메뉴 건너뛰기




Volumn , Issue , 2014, Pages 140-150

No technical understanding required: Helping users make informed choices about access to their personal data

Author keywords

Android apps; Personal information; Privacy

Indexed keywords

DATA PRIVACY; SIGNAL ENCODING; SMARTPHONES; UBIQUITOUS COMPUTING;

EID: 84924328396     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.4108/icst.mobiquitous.2014.258066     Document Type: Conference Paper
Times cited : (37)

References (41)
  • 1
    • 84883078013 scopus 로고    scopus 로고
    • Little brothers watching you": Raising awareness of data leaks on smart phones
    • R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen. "little brothers watching you": raising awareness of data leaks on smart phones. In Proc. of ACM SOUPS '13, pages 121-1211, 2013.
    • (2013) Proc. of ACM SOUPS '13 , pp. 121-1211
    • Balebako, R.1    Jung, J.2    Lu, W.3    Cranor, L.F.4    Nguyen, C.5
  • 2
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proc. of ACM CCS '10, pages 73-84, 2010.
    • (2010) Proc. of ACM CCS '10 , pp. 73-84
    • Barrera, D.1    Kayacik, H.G.2    Oorschot, P.C.V.3    Somayaji, A.4
  • 3
    • 84860764042 scopus 로고    scopus 로고
    • Mock droid: Trading privacy for application functionality on smart phones
    • A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mock droid: Trading privacy for application functionality on smart phones. In Proc. of ACM HotMobile '11, pages 49-54, 2011.
    • (2011) Proc. of ACM HotMobile '11 , pp. 49-54
    • Beresford, A.R.1    Rice, A.2    Skehin, N.3    Sohan, R.4
  • 4
  • 5
    • 84864978921 scopus 로고    scopus 로고
    • Measuring user confidence in smart phone security and privacy
    • E. Chin, A. P. Felt, V. Sekar, and D. Wagner. Measuring user confidence in smart phone security and privacy. In Proc. of ACM SOUPS '12, pages 11-116, 2012.
    • (2012) Proc. of ACM SOUPS '12 , pp. 11-116
    • Chin, E.1    Felt, A.P.2    Sekar, V.3    Wagner, D.4
  • 9
    • 79955570859 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for real time privacy monitoring on smart phones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for real time privacy monitoring on smart phones. In Proc. of OSDI'10, pages 1-6, 2010.
    • (2010) Proc. of OSDI'10 , pp. 1-6
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, J.5    Mcdaniel, P.6    Sheth, A.N.7
  • 14
    • 84869821127 scopus 로고    scopus 로고
    • I've got 99 problems, but vibration ain't one: A survey of smart phone users' concerns
    • A. P. Felt, S. Egelman, and D. Wagner. I've got 99 problems, but vibration ain't one: A survey of smart phone users' concerns. In Proc. of ACM SPSM '12, pages 33-44, 2012.
    • (2012) Proc. of ACM SPSM '12 , pp. 33-44
    • Felt, A.P.1    Egelman, S.2    Wagner, D.3
  • 16
    • 84924320155 scopus 로고    scopus 로고
    • Survey: Most cell phone users don't protect mobile privacy
    • September
    • A. Gahran. Survey: Most cell phone users don't protect mobile privacy. CNN Tech, September 2012.
    • (2012) CNN Tech
    • Gahran, A.1
  • 20
    • 84877938356 scopus 로고    scopus 로고
    • Privacy as part of the app decision-making process
    • P. G. Kelley, L. F. Cranor, and N. Sadeh. Privacy as part of the app decision-making process. In Proc. of ACM CHI'13, pages 3393-3402, 2013.
    • (2013) Proc. of ACM CHI'13 , pp. 3393-3402
    • Kelley, P.G.1    Cranor, L.F.2    Sadeh, N.3
  • 21
    • 78650709933 scopus 로고    scopus 로고
    • On the leakage of personally identifiable information via online social networks
    • January
    • B. Krishnamurthy and C. E. Wills. On the leakage of personally identifiable information via online social networks. SIGCOMM Comput. Commun. Rev., 40(1):112-117, January 2010.
    • (2010) SIGCOMM Comput. Commun. Rev. , vol.40 , Issue.1 , pp. 112-117
    • Krishnamurthy, B.1    Wills, C.E.2
  • 23
    • 84910073128 scopus 로고    scopus 로고
    • Improving mobile app selection through transparency and better permission analysis
    • I. Liccardi, J. Pato, and D. J. Weitzner. Improving Mobile App selection through Transparency and Better Permission Analysis. Journal of Privacy and Confidentiality: Vol. 5: Iss. 2, Article 1., pages 1-55, 2014.
    • (2014) Journal of Privacy and Confidentiality , vol.5 , Issue.2 , pp. 1-55
    • Liccardi, I.1    Pato, J.2    Weitzner, D.J.3
  • 24
    • 84867459428 scopus 로고    scopus 로고
