메뉴 건너뛰기




Volumn , Issue , 2013, Pages 291-296

Studying the effectiveness of android application permissions requests

Author keywords

[No Author keywords available]

Indexed keywords

AMAZON'S MECHANICAL TURKS; ANDROID APPLICATIONS; ANDROID PLATFORMS; MODEL APPLICATION; POPULAR PLATFORM; USER INFORMATION; USER STUDY; VISUAL INDICATORS;

EID: 84881496404     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PerComW.2013.6529497     Document Type: Conference Paper
Times cited : (35)

References (31)
  • 2
    • 77953995033 scopus 로고    scopus 로고
    • Trained to accept?: A field experiment on consent dialogs
    • R. Böhme and S. Köpsell. Trained to accept?: A field experiment on consent dialogs. In CHI, pages 2403-2406, 2010.
    • (2010) CHI , pp. 2403-2406
    • Böhme, R.1    Köpsell, S.2
  • 3
    • 40249106199 scopus 로고    scopus 로고
    • Privacy-invasive software and preventive mechanisms
    • M. Boldt and B. Carlsson. Privacy-invasive software and preventive mechanisms. In PROC of ICSNC, 2006.
    • (2006) PROC of ICSNC
    • Boldt, M.1    Carlsson, B.2
  • 4
    • 79955854747 scopus 로고    scopus 로고
    • The privacy jungle: On the market for data protection in social networks
    • J. Bonneau and S. Preibusch. The privacy jungle: On the market for data protection in social networks. In WEIS, 2009.
    • (2009) WEIS
    • Bonneau, J.1    Preibusch, S.2
  • 5
    • 84964572278 scopus 로고    scopus 로고
    • It's all about the benjamins: An empirical study on incentivizing users to ignore security advice
    • N. Christin, S. Egelman, T. Vidas, and J. Grossklags. It's all about the benjamins: An empirical study on incentivizing users to ignore security advice. In Financial Crypto, 2011.
    • (2011) Financial Crypto
    • Christin, N.1    Egelman, S.2    Vidas, T.3    Grossklags, J.4
  • 11
    • 79961080173 scopus 로고    scopus 로고
    • Vision: Automated security validation of mobile apps at app markets
    • P. Gilbert, B.-G. Chun, L. P. Cox, and J. Jung. Vision: automated security validation of mobile apps at app markets. In PROC of MCS, pages 21-26, 2011.
    • (2011) PROC of MCS , pp. 21-26
    • Gilbert, P.1    Chun, B.-G.2    Cox, L.P.3    Jung, J.4
  • 12
    • 70350714539 scopus 로고    scopus 로고
    • Challenges in supporting end-user privacy and security management with social navigation
    • J. Goecks, W. K. Edwards, and E. D. Mynatt. Challenges in supporting end-user privacy and security management with social navigation. In PROC of SOUPS, pages 5:1-5:12, 2009.
    • (2009) PROC of SOUPS , pp. 51-512
    • Goecks, J.1    Edwards, W.K.2    Mynatt, E.D.3
  • 14
    • 35348905154 scopus 로고    scopus 로고
    • Noticing notice: A large-scale experiment on the timing of software license agreements
    • N. S. Good, J. Grossklags, D. K. Mulligan, and J. A. Konstan. Noticing notice: a large-scale experiment on the timing of software license agreements. In PROC of CHI, CHI '07, pages 607-616, 2007.
    • (2007) PROC of CHI, CHI '07 , pp. 607-616
    • Good, N.S.1    Grossklags, J.2    Mulligan, D.K.3    Konstan, J.A.4
  • 15
    • 38549085605 scopus 로고    scopus 로고
    • Empirical studies on software notices to inform policy makers and usability designers
    • J. Grossklags and N. Good. Empirical studies on software notices to inform policy makers and usability designers. In PROC of Financial cryptography and Usable Security, pages 341-355, 2007.
    • (2007) PROC of Financial Cryptography and Usable Security , pp. 341-355
    • Grossklags, J.1    Good, N.2
  • 16
    • 84993048403 scopus 로고    scopus 로고
    • The platform for privacy preference as a social protocol: An examination within the U.S. Policy context
    • H. Hochheiser. The platform for privacy preference as a social protocol: An examination within the u.s. policy context. ACM Trans. Internet Technol., 2(4):276-306, 2002.
    • (2002) ACM Trans. Internet Technol. , vol.2 , Issue.4 , pp. 276-306
    • Hochheiser, H.1
  • 17
    • 80755187778 scopus 로고    scopus 로고
    • These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
    • P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Computer and Communications Security, pages 639-652, 2011.
    • (2011) Computer and Communications Security , pp. 639-652
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 18
    • 4544286640 scopus 로고    scopus 로고
    • Privacy policies as decision-making tools: An evaluation of online privacy notices
    • C. Jensen and C. Potts. Privacy policies as decision-making tools: an evaluation of online privacy notices. In PROC of CHI, pages 471-478, 2004.
    • (2004) PROC of CHI , pp. 471-478
    • Jensen, C.1    Potts, C.2
  • 19
    • 84878002243 scopus 로고    scopus 로고
    • Textured agreements: Re-envisioning electronic consent
    • M. Kay and M. Terry. Textured agreements: re-envisioning electronic consent. In PROC of SOUPS, pages 13:1-13:13, 2010.
    • (2010) PROC of SOUPS , pp. 131-1313
    • Kay, M.1    Terry, M.2
  • 21
    • 77953972803 scopus 로고    scopus 로고
    • Standardizing privacy notices: An online study of the nutrition label approach
    • P. G. Kelley, L. Cesca, J. Bresee, and L. F. Cranor. Standardizing privacy notices: an online study of the nutrition label approach. In PROC of CHI, pages 1573-1582, 2010.
    • (2010) PROC of CHI , pp. 1573-1582
    • Kelley, P.G.1    Cesca, L.2    Bresee, J.3    Cranor, L.F.4
  • 24
    • 77954487766 scopus 로고    scopus 로고
    • Apex: Extending android permission model and enforcement with user-defined runtime constraints
    • M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Asia Computer and Communications Security, pages 328-332, 2010.
    • (2010) Asia Computer and Communications Security , pp. 328-332
    • Nauman, M.1    Khan, S.2    Zhang, X.3
  • 25
    • 84855704068 scopus 로고    scopus 로고
    • Eyeing your exposure: Quantifying and controlling information sharing for improved privacy
    • R. Schlegel, A. Kapadia, and A. J. Lee. Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In SOUPS, 2011.
    • (2011) SOUPS
    • Schlegel, R.1    Kapadia, A.2    Lee, A.J.3
  • 26
    • 51349095336 scopus 로고    scopus 로고
    • A united states perspective on the ethical and legal issues of spyware
    • J. C. Sipior, B. T. Ward, and G. R. Roselli. A united states perspective on the ethical and legal issues of spyware. In PROC of ICEC, ICEC '05, pages 738-743, 2005.
    • (2005) PROC of ICEC, ICEC '05 , pp. 738-743
    • Sipior, J.C.1    Ward, B.T.2    Roselli, G.R.3
  • 29
    • 77954490140 scopus 로고    scopus 로고
    • Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
    • T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. In PROC of ICEC, pages 403-407, 2003.
    • (2003) PROC of ICEC , pp. 403-407
    • Vila, T.1    Greenstadt, R.2    Molnar, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.