Studying users' adaptation to Android's run-time fine-grained access control system

[1]  David A. Wagner,et al.  Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences , 2017, SOUPS.

[2]  Gianluca Stringhini,et al.  A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model , 2017, HCI.

[3]  David A. Wagner,et al.  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[4]  Elisa Bertino,et al.  Android resource usage risk assessment using hidden Markov model and online learning , 2017, Comput. Secur..

[5]  Gianluca Stringhini,et al.  Permissions snapshots: Assessing users' adaptation to the Android runtime permission model , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Jeffry Stephen Babb,et al.  Examining the Continuance of Secure Behavior: A Longitudinal Field Study of Mobile Device Authentication , 2016, Inf. Syst. Res..

[7]  Theodore Tryfonas,et al.  A study on usability and security features of the Android pattern lock screen , 2016, Inf. Comput. Secur..

[8]  Carl A. Gunter,et al.  Free for All! Assessing User Data Exposure to Advertising Libraries on Android , 2016, NDSS.

[9]  Theodore Tryfonas,et al.  Impact of User Data Privacy Management Controls on Mobile Device Investigations , 2016, IFIP Int. Conf. Digital Forensics.

[10]  Alessandro Acquisti,et al.  Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions , 2016, SOUPS.

[11]  Kat Krol,et al.  Applying Cognitive Control Modes to Identify Security Fatigue Hotspots , 2016, WSF@SOUPS.

[12]  Carol J. Fung,et al.  Dude, ask the experts!: Android resource access permission recommendation with RecDroid , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[13]  Lorrie Faith Cranor,et al.  Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.

[14]  David A. Wagner,et al.  Android Permissions Remystified: A Field Study on Contextual Integrity , 2015, USENIX Security Symposium.

[15]  Ahmad-Reza Sadeghi,et al.  Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.

[16]  Matthew Smith,et al.  Selective cloaking: Need-to-know for location-based apps , 2013, 2013 Eleventh Annual Conference on Privacy, Security and Trust.

[17]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[18]  Zhuoqing Morley Mao,et al.  AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users , 2013, CODASPY.

[19]  Seungyeop Han,et al.  Short paper: enhancing mobile application permissions with runtime feedback and constraints , 2012, SPSM '12.

[20]  Todd D. Millstein,et al.  Dr. Android and Mr. Hide: fine-grained permissions in android applications , 2012, SPSM '12.

[21]  Dawn Xiaodong Song,et al.  Mining Permission Request Patterns from Android and Facebook Applications , 2012, 2012 IEEE 12th International Conference on Data Mining.

[22]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[23]  Daniel P. Siewiorek,et al.  The implications of offering more disclosure choices for social location sharing , 2012, CHI.

[24]  David A. Wagner,et al.  AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.

[25]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[26]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[27]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[28]  Lorrie Faith Cranor,et al.  Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.

[29]  Mauro Conti,et al.  CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.

[30]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[31]  Patrick D. McDaniel,et al.  Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.

[32]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[33]  S. Kiesling Dude , 2004 .

[34]  J. Krosnick,et al.  Survey research. , 1999, Annual review of psychology.

[35]  P. Dorman,et al.  A randomised comparison of the EuroQol and Short Form-36 after stroke , 1997, BMJ.

[36]  S. Hormuth The sampling of experiences in situ , 1986 .

[37]  P. V. Marsden,et al.  Handbook of Survey Research , 1985 .

[38]  M A Sinclair,et al.  Questionnaire design. , 1975, Applied ergonomics.