Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3038912.3052712acmotherconferencesArticle/Chapter ViewAbstractPublication PageswebconfConference Proceedingsconference-collections
research-article

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective

Published: 03 April 2017 Publication History
  • Get Citation Alerts
  • Abstract

    With the prevalence of smartphones, app markets such as Apple App Store and Google Play has become the center stage in the mobile app ecosystem, with millions of apps developed by tens of thousands of app developers in each major market. This paper presents a study of the mobile app ecosystem from the perspective of app developers. Based on over one million Android apps and 320,000 developers from Google Play, we analyzed the Android app ecosystem from different aspects. Our analysis shows that while over half of the developers have released only one app in the market, many of them have released hundreds of apps. We classified developers into different groups based on the number of apps they have released, and compared their characteristics. Specially, we have analyzed the group of aggressive developers who have released more than 50 apps, trying to understand how and why they create so many apps. We also investigated the privacy behaviors of app developers, showing that some developers have a habit of producing apps with low privacy ratings. Our study shows that understanding the behavior of mobile developers can be helpful to not only other app developers, but also to app markets and mobile users.

    References

    [1]
    B. Andow, A. Nadkarni, B. Bassett, W. Enck, and T. Xie. A study of grayware on Google Play. In Proceedings of Workshop on Mobile Security Technologies, 2016.
    [2]
    AndroidLib, 2016. http://www.androlib.com/.
    [3]
    Android Rank, 2016. http://www.androidrank.org/.
    [4]
    App Annie Forecast, 2016. https://www.appannie.com/cn/landing/forecast/.
    [5]
    AppBrain, 2016. http://www.appbrain.com/.
    [6]
    Wikipedia App Store(iOS), 2016. https://en.wikipedia.org/wiki/App_Store_(iOS).
    [7]
    R. Baeza-Yates, D. Jiang, F. Silvestri, and B. Harrison. Predicting the next app that you are going to use. In Proceedings of WSDM '15, pages 285--294, 2015.
    [8]
    R. Balebako, A. Marsh, J. Lin, J. Hong, and L. Cranor. The privacy and security behaviors of smartphone app developers. In Proceedings of the 2014 Workshop on Usable Security (USEC), 2014.
    [9]
    E. Bello-Ogunu and M. Shehab. Permitme: integrating Android permissioning support in the IDE. In Proceedings of the 2014 Workshop on Eclipse Technology eXchange, pages 15--20. ACM, 2014.
    [10]
    S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. Mast: Triage for market-scale mobile malware analysis. In Proceedings of WiSec'13, pages 13--24.
    [11]
    N. Chen, J. Lin, S. C. H. Hoi, X. Xiao, and B. Zhang. Ar-miner: Mining informative reviews for developers from mobile app marketplace. In Proceedings of ICSE '14, pages 767--778, 2014.
    [12]
    E. Chin, A. P. Felt, V. Sekar, and D. Wagner. Measuring user confidence in smartphone security and privacy. In Proceedings of SOUPS '12.
    [13]
    Detecting libraries in Android apps, 2016. http://radar.pkuos.org/.
    [14]
    A demographic and business model analysis of today's app developer, 2016. http://www.doyoubuzz.com/var/f/xh/gJ/xhgJP6i_3R7alpfo5mCrKD4wLVByQzFvtIONbUGMcuX2AEWTZ-.pdf.
    [15]
    N. d'Heureuse, F. Huici, M. Arumaithurai, M. Ahmed, K. Papagiannaki, and S. Niccolini. What's app?: A wide-scale measurement study of smart phone markets. SIGMOBILE Mob. Comput. Commun. Rev., 16(2), 2012.
    [16]
    W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of OSDI '10.
    [17]
    W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of Android application security. In Proceedings of the 20th USENIX Conference on Security, 2011.
    [18]
    A. P. Felt, K. Greenwood, and D. Wagner. The effectiveness of application permissions. In Proceedings of WebApps'11.
    [19]
    B. Fu, J. Lin, L. Li, C. Faloutsos, J. Hong, and N. Sadeh. Why people hate your app: Making sense of user feedback in a mobile app store. In Proceedings of KDD '13, pages 1276--1284, 2013.
    [20]
    Wikipedia Google Play, 2016. http://en.wikipedia.org/wiki/Google_Play.
    [21]
    M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. Riskranker: Scalable and accurate zero-day Android malware detection. In Proceedings of MobiSys'12, pages 281--294, 2012.
    [22]
    M. Harman, A. Al-Subaihin, Y. Jia, W. Martin, F. Sarro, and Y. Zhang. Mobile app and app store analysis, testing and optimisation. In Proceedings of MOBILESoft'16, pages 243--244, 2016.
    [23]
    A. Holzer and J. Ondrus. Mobile application market: A developer's perspective. Telematics and Informatics, 28(1):22--31, 2011.
