To Deny , or Not to Deny : A Personalized Privacy Assistant for Mobile App Permissions [ Draft ]
暂无分享,去创建一个
Alessandro Acquisti | Norman Sadeh | Bin Liu | Florian Schaub | Yuvraj Agarwal | Mads Schaarup Andersen | Hazim Almuhimedi | A. Acquisti | N. Sadeh | B. Liu | Y. Agarwal | F. Schaub | Hazim Almuhimedi
[1] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[2] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[3] Christopher D. Wickens,et al. A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[4] Andrew S. Patrick,et al. From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.
[5] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[6] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[7] Gediminas Adomavicius,et al. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.
[8] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[9] Yong Liu,et al. Do I Do What I Say?: Observed Versus Stated Privacy Preferences , 2007, INTERACT.
[10] Jens Grossklags,et al. What Can Behavioral Economics Teach Us about Privacy , 2008 .
[11] Chih-Jen Lin,et al. LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..
[12] Norman M. Sadeh,et al. Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? , 2009, Privacy Enhancing Technologies.
[13] Acquisti Carnegie. NudgingPrivacy The Behavioral Economics of Personal Information , 2009 .
[14] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[15] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[16] Tamara G. Kolda,et al. Scalable Tensor Factorizations with Missing Data , 2010, SDM.
[17] Norman M. Sadeh,et al. User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models , 2011, AAAI.
[18] Alessandro Acquisti,et al. Nudging Users Towards Privacy on Mobile Devices , 2011 .
[19] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[20] Seungyeop Han,et al. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.
[21] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[22] G. Kalyanaram,et al. Nudge: Improving Decisions about Health, Wealth, and Happiness , 2011 .
[23] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[24] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[25] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[26] Jennifer King. How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. , 2012 .
[27] David A. Wagner,et al. Short paper: location privacy: user behavior in the field , 2012, SPSM '12.
[28] David A. Wagner,et al. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.
[29] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[30] Lorrie Faith Cranor,et al. Privacy manipulation and acclimation in a location sharing application , 2013, UbiComp.
[31] Lorrie Faith Cranor,et al. Privacy as part of the app decision-making process , 2013, CHI.
[32] 可児 潤也. 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .
[33] Bongshin Lee,et al. Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing , 2013, INTERACT.
[34] Bart P. Knijnenburg,et al. Profiling Facebook Users' Privacy Behaviors , 2014 .
[35] Byung-Gon Chun,et al. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.
[36] Bart P. Knijnenburg. Information Disclosure Profiles for Segmentation and Recommendation , 2014 .
[37] David A. Wagner,et al. The effect of developer-specified explanations for permission requests on smartphone user behavior , 2014, CHI.
[38] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[39] Norman M. Sadeh,et al. Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? , 2014, WWW.
[40] Marco Gruteser,et al. A Field Study of Run-Time Location Access Disclosures on Android Smartphones , 2014 .
[41] Irina Shklovski,et al. Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.
[42] Matthew Smith,et al. Using personal examples to improve risk communication for security & privacy decisions , 2014, CHI.
[43] Yang Wang,et al. A field trial of privacy nudges for facebook , 2014, CHI.
[44] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.
[45] Jie Gu,et al. Interaction Effects of Contextual Cues on Privacy Concerns: The Case of Android Applications , 2015, 2015 48th Hawaii International Conference on System Sciences.
[46] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[47] Michael Weber,et al. Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making , 2015, IEEE Pervasive Computing.
[48] Ilaria Liccardi,et al. Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.
[49] Lorrie Faith Cranor,et al. A Design Space for Effective Privacy Notices , 2015, SOUPS.
[50] Subhasish Mazumdar,et al. Introducing Privacy Threats from Ad Libraries to Android Users Through Privacy Granules , 2015 .