Harris, Mark A.; Chin, Amita G. - In: Information & Computer Security 24 (2016) 5, pp. 474-495
and in-app purchases (IAP) from Google’s top developers and traditional developers were investigated in several Google …. Findings Overall, Google’s top developers’ apps request more risky permissions and IAP than do traditional developers. Other … permissions and IAP before. …