메뉴 건너뛰기




Volumn , Issue , 2013, Pages 261-272

An online experiment of privacy authorization dialogues for social applications

Author keywords

Information privacy; Online social networks (OSNs); Privacy awareness and control; Privacy notice and consent; Third party applications (apps)

Indexed keywords

INFORMATION PRIVACY; NOTICE AND CONSENTS; ONLINE SOCIAL NETWORKS (OSNS); PRIVACY AWARENESS; THIRD PARTY APPLICATION (APPS);

EID: 84874924586     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2441776.2441807     Document Type: Conference Paper
Times cited : (46)

References (32)
  • 1
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the facebook
    • ACM Press
    • Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In Proc. PETS 2006, ACM Press (2006), 36-58.
    • (2006) Proc. PETS 2006 , pp. 36-58
    • Acquisti, A.1    Gross, R.2
  • 3
    • 79957585144 scopus 로고    scopus 로고
    • Inglorious installers: Security in the application marketplace
    • Anderson, J., Bonneau, J., and Stajano, F. Inglorious Installers: Security in the Application Marketplace. In Proc. WEIS 2010 (2010).
    • (2010) Proc. WEIS 2010
    • Anderson, J.1    Bonneau, J.2    Stajano, F.3
  • 4
    • 77955645501 scopus 로고    scopus 로고
    • Users' (Mis)conceptions of social applications
    • ACM Press
    • Besmer, A. and Lipford, H. Users' (Mis)conceptions of Social Applications. In Proc. GI 2010, ACM Press (2010), 63-70.
    • (2010) Proc. GI 2010 , pp. 63-70
    • Besmer, A.1    Lipford, H.2
  • 5
    • 84855681364 scopus 로고    scopus 로고
    • The security cost of cheap user interaction
    • ACM Press
    • Böhme, R. and Grossklags, J. The Security Cost of Cheap User Interaction. In Proc. NSPW 2011, ACM Press (2011), 67-82.
    • (2011) Proc. NSPW 2011 , pp. 67-82
    • Böhme, R.1    Grossklags, J.2
  • 6
    • 79953645142 scopus 로고    scopus 로고
    • Bridging the gap in computer security warnings: A mental model approach
    • Bravo-Lillo, C., Cranor, L., Downs, J., and Komanduri, S., Bridging the Gap in Computer Security Warnings: A Mental Model Approach. IEEE Security & Privacy 9, 2 (2011), 18-26.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.2 , pp. 18-26
    • Bravo-Lillo, C.1    Cranor, L.2    Downs, J.3    Komanduri, S.4
  • 7
    • 79951954228 scopus 로고    scopus 로고
    • Adverse selection in online trust certifications and search results
    • Edelman, B., Adverse Selection in Online "Trust" Certifications and Search Results. Electronic Commerce Research and Applications 10, 1 (2011), 17-25.
    • (2011) Electronic Commerce Research and Applications , vol.10 , Issue.1 , pp. 17-25
    • Edelman, B.1
  • 11
    • 80755172898 scopus 로고    scopus 로고
    • The effectiveness of application permissions
    • Felt, A., Greenwood, K., and Wagner, D. The Effectiveness of Application Permissions. In Proc. WebApps 2011 (2011), 75-86.
    • (2011) Proc. WebApps 2011 , pp. 75-86
    • Felt, A.1    Greenwood, K.2    Wagner, D.3
  • 12
    • 84865024594 scopus 로고    scopus 로고
    • Android permissions: User attention, comprehension, and behavior
    • ACM Press
    • Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android Permissions: User Attention, Comprehension, and Behavior. In Proc. SOUPS, ACM Press (2012).
    • (2012) Proc. SOUPS
    • Felt, A.P.1    Ha, E.2    Egelman, S.3    Haney, A.4    Chin, E.5    Wagner, D.6
  • 14
    • 35348905154 scopus 로고    scopus 로고
    • Noticing notice: A large-scale experiment on the timing of software license agreements
    • ACM Press
    • Good, N.S., Grossklags, J., Mulligan, D.K., and Konstan, J.A. Noticing Notice: A Large-Scale Experiment on the Timing of Software License Agreements. In Proc. CHI 2007, ACM Press (2007), 607-616.
    • (2007) Proc. CHI 2007 , pp. 607-616
    • Good, N.S.1    Grossklags, J.2    Mulligan, D.K.3    Konstan, J.A.4
  • 15
    • 38549085605 scopus 로고    scopus 로고
