, Sensitive questions in surveys, Psychol. Bull. 133 (2007)
859.
[33] S. Egelman, M. Harbach, E. Peer, Behavior ever follows intention? a validation of
[1] L.H. Iwaya, A. Ahmad, M.A. Babar, Security and privacy for mHealth and uHealth
the security behavior intentions scale (SeBIS), in: Proceedings of the 2016 CHI
systems: a systematic mapping study, IEEE Access 8 (2020) 150081–150112.
Conference on Human Factors in Computing Systems, 2016, pp. 5257–5261.
[2] A. Papageorgiou, M. Strigkos, E. Politou, E. Alepis, A. Solanas, C. Patsakis, Security
[34] D. Aljeaid, A. Alzhrani, M. Alrougi, O. Almalki, Assessment of end-user
and privacy analysis of mobile health applications: the alarming state of practice,
susceptibility to cybersecurity threats in Saudi Arabia by simulating phishing
IEEE Access 6 (2018) 9390–9403.
attacks, Information 11 (12) (2020), 547.
[3] K. Knorr, D. Aspinall, Security testing for android mHealth apps, in: Proceedings of
[35] T. Daengsi, P. Pornpongtechavanich, P. Wuttidittachotti, Cybersecurity awareness
the IEEE 8th International Conference on Software Testing, Verification and
enhancement: a study of the effects of age and gender of Thai employees associated
Validation Workshops, ICSTW 2015 - Proceedings, 2015.
with phishing attacks, Educ. Inf. Technol. (2021) 1–24.
[4] H.K. Flaten, C. St Claire, E. Schlager, C.A. Dunnick, R.P. Dellavalle, Growth of
[36] P. Rajivan, C. Gonzalez, Creative persuasion: a study on adversarial behaviors and
mobile applications in dermatology-2017 update, Dermatol. Online J. 24 (2018).
strategies in phishing attacks, Front. Psychol. 9 (2018) 135.
[5] T. Mabo, B. Swar, S. Aghili, A vulnerability study of Mhealth chronic disease
[37] R. Wash, E. Rader, C. Fennell, Can people self-report security accurately?
management (CDM) applications (apps), Adv. Intell. Syst. Comput. 745 (2018)
agreement between self-report and behavioral measures, in: Proceedings of the
587–598.
2017 CHI Conference on Human Factors in Computing Systems, 2017,
[6] F. Zahra, A. Hussain, H. Mohd, Factor affecting mobile health application for
pp. 2228–2232.
chronic diseases, J. Telecommun. Electron. Comput. Eng. JTEC 10 (2018) 77–81.
[38] J.S. Molléri, K. Petersen, E. Mendes, Survey guidelines in software engineering: an
[7] L. Ramey, C. Osborne, D. Kasitinon, S. Juengst, Apps and mobile health technology
annotated review, in: Proceedings of the 10th ACM/IEEE International Symposium
in rehabilitation: the good, the bad, and the unknown, Phys. Med. Rehabil. Clin. 30
on Empirical Software Engineering and Measurement, 2016, pp. 1–6.
(2019) 485–497.
[39] S. Barth, M.D. de Jong, M. Junger, P.H. Hartel, J.C. Roppelt, Putting the privacy
[8] A.M. Research, "Digital Health Market available at https://www.alliedmarketrese
paradox to the test: online privacy and security behaviors among users with
arch.com/digital-health-market-A10934," 2021.
technical knowledge, privacy awareness, and financial resources, Telemat. Inform.
[9] M. Hussain, A.A. Zaidan, B.B. Zidan, S. Iqbal, M.M. Ahmed, O.S. Albahri, et al.,
41 (2019) 55–69.
Conceptual framework for the security of mobile health applications on android
[40] A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, D. Wagner, Android permissions:
platform, Telemat. Inform. 35 (2018) 1335–1354.
user attention, comprehension, and behavior, in: Proceedings of the Eighth
[10] G. Thamilarasu and C. Lakin, "A security framework for mobile health
Symposium on Usable Privacy and Security, 2012, pp. 1–14.
applications," in Proceedings - 2017 5th International Conference on Future
[41] E. Struse, J. Seifert, S. Üllenbeck, E. Rukzio, C. Wolf, PermissionWatcher: creating
Internet of Things and Cloud Workshops, W-FiCloud 2017, 2017, pp. 221–226.
user awareness of application permissions in mobile systems, in: Proceedings of the
[11] S. Morgan, "Cybercrime to cost the world $10.5 trillion annually by 2025 available
International Joint Conference on Ambient Intelligence, 2012, pp. 65–80.
at "https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/"
[42] P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov,
[Last accessed: 06/11/2021]," 2020.
