Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do
暂无分享,去创建一个
Melanie Volkamer | Karen Renaud | Oksana Kulyk | Paul Gerber | Michael El Hanafi | Benjamin Reinheimer | K. Renaud | O. Kulyk | M. Volkamer | Paul Gerber | B. Reinheimer | M. Hanafi
[1] 可児 潤也. 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .
[2] Studying the effectiveness of android application permissions requests , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[3] Melanie Volkamer,et al. Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy , 2015, CSOC.
[4] Sebastian Möller,et al. Analyzing End-Users ’ Knowledge and Feelings Surrounding Smartphone Security and Privacy , 2015 .
[5] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.
[6] Konstantin Beznosov,et al. Understanding Users' Requirements for Data Protection in Smartphones , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.
[7] Melanie Volkamer,et al. A Socio-Technical Investigation into Smartphone Security , 2015, STM.
[8] George R. S. Weir,et al. Perceived risk and sensitive data on mobile devices , 2011 .
[9] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[10] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[11] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[12] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[13] A. Stone,et al. The Seven Sins of Memory: How the Mind Forgets and Remembers , 2001 .
[14] Sunny Consolvo,et al. "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices , 2015, SOUPS.
[15] William Klieber,et al. Smartphone Security , 2015, IEEE Pervasive Computing.