메뉴 건너뛰기




Volumn , Issue , 2012, Pages 501-510

Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing

Author keywords

Android permissions; Crowdsourcing; Mental model; Mobile app; Privacy as expectations; Privacy summary

Indexed keywords

ANDROID PERMISSIONS; AUTOMATED TOOLS; CROWDSOURCING; LOCATION INFORMATION; MENTAL MODEL; MOBILE APP; SECURITY RESEARCH;

EID: 84867459428     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2370216.2370290     Document Type: Conference Paper
Times cited : (378)

References (39)
  • 3
    • 84867462675 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera, et al., "A methodology for empirical analysis of permission-based security models and its application to android, " In Proc. CCS, 2010.
    • (2010) Proc. CCS
    • Barrera, D.1
  • 4
    • 33751063543 scopus 로고    scopus 로고
    • Privacy and contextual integrity: Framework and applications
    • A. Barth, et al., "Privacy and Contextual Integrity: Framework and Applications, " In Proc. IEEE Symposium on Security and Privacy, 2006.
    • (2006) Proc. IEEE Symposium on Security and Privacy
    • Barth, A.1
  • 5
    • 80054902317 scopus 로고    scopus 로고
    • Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
    • M. Benisch, et al., "Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs, " Personal and Ubiquitous Computing, 2010.
    • (2010) Personal and Ubiquitous Computing
    • Benisch, M.1
  • 6
    • 84976246004 scopus 로고    scopus 로고
    • MockDroid: Trading privacy for application functionality on smartphones
    • A. Beresford, et al., "MockDroid: trading privacy for application functionality on smartphones, " In Proc. HotMobile, 2011.
    • (2011) Proc. HotMobile
    • Beresford, A.1
  • 7
    • 80755135085 scopus 로고    scopus 로고
    • Soylent: A word processor with a crowd inside
    • M. S. Bernstein, et al., "Soylent: a word processor with a crowd inside, " In Proc. UIST, 2010.
    • (2010) Proc. UIST
    • Bernstein, M.S.1
  • 8
    • 85029424989 scopus 로고    scopus 로고
    • Bridging the gap in computer security warnings: A mental model approach
    • C. Bravo-Lillo, et al., "Bridging the gap in computer security warnings: a mental model approach, " IEEE Security & Privacy Magazine, 2010.
    • (2010) IEEE Security & Privacy Magazine
    • Bravo-Lillo, C.1
  • 9
    • 70350230128 scopus 로고    scopus 로고
    • Mental models of privacy and security
    • IEEE
    • L. J. Camp, "Mental models of privacy and security, " Technology and Society Magazine, IEEE, vol. 28, 2009.
    • (2009) Technology and Society Magazine , vol.28
    • Camp, L.J.1
  • 10
    • 84903569299 scopus 로고    scopus 로고
    • Analyzing inter-application communication in Android
    • E. Chin, et al., "Analyzing inter-application communication in Android, " In Proc. MobiSys, 2011.
    • (2011) Proc. MobiSys
    • Chin, E.1
  • 12
    • 84868243480 scopus 로고    scopus 로고
    • PiOS: Detecting privacy leaks in iOS applications
    • M. Egele, et al., "PiOS: Detecting Privacy Leaks in iOS Applications, " In Proc. NDSS, 2011.
    • (2011) Proc. NDSS
    • Egele, M.1
  • 14
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, et al., "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, " In Proc. OSDI 2010.
    • (2010) Proc. OSDI
    • Enck, W.1
  • 15
    • 85025700509 scopus 로고    scopus 로고
    • A study of android application security
    • W. Enck, et al., "A Study of Android Application Security, " In Proc. USENIX Security Symposium, 2011.
    • (2011) Proc. USENIX Security Symposium
    • Enck, W.1
  • 16
    • 84909640295 scopus 로고    scopus 로고
    • Android permissions demystified
    • A. P. Felt, et al., "Android permissions demystified, " In Proc. CCS, 2011.
    • (2011) Proc. CCS
    • Felt, A.P.1
  • 17
    • 84864866297 scopus 로고    scopus 로고
    • A survey of mobile malware in the wild
    • A. P. Felt, et al., "A survey of mobile malware in the wild, " In Proc. SPSM, 2011.