    [24]
    A. Karatzoglou, L. Baltrunas, K. Church, and M. Böhmer. Climbing the app wall: Enabling mobile app discovery through context-aware recommendations. In Proceedings of CIKM '12, pages 2527--2530.
    [25]
    H. Khalid, E. Shihab, M. Nagappan, and A. E. Hassan. What do mobile app users complain about? IEEE Software, 32(3):70--77, 2015.
    [26]
    H. Li, W. Ai, X. Liu, J. Tang, G. Huang, F. Feng, and Q. Mei. Voting with their feet: Inferring user preferences from app management activities. In Proceedings of WWW '16, pages 1351--1362.
    [27]
    Y. Li, Y. Guo, and X. Chen. Peruim: Understanding mobile application privacy with permission-ui mapping. In Proceedings of UbiComp '16, pages 682--693.
    [28]
    J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of UbiComp '12, pages 501--510.
    [29]
    J. Lin, B. Liu, N. Sadeh, and J. I. Hong. Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings. In Proceedings of SOUPS '14, pages 199--212.
    [30]
    M. Liu, H. Wang, Y. Guo, and J. Hong. Identifying and analyzing the privacy of apps for kids. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications (HotMobile '16), pages 105--110, 2016.
    [31]
    Z. Ma, H. Wang, Y. Guo, and X. Chen. Libradar: Fast and accurate detection of third-party libraries in Android apps. In Proceedings of the 38th International Conference on Software Engineering Companion (ICSE '16), pages 653--656, 2016.
    [32]
    There are 12 million mobile developers worldwide, 2016. http://www.businessofapps.com/12-million-mobile-developers-worldwide-nearly-half-develop-android-first/.
    [33]
    Number of available apps in Google Play, 2016. https://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store/.
    [34]
    Privacy Grade, 2016. http://privacygrade.org/.
    [35]
    V. Rastogi, Y. Chen, and W. Enck. Appsplayground: Automatic security analysis of smartphone applications. In Proceedings of CODASPY '13, pages 209--220, 2013.
    [36]
    F. Sarro, A. A. Al-Subaihin, M. Harman, Y. Jia, W. Martin, and Y. Zhang. Feature lifecycles as they spread, migrate, remain, and die in app stores. In Proceedings of RE'15, pages 76--85.
    [37]
    S. Seneviratne, H. Kolamunna, and A. Seneviratne. A measurement study of tracking in paid mobile applications. In Proceedings of WiSec'15, pages 7:1--7:6, 2015.
    [38]
    S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti. Your installed apps reveal your gender and more! SIGMOBILE Mob. Comput. Commun. Rev., 18(3):55--61, 2015.
    [39]
    N. Viennot, E. Garcia, and J. Nieh. A measurement study of Google Play. In Proceedings of SIGMETRICS'14, pages 221--233, 2014.
    [40]
    H. Wang, Y. Guo, Z. Ma, and X. Chen. Wukong: A scalable and accurate two-phase approach to Android app clone detection. In Proceedings of ISSTA '15, pages 71--82.
    [41]
    H. Wang, Y. Guo, Z. Tang, G. Bai, and X. Chen. Reevaluating Android permission gaps with static and dynamic analysis. In Proceedings of GLOBECOM '15.
    [42]
    H. Wang, J. I. Hong, and Y. Guo. Using text mining to infer the purpose of permission use in mobile apps. In Proceedings of UbiComp '15, pages 1107--1118.
    [43]
    H. Wang, Z. Wang, Y. Guo, and X. Chen. Detecting repackaged Android applications based on code clone detection technique. In SCIENCE CHINA Information Sciences, volume 44(1), pages 142--157, 2014.
    [44]
    Worldwide mobile app revenues in 2015, 2015 and 2020 (in billion U.S. dollars), 2016. https://www.statista.com/statistics/269025/worldwide-mobile-app-revenue-forecast/.
    [45]
    Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang. Vetting undesirable behaviors in Android apps with permission use analysis. In Proceedings of CCS'13, pages 611--622.
    [46]
    N. Zhong and F. Michahelles. Google Play is not a long tail market: An empirical analysis of app adoption on the Google Play app market. In Proceedings of SAC '13, pages 499--504.
    [47]
    W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party Android marketplaces. In Proceedings of CODASPY '12.
    [48]
    X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan, X. Wang, C. A. Gunter, and K. Nahrstedt. Identity, location, disease and more: Inferring your secrets from Android public resources. In Proceedings of CCS '13, pages 1017--1028.
    [49]
    Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on Android). In Proceedings of TRUST '11, pages 93--107.
    [50]
    H. Zhu, H. Xiong, Y. Ge, and E. Chen. Mobile app recommendations with security and privacy awareness. In Proceedings of KDD'14, pages 951--960.
    [51]
    K. Zhu, X. He, B. Xiang, L. Zhang, and A. Pattavina. How dangerous are your smartphones? app usage recommendation with privacy preserving. Mobile Information Systems, 2016:6804379:1--6804379:10, 2016.

