-
2
-
-
84861302816
-
Is this app safe?: A large scale study on application permissions and risk signals
-
Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe?: A large scale study on application permissions and risk signals. In: Proceedings of the 21st International Conference on World Wide Web, WWW 2012 (2012)
-
(2012)
Proceedings of the 21st International Conference on World Wide Web, WWW 2012
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
3
-
-
84864978921
-
Measuring user confidence in smartphone security and privacy
-
Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: SOUPS (2012)
-
(2012)
SOUPS
-
-
Chin, E.1
Felt, A.P.2
Sekar, V.3
Wagner, D.4
-
5
-
-
84888331381
-
PiOS: Detecting Privacy Leaks in iOS Apllications
-
Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: Detecting Privacy Leaks in iOS Apllications. In: NDSS (2011)
-
(2011)
NDSS
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Vigna, G.4
-
7
-
-
84864866297
-
A survey of mobile malware in the wild
-
Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: SPSM (2011)
-
(2011)
SPSM
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
8
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User attention, comprehension, and behavior. In: SOUPS (2012)
-
(2012)
SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
9
-
-
84906743369
-
-
February 28
-
Google: Protect against harmful apps (February 28, 2014), https://support.google.com/accounts/answer/2812853?hl=en
-
(2014)
Protect Against Harmful Apps
-
-
-
10
-
-
85180417656
-
Comparing Mobile Privacy Protection through Cross-Platform Applications
-
Han, J., Yan, Q., Gao, D., Zhou, J., Deng, R.H.: Comparing Mobile Privacy Protection through Cross-Platform Applications. In: Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2013)
-
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA (February 2013)
-
-
Han, J.1
Yan, Q.2
Gao, D.3
Zhou, J.4
Deng, R.H.5
-
11
-
-
84906743361
-
Privacy as part of the app decision-making process
-
Kelley, P.G., Sadeh, L.F.C.N.: Privacy as part of the app decision-making process. In: ACM (2013)
-
(2013)
ACM
-
-
Kelley, P.G.1
Sadeh, L.F.C.N.2
-
15
-
-
84860289389
-
Don't kill my ads!: Balancing privacy in an ad-supported mobile application market
-
Leontiadis, I., Efstratiou, C., Picone, M., Mascolo, C.: Don't kill my ads!: Balancing privacy in an ad-supported mobile application market. In: HotMobile (2012)
-
(2012)
HotMobile
-
-
Leontiadis, I.1
Efstratiou, C.2
Picone, M.3
Mascolo, C.4
-
16
-
-
84867459428
-
Expectation and purpose: Understanding users' mental models of mobile app privacy through crowd-sourcing
-
Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J.I., Zhang, J.: Expectation and purpose: Understanding users' mental models of mobile app privacy through crowd-sourcing. In: ACM UbiComp (2012), http://doi.acm.org/10. 1145/2370216.2370290
-
(2012)
ACM UbiComp
-
-
Lin, J.1
Sadeh, N.2
Amini, S.3
Lindqvist, J.4
Hong, J.I.5
Zhang, J.6
-
18
-
-
13244298307
-
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
-
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15(4), 336-355 (2004)
-
(2004)
Information Systems Research
, vol.15
, Issue.4
, pp. 336-355
-
-
Malhotra, N.K.1
Kim, S.S.2
Agarwal, J.3
-
20
-
-
84884475887
-
A qualitative metrics vector for the awareness of smartphone security users
-
Furnell, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2013 Springer, Heidelberg
-
Mylonas, A., Gritzalis, D., Tsoumas, B., Apostolopoulos, T.: A qualitative metrics vector for the awareness of smartphone security users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2013. LNCS, vol. 8058, pp. 173-184. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8058
, pp. 173-184
-
-
Mylonas, A.1
Gritzalis, D.2
Tsoumas, B.3
Apostolopoulos, T.4
-
21
-
-
84891843335
-
Delegate the smartphone user?
-
Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security Awareness in Smartphone Platforms 34, 47-66 (2013)
-
(2013)
Security Awareness in Smartphone Platforms
, vol.34
, pp. 47-66
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
23
-
-
84886388573
-
Privacy awareness: A means to solve the privacy paradox?
-
Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity Springer, Heidelberg
-
Pötzsch, S.: Privacy awareness: A means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226-236. Springer, Heidelberg (2009)
-
(2009)
IFIP AICT
, vol.298
, pp. 226-236
-
-
Pötzsch, S.1
-
26
-
-
84883725547
-
-
Sofos: Security threat report (2013), http://www.sophos.com/en-us/ security-news-trends/reports/security-threat-report
-
(2013)
Security Threat Report
-
-
-
29
-
-
84906743353
-
Jekyll on iOS: When benign apps become evil
-
Presented as Part of the
-
Wang, T., Lu, K., Lu, L., Chung, S., Lee, W.: Jekyll on iOS: when benign apps become evil. Presented as Part of the 22nd USENIX Security Symposium, Washington D.C, USA (August 2013)
-
22nd USENIX Security Symposium, Washington D.C, USA (August 2013)
-
-
Wang, T.1
Lu, K.2
Lu, L.3
Chung, S.4
Lee, W.5
|