Security Implications of Android Development

By choosing to participate in this survey you agree to let your answers be published in an essay at Stockholm University, Sweden. No personal data that can connect the participant to his answers, such as IP-address, internet handle or similar, will be saved or used in the essay to ensure that all participants are completely anonymous. The answers will not be used or shared outside the essay and the essay will not be sold or in any other way used for profit. The answers will not be edited and will be in their entirety.
    This is a required question
    This is a required question
    This is a required question
    This is a required question
    This is a required question
    This is a required question
    This is a required question
    This is a required question
    Users download other malicious applications that can take control over your applications data.
    A server that contains your applications data or source code gets hacked.
    A third party gets control over your users phone and gains access to your applications data.
    Data from your application gets intercepted when sent over the internet (i.e. through a man-in-the-middle attack or similar).
    This is a required question
    This is a required question
    This is a required question