"Android permissions remystified: a field study on contextual integrity," in
[12] F. Zubaydi, A. Saleh, F. Aloul, A. Sagahyroon, Security of mobile health (mHealth)
Proceedings of the 24th {USENIX} Security Symposium ({USENIX} Security 15),
systems, in: Proceedings of the IEEE 15th International Conference on
2015, pp. 499–514.
Bioinformatics and Bioengineering, BIBE, 2015.
[43] W. Peng, S. Kanthawala, S. Yuan, S.A. Hussain, A qualitative study of user
[13] Y. Cifuentes, L. Beltrán, L. Ramírez, Analysis of security vulnerabilities for mobile
perceptions of mobile health apps, BMC Public Health 16 (2016) 1158.
health applications, in: Proceedings of the Seventh International Conference on
[44] L. Zhou, J. Bao, V. Watzlaf, B. Parmanto, Barriers to and facilitators of the use of
Mobile Computing and Networking (ICMCN 2015), 2015.
mobile health apps from a security perspective: mixed-methods study, JMIR
[14] R. Bitton, K. Boymgold, R. Puzis, A. Shabtai, Evaluating the information security
mHealth uHealth 7 (4) (2019), e11223.
awareness of smartphone users, in: Proceedings of the 2020 CHI Conference on
[45] B. Aljedaani, "Measuring the security awareness of end-users towards using mobile
Human Factors in Computing Systems, 2020, pp. 1–13.
health apps: an attack simulation approach [Supplementary Data]. [Online:] htt
[15] A.A. Atienza, C. Zarcadoolas, W. Vaughon, P. Hughes, V. Patel, W.Y.S. Chou,
ps://sites.google.com/view/attack-simulation-approach/home," 2021.
Consumer attitudes and perceptions on mHealth privacy and security: findings
[46] L. Statistics, "Chi-square test for association using SPSS statistics [online] available
from a mixed-methods study, J. Health Commun. 20 (2015) 673–679.
at https://statistics.laerd.com/spss-tutorials/chi-square-test-for-association-using-s
[16] M. Koyuncu, T. Pusatli, Security awareness level of smartphone users: an
pss-statistics.php," 2018.
exploratory case study, Mob. Inf. Syst. 2019 (2019).
[47] R.G.V.D. Berg, "SPSS Mann-Whitney Test – Simple Example available at htt
[17] S. Furnell, R. Esmael, W. Yang, N. Li, Enhancing security behaviour by supporting
ps://www.spss-tutorials.com/spss-mann-whitney-test-simple-example/,"
the user, Comput. Secur. 75 (2018) 1–9.
November 2020.
[18] H. Molyneaux, E. Stobert, I. Kondratova, and M. Gaudet, "Security matters… until
[48] S. Glen, "Kruskal Wallis H Test: definition, examples & assumptions available at
something else matters more: security notifications on different form factors," in
https://www.statisticshowto.com/kruskal-wallis/," May 2021.
Proceedings of the International Conference on Human-Computer Interaction,
[49] L. Statistics, "Kruskal-Wallis H test using SPSS statistics [online] available at https
2020, pp. 189–205.
://statistics.laerd.com/spss-tutorials/kruskal-wallis-h-test-using-spss-statistics.
[19] S.M. Furnell, A. Jusoh, D. Katsabas, The challenges of understanding and using
php," 2018.
security: a survey of end-users, Comput. Secur. 25 (2006) 27–35.
[50] S.H. To, "Post hoc definition and types of tests [online] available at https://www.
[20] B. Aljedaani, A. Ahmad, M. Zahedi, M.A. Babar, End-users’ knowledge and
statisticshowto.com/probability-and-statistics/statistics-definitions/post-hoc/."
perception about security of clinical mobile health apps: a case study with two
2023.
Saudi Arabian mHealth providers, J. Syst. Softw. 195 (2023), 111519.
[51] V. Braun, V. Clarke, Using thematic analysis in psychology, Qual. Res. Psychol. 3
[21] I. Technologies, "Hackers increasingly exploit human factor avaliable at https://
(2006) 77–101.
www.ipctech.com/hackers-increasingly-exploit-human-factor/," 2021.
[52] D.S. Cruzes and T. Dyba, "Recommended steps for thematic synthesis in software
[22] K. Parsons, D. Calic, M. Pattinson, M. Butavicius, A. McCormac, T. Zwaans, The
engineering," in Empirical Software Engineering and Measurement (ESEM), 2011
human aspects of information security questionnaire (HAIS-Q): two further
International Symposium on, 2011, pp. 275–284.
validation studies, Comput. Secur. 66 (2017) 40–51.
