-
1
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
ACM Press
-
Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In Proc. PETS 2006, ACM Press (2006), 36-58.
-
(2006)
Proc. PETS 2006
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
2
-
-
67650500737
-
Predicting social security numbers from public data
-
Acquisti, A. and Gross, R., Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences 106, 27 (2009), 10975- 10980.
-
(2009)
Proceedings of the National Academy of Sciences
, vol.106
, Issue.27
, pp. 10975-10980
-
-
Acquisti, A.1
Gross, R.2
-
3
-
-
79957585144
-
Inglorious installers: Security in the application marketplace
-
Anderson, J., Bonneau, J., and Stajano, F. Inglorious Installers: Security in the Application Marketplace. In Proc. WEIS 2010 (2010).
-
(2010)
Proc. WEIS 2010
-
-
Anderson, J.1
Bonneau, J.2
Stajano, F.3
-
4
-
-
77955645501
-
Users' (Mis)conceptions of social applications
-
ACM Press
-
Besmer, A. and Lipford, H. Users' (Mis)conceptions of Social Applications. In Proc. GI 2010, ACM Press (2010), 63-70.
-
(2010)
Proc. GI 2010
, pp. 63-70
-
-
Besmer, A.1
Lipford, H.2
-
5
-
-
84855681364
-
The security cost of cheap user interaction
-
ACM Press
-
Böhme, R. and Grossklags, J. The Security Cost of Cheap User Interaction. In Proc. NSPW 2011, ACM Press (2011), 67-82.
-
(2011)
Proc. NSPW 2011
, pp. 67-82
-
-
Böhme, R.1
Grossklags, J.2
-
6
-
-
79953645142
-
Bridging the gap in computer security warnings: A mental model approach
-
Bravo-Lillo, C., Cranor, L., Downs, J., and Komanduri, S., Bridging the Gap in Computer Security Warnings: A Mental Model Approach. IEEE Security & Privacy 9, 2 (2011), 18-26.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 18-26
-
-
Bravo-Lillo, C.1
Cranor, L.2
Downs, J.3
Komanduri, S.4
-
7
-
-
79951954228
-
Adverse selection in online trust certifications and search results
-
Edelman, B., Adverse Selection in Online "Trust" Certifications and Search Results. Electronic Commerce Research and Applications 10, 1 (2011), 17-25.
-
(2011)
Electronic Commerce Research and Applications
, vol.10
, Issue.1
, pp. 17-25
-
-
Edelman, B.1
-
10
-
-
80755181021
-
A survey of mobile malware in the wild
-
ACM Press
-
Felt, A., Finifter, M., Chin, E., Hanna, S., and Wagner, D. A Survey of Mobile Malware in the Wild. In Proc. SPSM 2011, ACM Press (2011), 3-14.
-
(2011)
Proc. SPSM 2011
, pp. 3-14
-
-
Felt, A.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
11
-
-
80755172898
-
The effectiveness of application permissions
-
Felt, A., Greenwood, K., and Wagner, D. The Effectiveness of Application Permissions. In Proc. WebApps 2011 (2011), 75-86.
-
(2011)
Proc. WebApps 2011
, pp. 75-86
-
-
Felt, A.1
Greenwood, K.2
Wagner, D.3
-
12
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
ACM Press
-
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android Permissions: User Attention, Comprehension, and Behavior. In Proc. SOUPS, ACM Press (2012).
-
(2012)
Proc. SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
13
-
-
77953767524
-
Stopping spyware at the gate: A user study of privacy, notice and spyware
-
ACM Press
-
Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J. Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware. In Proc. SOUPS 2005, ACM Press (2005), 43-52.
-
(2005)
Proc. SOUPS 2005
, pp. 43-52
-
-
Good, N.1
Dhamija, R.2
Grossklags, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
14
-
-
35348905154
-
Noticing notice: A large-scale experiment on the timing of software license agreements
-
ACM Press
-
Good, N.S., Grossklags, J., Mulligan, D.K., and Konstan, J.A. Noticing Notice: A Large-Scale Experiment on the Timing of Software License Agreements. In Proc. CHI 2007, ACM Press (2007), 607-616.
-
(2007)
Proc. CHI 2007
, pp. 607-616
-
-
Good, N.S.1
Grossklags, J.2
Mulligan, D.K.3
Konstan, J.A.4
-
15
-
-
38549085605
-
Empirical studies on software notices to inform policy makers and usability designers
-
Springer Press
-
Grossklags, J. and Good, N. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. In Proc. FC 2007 and USEC 2007, Springer Press (2007), 341-355.
-
(2007)
Proc. FC 2007 and USEC 2007
, pp. 341-355
-
-
Grossklags, J.1
Good, N.2
-
16
-
-
73749088345
-
Privacy as information access and illusory control: The case of the facebook news feed privacy outcry
-
Hoadley, C.M., Xu, H., Lee, J.J., and Rosson, M.B., Privacy as Information Access and Illusory Control: The Case of the Facebook News Feed Privacy Outcry. Electronic Commerce Research and Applications 9, 1 (2010), 50-60.