    • (2011) Proc. SPSM
    • Felt, A.P.1
  • 19
  • 20
    • 33745862646 scopus 로고    scopus 로고
    • Stopping spyware at the gate: A user study of privacy, notice and spyware
    • N. Good, et al., "Stopping spyware at the gate: a user study of privacy, notice and spyware, " In Proc. SOUPS, 2005.
    • (2005) Proc. SOUPS
    • Good, N.1
  • 22
    • 84917725040 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, et al., "These aren't the droids you're looking for: retrofitting android to protect data from imperious applications, " In Proc. CCS, 2011.
    • (2011) Proc. CCS
    • Hornyack, P.1
  • 23
    • 19944381365 scopus 로고    scopus 로고
    • Privacy policies as decision-making tools: An evaluation of online privacy notices
    • C. Jensen and C. Potts, "Privacy policies as decision-making tools: an evaluation of online privacy notices, " In Proc. CHI, 2004.
    • (2004) Proc. CHI
    • Jensen, C.1    Potts, C.2
  • 25
    • 70350731253 scopus 로고    scopus 로고
    • A nutrition label for privacy
    • P. G. Kelley, et al., "A "nutrition label" for privacy, " In Proc. SOUPS, 2009.
    • (2009) Proc. SOUPS
    • Kelley, P.G.1
  • 26
    • 84867438639 scopus 로고    scopus 로고
    • A Conundrum of permissions: Installing applications on an android smartphone
    • P. G. Kelley, et al., "A Conundrum of permissions: Installing Applications on an Android Smartphone, " In Proc. USEC, 2012.
    • (2012) Proc. USEC
    • Kelley, P.G.1
  • 27
    • 84867456895 scopus 로고    scopus 로고
    • Smartening the crowds: Computational techniques for improving human verification to fight phishing scams
    • G. Liu, et al., "Smartening the crowds: computational techniques for improving human verification to fight phishing scams, " In Proc. SOUPS, 2011.
    • (2011) Proc. SOUPS
    • Liu, G.1
  • 28
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, et al., "Apex: extending Android permission model and enforcement with user-defined runtime constraints, " In Proc. ASIACCS, 2010.
    • (2010) Proc. ASIACCS
    • Nauman, M.1
  • 29
    • 1542370340 scopus 로고    scopus 로고
    • The design of everyday things
    • D. Norman, The design of everyday things: Basic Books, 2002.
    • (2002) Basic Books
    • Norman, D.1
  • 30
    • 10844259286 scopus 로고    scopus 로고
    • Unpacking privacy,for a networked world
    • L. Palen and P. Dourish, "Unpacking "privacy" for a networked world, " In Proc. CHI, 2003.
    • (2003) Proc. CHI
    • Palen, L.1    Dourish, P.2
  • 32
    • 67650293214 scopus 로고    scopus 로고
    • Understanding and capturing people's privacy policies in a mobile social networking application
    • N. Sadeh, et al., "Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application, " The Journal of Personal and Ubiquitous Computing, 2009.
    • (2009) The Journal of Personal and Ubiquitous Computing
    • Sadeh, N.1
  • 33
    • 33644925852 scopus 로고    scopus 로고
    • University of Pennsylvania Law Review, January
    • D. J. Solove, "A Taxonomy of Privacy, " University of Pennsylvania Law Review, Vol. 154, No. 3, January 2006.
    • (2006) A Taxonomy of Privacy , vol.154 , Issue.3
    • Solove, D.J.1
  • 36
    • 84864037440 scopus 로고    scopus 로고
    • Curbing android permission creep
    • T. Vidas, et al., "Curbing android permission creep, " Proceedings of the Web, vol. 2, 2011.
    • (2011) Proceedings of the Web , vol.2
    • Vidas, T.1
  • 38
    • 79951633637 scopus 로고    scopus 로고
    • Folk models of home computer security
    • R. Wash, "Folk models of home computer security, " In Proc. SOUPS, 2010.
    • (2010) Proc. SOUPS
    • Wash, R.1
  • 39
    • 84872325256 scopus 로고    scopus 로고
    • Taming information-stealing smartphone applications (on Android)
    • Y. Zhou, et al., "Taming Information-Stealing Smartphone Applications (on Android), " In Proc. TRUST, 2011.
    • (2011) Proc. TRUST
    • Zhou, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.