The effect of developer-specified explanations for permission requests on smartphone user behavior
暂无分享,去创建一个
David A. Wagner | Serge Egelman | Christopher Thompson | Khanh Nguyen | Michael Theodorides | Joshua Tan | Heidi Negrón-Arroyo
[1] Lorrie Faith Cranor,et al. Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.
[2] David A. Wagner,et al. When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources , 2013, SOUPS.
[3] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[4] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[5] 岩橋 敏幸,et al. "Your Attention Please: Designing security-decision UIs to make genuine risks harder to ignore"の紹介 , 2013 .
[6] David A. Wagner,et al. Short paper: location privacy: user behavior in the field , 2012, SPSM '12.
[7] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[8] David A. Wagner,et al. AdDroid: privilege separation for applications and advertisers in Android , 2012, ASIACCS '12.
[9] José Carlos Brustoloni,et al. Improving security decisions with polymorphic and audited dialogs , 2007, SOUPS '07.
[10] Wenke Lee,et al. The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers , 2013, NDSS.
[11] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[12] Lorrie Faith Cranor,et al. You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.
[13] Lorrie Faith Cranor,et al. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs , 2011, Personal and Ubiquitous Computing.
[14] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[15] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[16] Jo-Mae B. Maris,et al. Signal Words and Signal Icons in Application Control and Information Technology Exception Messages - Hazard Matching and Habituation Effects , 2006, J. Inf. Syst..
[17] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[18] HongJason,et al. Understanding and capturing people's privacy policies in a mobile social networking application , 2009 .
[19] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[20] Lorrie Faith Cranor,et al. When are users comfortable sharing locations with advertisers? , 2011, CHI.
[21] José Carlos Brustoloni,et al. Hardening Web browsers against man-in-the-middle and eavesdropping attacks , 2005, WWW '05.
[22] Michael S. Wogalter,et al. Habituation, Dishabituation, and Recovery Effects in Visual Warnings , 2009 .
[23] E. Langer,et al. The Mindlessness of Ostensibly Thoughtful Action: The Role of "Placebic" Information in Interpersonal Interaction , 1978 .
[24] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.