-
(2010)
Electronic Commerce Research and Applications
, vol.9
, Issue.1
, pp. 50-60
-
-
Hoadley, C.M.1
Xu, H.2
Lee, J.J.3
Rosson, M.B.4
-
17
-
-
84874829926
-
What you see is what they get: Protecting users from unwanted use of microphones, camera, and other sensors
-
Howell, J. and Schechter, S. What You See is What They Get: Protecting Users from Unwanted Use of Microphones, Camera, and Other Sensors. In Proc. Web 2.0 Security and Privacy (2010).
-
(2010)
Proc. Web 2.0 Security and Privacy
-
-
Howell, J.1
Schechter, S.2
-
18
-
-
80355139531
-
Contextual gaps: Privacy issues on Facebook
-
Hull, G., Lipford, H., and Latulipe, C., Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology 13, 4 (2010), 289-302.
-
(2010)
Ethics and Information Technology
, vol.13
, Issue.4
, pp. 289-302
-
-
Hull, G.1
Lipford, H.2
Latulipe, C.3
-
19
-
-
70350731253
-
A nutrition label for privacy
-
ACM Press
-
Kelley, P., Bresee, J., Cranor, L., and Reeder, R. A Nutrition Label for Privacy. In Proc. SOUPS 2009, ACM Press (2009).
-
(2009)
Proc. SOUPS 2009
-
-
Kelley, P.1
Bresee, J.2
Cranor, L.3
Reeder, R.4
-
21
-
-
84995488432
-
On the leakage of personally identifiable information via online social networks
-
ACM Press
-
Krishnamurthy, B. and Wills, C. On the Leakage of Personally Identifiable Information Via Online Social Networks. In Proc. WOSN 2009, ACM Press (2009), 7-12.
-
(2009)
Proc. WOSN 2009
, pp. 7-12
-
-
Krishnamurthy, B.1
Wills, C.2
-
22
-
-
19944367736
-
Personal privacy through understanding and action: Five pitfalls for designers
-
Lederer, S., Hong, I., Dey, K., and Landay, A., Personal Privacy Through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8, 6 (2004), 440-454.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, I.2
Dey, K.3
Landay, A.4
-
24
-
-
21844523056
-
Setting standards for fair information practice in the US private sector
-
Reidenberg, J.R., Setting Standards for Fair Information Practice in the US Private Sector. Iowa L. Rev. 80, (1994), 497.
-
(1994)
Iowa L. Rev.
, vol.80
, pp. 497
-
-
Reidenberg, J.R.1
-
26
-
-
81355150537
-
Information privacy research: An interdisciplinary review
-
Smith, H.J., Dinev, T., and Xu, H., Information Privacy Research: An Interdisciplinary Review. MIS Quarterly 35, 4 (2011), 989-1015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
27
-
-
60449120378
-
Engineering privacy
-
Spiekermann, S. and Cranor, L.F., Engineering Privacy. IEEE Transactions on Software Engineering 35, 1 (2009), 67-82.
-
(2009)
IEEE Transactions on Software Engineering
, vol.35
, Issue.1
, pp. 67-82
-
-
Spiekermann, S.1
Cranor, L.F.2
-
29
-
-
84861309877
-
-
Tam, J., Reeder, R.W., and Schechter, S., I'm Allowing What? Disclosing the Authority Applications Demand of Users as a Condition of Installation, 2010.
-
(2010)
I'm Allowing What? Disclosing the Authority Applications Demand of Users as a Condition of Installation
-
-
Tam, J.1
Reeder, R.W.2
Schechter, S.3
-
30
-
-
84862681245
-
Third-party applications data practices on facebook
-
ACM Press
-
Wang, N. Third-Party Applications' Data Practices on Facebook. In Proc. CHI 2012, ACM Press (2012), 1399-1404.
-
(2012)
Proc. CHI 2012
, pp. 1399-1404
-
-
Wang, N.1
-
31
-
-
84555191713
-
Third-party apps on facebook: privacy and the illusion of control
-
ACM Press
-
Wang, N., Xu, H., and Grossklags, J. Third-Party Apps on Facebook: Privacy and the Illusion of Control. In Proc. CHIMIT 2011, ACM Press (2011).
-
(2011)
Proc. CHIMIT 2011
-
-
Wang, N.1
Xu, H.2
Grossklags, J.3
-
32
-
-
84871593116
-
Effects of individual self-protection, industry self- regulation, and government regulation on privacy concerns: A Study of location-based services
-
doi: 10.1287/isre.1120.0416
-
Xu, H., Teo, H.H., Tan, B.C.Y., and Agarwal, R., Effects of Individual Self-Protection, Industry Self- Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research (2012), doi: 10.1287/isre.1120.0416.
-
(2012)
Information Systems Research
-
-
Xu, H.1
Teo, H.H.2
Tan, B.C.Y.3
Agarwal, R.4
|