Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do

Smartphone apps can harvest very personal details from the phone with ease. This is a particular privacy concern. Unthinking installation of untrustworthy apps constitutes risky behaviour. This could be due to poor awareness or a lack of knowhow: knowledge of how to go about protecting privacy. It seems that Smartphone owners proceed with installation, ignoring any misgivings they might have, and thereby irretrievably sacrifice their privacy.

[1]  可児 潤也 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .

[2]  Studying the effectiveness of android application permissions requests , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[3]  Melanie Volkamer,et al.  Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy , 2015, CSOC.

[4]  Sebastian Möller,et al.  Analyzing End-Users ’ Knowledge and Feelings Surrounding Smartphone Security and Privacy , 2015 .

[5]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.

[6]  Konstantin Beznosov,et al.  Understanding Users' Requirements for Data Protection in Smartphones , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.

[7]  Melanie Volkamer,et al.  A Socio-Technical Investigation into Smartphone Security , 2015, STM.

[8]  George R. S. Weir,et al.  Perceived risk and sensitive data on mobile devices , 2011 .

[9]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[10]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[11]  David A. Wagner,et al.  I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.

[12]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[13]  A. Stone,et al.  The Seven Sins of Memory: How the Mind Forgets and Remembers , 2001 .

[14]  Sunny Consolvo,et al.  "...No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices , 2015, SOUPS.

[15]  William Klieber,et al.  Smartphone Security , 2015, IEEE Pervasive Computing.