Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study
暂无分享,去创建一个
[1] I. Altman. Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .
[2] J. Gliem,et al. Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales , 2003 .
[3] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[4] Shuqiang Zhang,et al. Assessing Multicultural Competence: Perceived Versus Demonstrated Performance , 2008 .
[5] Ping Gao,et al. The transformation of the mobile telecommunications industry in Pakistan: A developing country perspective , 2009 .
[6] Elizabeth Papadopoulou,et al. Is There Really a Conflict Between Privacy and Personalisation? , 2011, ISD.
[7] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[8] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[9] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[10] 可児 潤也. 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .
[11] Tao Xie,et al. Improving mobile application security via bridging user expectations and application behaviors , 2014, HotSoS '14.
[12] Lorrie Faith Cranor,et al. Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .
[13] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[14] Lilian Mitrou,et al. Reengineering the user: privacy concerns about personal data on smartphones , 2015, Inf. Comput. Secur..
[15] Irina Shklovski,et al. Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.
[16] Yue Liu. User control of personal information concerning mobile-app: Notice and consent? , 2014, Comput. Law Secur. Rev..
[17] Haejung Yun,et al. A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators , 2014, ICIS.
[18] Zhong Wang,et al. Privacy trust crisis of personal data in China in the era of Big Data: The survey and countermeasures , 2015, Comput. Law Secur. Rev..
[19] Michael Nofer. The Value of Social Media for Predicting Stock Returns , 2015, Springer Fachmedien Wiesbaden.
[20] Seung-Hyun Kim,et al. Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[21] Katarzyna Wac,et al. Anonymous smartphone data collection: factors influencing the users’ acceptance in mobile crowd sensing , 2015, Personal and Ubiquitous Computing.
[22] Jacques Ophoff,et al. Security awareness and adoption of security controls by smartphone users , 2015, 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec).
[23] Ilaria Liccardi,et al. Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.
[24] Paarijaat Aditya,et al. Brave New World: Privacy Risks for Mobile Users , 2015, MOCO.
[25] Meikang Qiu,et al. Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.
[26] Paul Resnick,et al. It's Creepy, But it Doesn't Bother Me , 2016, CHI.
[27] Steffen Beich. Research Design And Methods A Process Approach , 2016 .
[28] Wonsun Shin,et al. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure , 2016, Cyberpsychology Behav. Soc. Netw..
[29] H. Jeff Smith,et al. A cross-cultural comparison of information privacy concerns in Singapore, Sweden and the United States , 2016, ICEC.
[30] Anirudha Joshi,et al. Beyond “yesterday’s tomorrow”: future-focused mobile interaction design by and for emergent users , 2016, Personal and Ubiquitous Computing.
[31] Borka Jerman-Blazic,et al. User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study , 2016, Telematics Informatics.