[53] M.B. Miles and A.M. Huberman, Qualitative data analysis: an expanded
[23] B. Aljedaani, A. Ahmad, M. Zahedi, M.A. Babar, An empirical study on developing
sourcebook: Sage, 1994.
secure mobile health apps: the developers’ perspective, in: Proceedings of the 27th
[54] L. statistics, "Spearman’s rank-order correlation [online] available at https://stati
Asia-Pacific Software Engineering Conference (APSEC), Singapore, Singapore,
stics.laerd.com/statistical-guides/spearmans-rank-order-correlation-statistical-gui
2020, pp. 208–217.
de.php," 2018.
[24] B. Aljedaani, A. Ahmad, M. Zahedi, M.A. Babar, Security awareness of end-users of
[55] ""Spearman’s correlation" available at https://www.statstutor.ac.uk/resources/upl
mobile health applications: an empirical study, Presented at the MobiQuitous -, in:
oaded/spearmans.pdf." 2023.
Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous
[56] R. Bitton, A. Finkelshtein, L. Sidi, R. Puzis, L. Rokach, A. Shabtai, Taxonomy of
Systems: Computing, Networking and Services, Darmstadt, Germany, 2020.
mobile users’ security awareness, Comput. Secur. 73 (2018) 266–293.
[25] F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki, A survey of cyber-security
[57] M. Rosenblatt, A central limit theorem and a strong mixing condition, Proc. Natl.
awareness in Saudi Arabia, in: Proceedings of the 11th International Conference for
Acad. Sci. 42 (1956) 43–47.
Internet Technology and Secured Transactions (ICITST), 2016, pp. 154–158.
[58] L. Statistics, "Mann-Whitney U test using SPSS statistics [online] available at https
[26] V. Gkioulos, G. Wangen, S.K. Katsikas, G. Kavallieratos, P. Kotzanikolaou, Security
://statistics.laerd.com/spss-tutorials/mann-whitney-u-test-using-spss-statistics.ph
awareness of the digital natives, Information 8 (2017) 42.
p," 2018.
[27] A. Mylonas, A. Kastania, D. Gritzalis, Delegate the smartphone user? security
[59] T.L. Team, "Mobile app privacy policy template available at "https://termly.
awareness in smartphone platforms, Comput. Secur. 34 (2013) 47–66.
io/resources/templates/app-privacy-policy/#what-is-an-app-privacy-policy",
[28] B. Watson, J. Zheng, On the user awareness of mobile security recommendations,
2017.
in: Proceedings of the SouthEast Conference, 2017, pp. 120–127.

15
B. Aljedaani et al. Information and Software Technology 163 (2023) 107285

[60] A. Razaghpanah, R. Nithyanand, N. Vallina-Rodriguez, S. Sundaresan, M. Allman, [64] L. Parker, V. Halter, T. Karliychuk, Q. Grundy, How private is your mental health
C. Kreibich, Apps, trackers, privacy, and regulators: a global study of the mobile app data? an empirical study of mental health app privacy policies and practices,
tracking ecosystem, in: Proceedings of the 25th Annual Network and Distributed Int. J. Law Psychiatry 64 (2019) 198–204.
System Security Symposium (NDSS2018), 2018. [65] M. Plachkinova, S. Andres, S. Chatterjee, A taxonomy of mHealth apps - security
[61] Y. Bertrand, K. Boudaoud, M. Riveill, What do you think about your company’s and privacy concerns, in: Proceedings of the Annual Hawaii International
leaks? a survey on end-users perception towards data leakage mechanisms, Front. Conference on System Sciences, 2015, pp. 3187–3196.
Big Data 3 (2020), 38. [66] R. Adhikari, D. Richards, K. Scott, Security and privacy issues related to the use of
[62] B. Hainzinger, "How to avoid mobile phone apps from leaking your personal data mobile health apps, in: Proceedings of the 25th Australasian Conference on
available at https://appdevelopermagazine.com/how-to-avoid-mobile-phone- Information Systems, ACIS 2014, 2014.
apps-from-leaking-your-personal-data/," 2020. [67] B. Martínez-Pérez, I. de la Torre-Díez, M. López-Coronado, Privacy and security in
[63] T. Germain, "How to protect yourself from camera and microphone hacking mobile health apps: a review and recommendations, J. Med. Syst. 39 (2015) 1–8.
available at https://www.consumerreports.org/privacy/how-to-protect-yoursel [68] E.P. Morera, I. de la Torre Díez, B. Garcia-Zapirain, M. López-Coronado,
f-from-camera-and-microphone-hacking-a1010757171/," 2019. J. Arambarri, Security recommendations for mHealth apps: elaboration of a
developer’s guide, J. Med. Syst. 40 (2016).

16

You might also like