    • Expectation and purpose: Understanding users' mental models of mobile app privacy through crowd sourcing
    • J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowd sourcing. In Proc. of ACM UBICOMP '12, pages 501-510, 2012.
    • (2012) Proc. of ACM UBICOMP '12 , pp. 501-510
    • Lin, J.1    Amini, S.2    Hong, J.I.3    Sadeh, N.4    Lindqvist, J.5    Zhang, J.6
  • 25
    • 84952636117 scopus 로고    scopus 로고
    • How free apps can make more money than paid apps
    • August
    • J. Manoogian. How free apps can make more money than paid apps. Tech Crunch, August 2012.
    • (2012) Tech Crunch
    • Manoogian, J.1
  • 26
    • 84877916057 scopus 로고    scopus 로고
    • Beliefs and behaviors: Internet users' understanding of behavioral advertising
    • A. McDonald and L. F. Cranor. Beliefs and behaviors: Internet users' understanding of behavioral advertising. In TPRC, pages 1-31. 2010.
    • (2010) TPRC , pp. 1-31
    • McDonald, A.1    Cranor, L.F.2
  • 31
    • 80055040446 scopus 로고    scopus 로고
    • Composite social network for predicting mobile apps installation
    • W. Pan, N. Aharony, and A. S. Pentland. Composite social network for predicting mobile apps installation. In Proc. of ACM AAAI '11, pages 821-827, 2011.
    • (2011) Proc. of ACM AAAI '11 , pp. 821-827
    • Pan, W.1    Aharony, N.2    Pentland, A.S.3
  • 32
    • 51749117552 scopus 로고    scopus 로고
    • Effective advertising on mobile phones: A literature review and presentation of results from 53 case studies
    • T. Parka, R. Shenoya, and G. Salvendya. Effective advertising on mobile phones: A literature review and presentation of results from 53 case studies. Journal of Behaviour Information Technology, 27(5):355-373, 2008.
    • (2008) Journal of Behaviour Information Technology , vol.27 , Issue.5 , pp. 355-373
    • Parka, T.1    Shenoya, R.2    Salvendya, G.3
  • 33
    • 84871959049 scopus 로고    scopus 로고
    • Addroid: Privilege separation for applications and advertisers in android
    • P. Pearce, A. P. Felt, G. Nunez, and D. Wagner. Addroid: privilege separation for applications and advertisers in android. In Proc. of ACM ASIACCS '12, pages 71-82, 2012.
    • (2012) Proc. of ACM ASIACCS '12 , pp. 71-82
    • Pearce, P.1    Felt, A.P.2    Nunez, G.3    Wagner, D.4
  • 34
    • 84909313878 scopus 로고    scopus 로고
    • Mobile apps take data without permission
    • February
    • N. Perlroth and N. Bilton. Mobile apps take data without permission. New York Times, February 2012.
    • (2012) New York Times
    • Perlroth, N.1    Bilton, N.2
  • 36
    • 77954021717 scopus 로고    scopus 로고
    • Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection
    • K. Shilton. Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection. Communications of the ACM, 52(11):48-53, 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.11 , pp. 48-53
    • Shilton, K.1
  • 39
    • 84877733931 scopus 로고    scopus 로고
    • Measuring serendipity: Connecting people, locations and interests in a mobile 3g network
    • I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci. Measuring serendipity: connecting people, locations and interests in a mobile 3g network. In Proc. of ACM IMC '09, pages 267-279, 2009.
    • (2009) Proc. of ACM IMC '09 , pp. 267-279
    • Trestian, I.1    Ranjan, S.2    Kuzmanovic, A.3    Nucci, A.4
  • 40
    • 77749333391 scopus 로고    scopus 로고
    • The role of push-pull technology in privacy calculus: The case of location-based services
    • H. Xu, H.-H. Teo, B. C. Y. Tan, and R. Agarwal. The role of push-pull technology in privacy calculus: The case of location-based services. Journal of Management Information Systems, 26(3):135-174, 2009.
    • (2009) Journal of Management Information Systems , vol.26 , Issue.3 , pp. 135-174
    • Xu, H.1    Teo, H.-H.2    Tan, B.C.Y.3    Agarwal, R.4
  • 41
    • 84888985669 scopus 로고    scopus 로고
    • No surprises: Measuring intrusiveness of smart phone applications by detecting objective context deviations
    • F. Zhang, F. Shih, and D. Weitzner. No surprises: Measuring intrusiveness of smart phone applications by detecting objective context deviations. In Workshop on Privacy in the Electronic Society (ACM CCS' 13), pages 1-6, 2013.
    • (2013) Workshop on Privacy in the Electronic Society (ACM CCS' 13) , pp. 1-6
    • Zhang, F.1    Shih, F.2    Weitzner, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.