Android permissions: user attention, comprehension, and behavior
暂无分享,去创建一个
David A. Wagner | Serge Egelman | Adrienne Porter Felt | Elizabeth Ha | Ariel Haney | Erika Chin | D. Wagner | A. Felt | Erika Chin | Serge Egelman | Elizabeth Ha | Ariel Haney
[1] J. Bettman. An information processing theory of consumer choice , 1979 .
[2] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[3] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[4] HongJason,et al. Understanding and capturing people's privacy policies in a mobile social networking application , 2009 .
[5] Ponnurangam Kumaraguru,et al. Privacy Indexes: A Survey of Westin's Studies , 2005 .
[6] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[7] Anind K. Dey,et al. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.
[8] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[9] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[10] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[11] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[13] Kirstie Hawkey,et al. Do windows users follow the principle of least privilege?: investigating user account control practices , 2010, SOUPS.
[14] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[15] N. Blunch. Position Bias in Multiple-Choice Questions , 1984 .
[16] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[17] John Zimmerman,et al. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.
[18] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[19] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[20] X. Zhang,et al. Impact of Online Consumer Reviews on Sales: The Moderating Role of Product and Consumer Characteristics , 2010 .
[21] Lorrie Faith Cranor,et al. A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.
[22] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[23] James Shanteau,et al. Reducing the influence of irrelevant information on experienced decision makers , 1984 .
[24] Lorrie Faith Cranor,et al. When are users comfortable sharing locations with advertisers? , 2011, CHI.
[25] S. Sen,et al. Why are you telling me this? An examination into negative consumer reviews on the Web , 2007 .
[26] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[27] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[28] Peter Graf,et al. Multi-Layered Interfaces to Improve Older Adults’ Initial Learnability of Mobile Applications , 2010, TACC.
[29] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[30] Jennifer King,et al. Privacy: is there an app for that? , 2011, SOUPS.
[31] Alessandro Acquisti,et al. Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.
[32] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[33] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[34] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[35] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[36] B. Shneiderman. Promoting universal usability with multi-layer interface design , 2002, CUU '03.
[37] Adam N. Joinson,et al. Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..
[38] Joel Huber,et al. Consumer processing of hazard warning information , 1988 .
[39] Jon Howell,et al. What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors , 2010 .