    • Empirical studies on software notices to inform policy makers and usability designers
    • Springer Press
    • Grossklags, J. and Good, N. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. In Proc. FC 2007 and USEC 2007, Springer Press (2007), 341-355.
    • (2007) Proc. FC 2007 and USEC 2007 , pp. 341-355
    • Grossklags, J.1    Good, N.2
  • 16
    • 73749088345 scopus 로고    scopus 로고
    • Privacy as information access and illusory control: The case of the facebook news feed privacy outcry
    • Hoadley, C.M., Xu, H., Lee, J.J., and Rosson, M.B., Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry. Electronic Commerce Research and Applications 9, 1 (2010), 50-60.
    • (2010) Electronic Commerce Research and Applications , vol.9 , Issue.1 , pp. 50-60
    • Hoadley, C.M.1    Xu, H.2    Lee, J.J.3    Rosson, M.B.4
  • 17
    • 84874829926 scopus 로고    scopus 로고
    • What you see is what they get: Protecting users from unwanted use of microphones, camera, and other sensors
    • Howell, J. and Schechter, S. What You See is What They Get: Protecting Users from Unwanted Use of Microphones, Camera, and Other Sensors. In Proc. Web 2.0 Security and Privacy (2010).
    • (2010) Proc. Web 2.0 Security and Privacy
    • Howell, J.1    Schechter, S.2
  • 21
    • 84995488432 scopus 로고    scopus 로고
    • On the leakage of personally identifiable information via online social networks
    • ACM Press
    • Krishnamurthy, B. and Wills, C. On the Leakage of Personally Identifiable Information Via Online Social Networks. In Proc. WOSN 2009, ACM Press (2009), 7-12.
    • (2009) Proc. WOSN 2009 , pp. 7-12
    • Krishnamurthy, B.1    Wills, C.2
  • 22
    • 19944367736 scopus 로고    scopus 로고
    • Personal privacy through understanding and action: Five pitfalls for designers
    • Lederer, S., Hong, I., Dey, K., and Landay, A., Personal Privacy Through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8, 6 (2004), 440-454.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.6 , pp. 440-454
    • Lederer, S.1    Hong, I.2    Dey, K.3    Landay, A.4
  • 24
    • 21844523056 scopus 로고
    • Setting standards for fair information practice in the US private sector
    • Reidenberg, J.R., Setting Standards for Fair Information Practice in the US Private Sector. Iowa L. Rev. 80, (1994), 497.
    • (1994) Iowa L. Rev. , vol.80 , pp. 497
    • Reidenberg, J.R.1
  • 26
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research: An interdisciplinary review
    • Smith, H.J., Dinev, T., and Xu, H., Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, 4 (2011), 989-1015.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1015
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 30
    • 84862681245 scopus 로고    scopus 로고
    • Third-party applications data practices on facebook
    • ACM Press
    • Wang, N. Third-Party Applications' Data Practices on Facebook. In Proc. CHI 2012, ACM Press (2012), 1399-1404.
    • (2012) Proc. CHI 2012 , pp. 1399-1404
    • Wang, N.1
  • 31
    • 84555191713 scopus 로고    scopus 로고
    • Third-party apps on facebook: privacy and the illusion of control
    • ACM Press
    • Wang, N., Xu, H., and Grossklags, J. Third-Party Apps on Facebook: Privacy and the Illusion of Control. In Proc. CHIMIT 2011, ACM Press (2011).
    • (2011) Proc. CHIMIT 2011
    • Wang, N.1    Xu, H.2    Grossklags, J.3
  • 32
    • 84871593116 scopus 로고    scopus 로고
    • Effects of individual self-protection, industry self- regulation, and government regulation on privacy concerns: A Study of location-based services
    • doi: 10.1287/isre.1120.0416
    • Xu, H., Teo, H.H., Tan, B.C.Y., and Agarwal, R., Effects of Individual Self-Protection, Industry Self- Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research (2012), doi: 10.1287/isre.1120.0416.
    • (2012) Information Systems Research
    • Xu, H.1    Teo, H.H.2    Tan, B.C.Y.3    Agarwal, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.