Literaturverzeichnis

[1] Android Developers. I think I found a security flaw. How do I report it? https://developer.android.com/guide/faq/security.html#issue. Letzter Zugriff am 31.07.2014.

[2] Apple. Apple-Datenschutzrichtlinie. http://www.apple.com/legal/privacy/de-ww/. Letzter Zugriff am 31.07.2014.

[3] Apple. Apple-Nutzungsbedingungen iOS7. http://images.apple.com/legal/sla/docs/iOS7.pdf. Letzter Zugriff am 31.07.2014.

[4] Apple. App Store Review Guidelines. https://developer.apple.com/appstore/resources/approval/guidelines.html, 2013. Letzter Zugriff am 31.07.2014.

[5] Apple. iOS Security. http://images.apple.com/ipad/business/docs/iOS_Security_Feb14.pdf, February 2014. Letzter Zugriff am 31.07.2014.

[6] BlackBerry. BlackBerry-Lösungslizenzvereinbarung. http://de.blackberry.com/legal/blackberry-solution-license-agreement.html. Letzter Zugriff am 31.07.2014.

[7] BlackBerry. BlackBerry World Vetting Criteria.

[8] BlackBerry. Datenschutzrichtlinie. http://de.blackberry.com/legal/privacy-policy.html. Letzter Zugriff am 31.07.2014.

[9] BlackBerry. Rechtliche Hinweise. http://de.blackberry.com/legal.html. Letzter Zugriff am 31.07.2014.

[10] Glenn Block, Pablo Cibraro, Pedro Felix, Howard Dierking, and Darrel Miller. Designing Evolvable Web APIs with ASP. NET. O’Reilly Media, Inc., 2014.

[11] Dan Goodin. Stealthy technique fingerprints smartphones by measuring users’ movements. http://arstechnica.com/security/2013/10/stealthy-technique-fingerprintssmartphones-by-measuring-users-movements/. Letzter Zugriff am 31.07.2014.

[12] Google. Datenschutzbestimmungen. http://www.google.com/intl/de/policies/privacy/.

[13] Google. Report malicious or inappropriate apps. https://support.google.com/googleplay/
answer/2479847?hl=en. Letzter Zugriff am 31.07.2014.

[14] Google Play. App-Berechtigungen prüfen. https://support.google.com/googleplay/answer/6014972?hl=de. Letzter Zugriff am 31.07.2014.

[15] Hiroshi Lockheimer. Android and Security. http://googlemobile.blogspot.de/2012/02/android-and- security.html, February 2012. Letzter Zugriff am 31.07.2014.

[16] Kantar Worldpanel. Smartphone OS market share. http://www.kantarworldpanel.com/smartphone-os-market-share/. Letzter Zugriff am 31.07.2014.

[17] Kaspersky. Kaspersky Security Bulletin 2013. http://media.kaspersky.com/pdf/KSB_2013_EN.pdf, 2013. Letzter Zugriff am 31.07.2014.

[18] Jennifer R Kwapisz, Gary M Weiss, and Samuel A Moore. Activity recognition using cell phone accelerometers. ACM SigKDD Explorations Newsletter, 12 (2): 74–82, 2011.

[19] Marco Tabini. How Apple is improving mobile app security. http://www.macworld.com/article/2047567/howapple-is-improving-mobile-app-security.html, September 2013. Letzter Zugriff am 31.07.2014.

[20] Microsoft. Datenschutzbestimmungen. http://www.windowsphone.com/de-de/legal/wp8/ windows-phone-privacy-statement.

[21] Nick Arnott. What Apples ’Limit Add-Tracking’ Means to Users. http://www.doubleencore.com/2013/04/what-apples-limit-ad-tracking-feature-actually-means-to-users/. Letzter Zugriff am 31.07.2014.

[22] J Oberheide and C Miller. Dissecting the android bouncer. SummerCon 2012, New York, 2012.