    Cited By

    View all
    • (2024)Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform AnalysesProceedings of the 21st International Conference on Mining Software Repositories10.1145/3643991.3644896(348-360)Online publication date: 15-Apr-2024
    • (2023)A Deep Dive into the Featured iOS AppsProceedings of the 14th Asia-Pacific Symposium on Internetware10.1145/3609437.3609467(112-122)Online publication date: 4-Aug-2023
    • (2023)Mixed Signals: Analyzing Software Attribution Challenges in the Android EcosystemIEEE Transactions on Software Engineering10.1109/TSE.2023.323658249:4(2964-2979)Online publication date: 1-Apr-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    WWW '17: Proceedings of the 26th International Conference on World Wide Web
    April 2017
    1678 pages
    ISBN:9781450349130

    Sponsors

    • IW3C2: International World Wide Web Conference Committee

    In-Cooperation

    Publisher

    International World Wide Web Conferences Steering Committee

    Republic and Canton of Geneva, Switzerland

    Publication History

    Published: 03 April 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. android
    2. app clone
    3. app developers
    4. app ecosystem
    5. google play
    6. mobile apps
    7. mobile privacy

    Qualifiers

    • Research-article

    Conference

    WWW '17
    Sponsor:
    • IW3C2

    Acceptance Rates

    WWW '17 Paper Acceptance Rate 164 of 966 submissions, 17%;
    Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)85
    • Downloads (Last 6 weeks)5
    Reflects downloads up to

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Comparing Apples to Androids: Discovery, Retrieval, and Matching of iOS and Android Apps for Cross-Platform AnalysesProceedings of the 21st International Conference on Mining Software Repositories10.1145/3643991.3644896(348-360)Online publication date: 15-Apr-2024
    • (2023)A Deep Dive into the Featured iOS AppsProceedings of the 14th Asia-Pacific Symposium on Internetware10.1145/3609437.3609467(112-122)Online publication date: 4-Aug-2023
    • (2023)Mixed Signals: Analyzing Software Attribution Challenges in the Android EcosystemIEEE Transactions on Software Engineering10.1109/TSE.2023.323658249:4(2964-2979)Online publication date: 1-Apr-2023
    • (2023)CiD4HMOS: A Solution to HarmonyOS Compatibility Issues2023 38th IEEE/ACM International Conference on Automated Software Engineering (ASE)10.1109/ASE56229.2023.00134(2006-2017)Online publication date: 11-Sep-2023
    • (2022)Demystifying “removed reviews” in iOS app storeProceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3540250.3558966(1489-1499)Online publication date: 7-Nov-2022
    • (2022)MalRadarProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35309066:2(1-27)Online publication date: 6-Jun-2022
    • (2022)Artificial Intelligence Feedback Loops in Mobile Platform Business ModelsInternational Journal of Wireless Information Networks10.1007/s10776-022-00556-929:3(250-256)Online publication date: 19-Apr-2022
    • (2022)A First Look at Android Apps’ Third-Party Resources LoadingNetwork and System Security10.1007/978-3-031-23020-2_11(193-213)Online publication date: 7-Dec-2022
    • (2021)Deciding on personalized adsProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563602(573-595)Online publication date: 9-Aug-2021
    • (2021)Political Leaders in the APP EcosystemSocial Sciences10.3390/socsci1008030710:8(307)Online publication date: 13-Aug-2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media