Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings
暂无分享,去创建一个
[1] Deborah Estrin,et al. Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype , 2007, EmNets '07.
[2] Delphine Reinhardt,et al. What's the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications , 2013, 38th Annual IEEE Conference on Local Computer Networks - Workshops.
[3] Salil S. Kanhere,et al. A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..
[4] K. Strater,et al. Strategies and struggles with privacy in an online social networking community , 2008 .
[5] James A. Landay,et al. Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.
[6] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[7] Robert W. Reeder,et al. Visual vs. compact: a comparison of privacy policy interfaces , 2010, CHI.
[8] John Krumm,et al. Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.
[9] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[10] Norbert Gyorbíró,et al. An Activity Recognition System For Mobile Phones , 2009, Mob. Networks Appl..
[11] Predrag V. Klasnja,et al. Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.
[12] Wei Pan,et al. SoundSense: scalable sound sensing for people-centric applications on mobile phones , 2009, MobiSys '09.
[13] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[14] Ramachandran Ramjee,et al. Nericell: rich monitoring of road and traffic conditions using mobile smartphones , 2008, SenSys '08.
[15] Gary M. Weiss,et al. Activity recognition using cell phone accelerometers , 2011, SKDD.
[16] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[17] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[18] Matthias Hollick,et al. Exploring user preferences for privacy interfaces in mobile sensing applications , 2012, MUM.
[19] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[20] Lorrie Faith Cranor,et al. Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.
[21] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[22] Heather Richter Lipford,et al. The impact of social navigation on privacy policy configuration , 2010, SOUPS.
[23] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[24] Lorrie Faith Cranor,et al. User interfaces for privacy agents , 2006, TCHI.
[25] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[26] Katie Shilton,et al. Four billion little brothers? , 2009, Commun. ACM.
[27] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[28] Vesa T. Peltonen,et al. Computational auditory scene recognition , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[29] Mark Bilandzic,et al. Laermometer: a mobile noise mapping application , 2008, NordiCHI.