-
2
-
-
75149142201
-
Nudging privacy: The behavioral economics of personal information
-
Acquisti, A. Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy 7, 6 (2009), 82-85.
-
(2009)
IEEE Security & Privacy 7
, vol.6
, pp. 82-85
-
-
Acquisti, A.1
-
3
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Acquisti, A., and Grossklags, J. Privacy and rationality in individual decision making. IEEE Security & Privacy 3, 1 (2005), 26-33.
-
(2005)
IEEE Security & Privacy 3
, vol.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
4
-
-
84883067343
-
Sleights of privacy: Framing, disclosures, and the limits of transparency
-
Adjerid, I., Acquisti, A., Brandimarte, L., and Loewenstein, G. Sleights of privacy: Framing, disclosures, and the limits of transparency. In Proc. SOUPS (2013).
-
(2013)
Proc. SOUPS
-
-
Adjerid, I.1
Acquisti, A.2
Brandimarte, L.3
Loewenstein, G.4
-
5
-
-
84904428265
-
Protect my privacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing
-
Agarwal, Y., and Hall, M. ProtectMyPrivacy: Detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proc. MobiSys (2013).
-
(2013)
Proc. MobiSys
-
-
Agarwal, Y.1
Hall, M.2
-
6
-
-
84883078013
-
Little brothers watching you: Raising awareness of data leaks on smartphones
-
Balebako, R., Jung, J., Lu, W., Cranor, L. F., and Nguyen, C. Little brothers watching you: Raising awareness of data leaks on smartphones. In Proc. SOUPS (2013).
-
(2013)
Proc. SOUPS
-
-
Balebako, R.1
Jung, J.2
Lu, W.3
Cranor, L.F.4
Nguyen, C.5
-
7
-
-
84893087830
-
Nudging users towards privacy on mobile devices
-
Balebako, R., Leon, P. G., Almuhimedi, H., Kelley, P. G., Mugan, J., Acquisti, A., Cranor, L. F., and Sadeh, N. Nudging users towards privacy on mobile devices. In Proc. CHI-PINC (2011).
-
(2011)
Proc. CHI-PINC
-
-
Balebako, R.1
Leon, P.G.2
Almuhimedi, H.3
Kelley, P.G.4
Mugan, J.5
Acquisti, A.6
Cranor, L.F.7
Sadeh, N.8
-
8
-
-
84951028953
-
Nudging people away from privacy-invasive mobile apps through visual framing
-
Choe, E. K., Jung, J., Lee, B., and Fisher, K. Nudging people away from privacy-invasive mobile apps through visual framing. In Proc. INTERACT (2013).
-
(2013)
Proc. INTERACT
-
-
Choe, E.K.1
Jung, J.2
Lee, B.3
Fisher, K.4
-
10
-
-
84868243480
-
PiOS: Detecting privacy leaks in iOS applications
-
Egele, M., Kruegely, C., Kirdaz, E., and Vigna, G. PiOS: Detecting privacy leaks in iOS applications. In Proc. NDSS (2011).
-
(2011)
Proc. NDSS
-
-
Egele, M.1
Kruegely, C.2
Kirdaz, E.3
Vigna, G.4
-
12
-
-
84897681073
-
Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones. Commun. ACM 57, 3 (2014), 99-106.
-
(2014)
Commun. ACM 57
, vol.3
, pp. 99-106
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
13
-
-
84900401389
-
I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns
-
Felt, A. P., Egelman, S., andWagner, D. I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns. In Proc. SPSM (2012).
-
(2012)
Proc. SPSM
-
-
Felt, A.P.1
Egelman, S.2
AndWagner, D.3
-
14
-
-
84865024594
-
Android permissions: User attention, comprehension, and behavior
-
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android permissions: User attention, comprehension, and behavior. In Proc. SOUPS (2012).
-
(2012)
Proc. SOUPS
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
16
-
-
84910653435
-
A field study of run-time location access disclosures on android smartphones
-
Fu, H., Yang, Y., Shingte, N., Lindqvist, J., and Gruteser, M. A field study of run-time location access disclosures on android smartphones. Proc. USEC (2014).
-
(2014)
Proc. USEC
-
-
Fu, H.1
Yang, Y.2
Shingte, N.3
Lindqvist, J.4
Gruteser, M.5
-
17
-
-
84903982639
-
Effective risk communication for android apps
-
May
-
Gates, C., Chen, J., Li, N., and Proctor, R. Effective risk communication for android apps. IEEE Trans. Depend. Secure Comp. 11, 3 (May 2014), 252-265.
-
(2014)
IEEE Trans. Depend. Secure Comp. 11
, vol.3
, pp. 252-265
-
-
Gates, C.1
Chen, J.2
Li, N.3
Proctor, R.4
-
18
-
-
84951189322
-
Using personal examples to improve risk communication for security & privacy decisions
-
Harbach, M., Hettig, M., Weber, S., and Smith, M. Using personal examples to improve risk communication for security & privacy decisions. In Proc. CHI (2014).
-
(2014)
Proc. CHI
-
-
Harbach, M.1
Hettig, M.2
Weber, S.3
Smith, M.4
-
19
-
-
80755187778
-
These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications
-
Hornyack, P., Han, S., Jung, J., Schechter, S., andWetherall, D. These aren't the droids you're looking for: Retrofitting android to protect data from imperious applications. In Proc. CCS (2011).
-
(2011)
Proc. CCS
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
AndWetherall, D.5
-
20
-
-
19944381365
-
Privacy policies as decision-making tools: An evaluation of online privacy notices
-
Jensen, C., and Potts, C. Privacy policies as decision-making tools: An evaluation of online privacy notices. In Proc. CHI (2004).
-
(2004)
Proc. CHI
-
-
Jensen, C.1
Potts, C.2
-
21
-
-
84869811164
-
Dr. Android and Mr. Hide: Fine-grained security policies on unmodified android
-
Jeon, J., Micinski, K., Vaughan, J., Reddy, N., Zhu, Y., Foster, J., andMillstein, T. Dr. Android and Mr. Hide: Fine-grained Security Policies on Unmodified Android. Tech. rep., University of Maryland, 2011.
-
(2011)
Tech. Rep., University of Maryland
-
-
Jeon, J.1
Micinski, K.2
Vaughan, J.3
Reddy, N.4
Zhu, Y.5
Foster, J.6
AndMillstein, T.7
-
22
-
-
84958187875
-
Enhancing mobile application permissions with runtime feedback and constraints
-
Jung, J., Han, S., andWetherall, D. Enhancing mobile application permissions with runtime feedback and constraints. In Proc. SPSM (2012).
-
(2012)
Proc. SPSM
-
-
Jung, J.1
Han, S.2
AndWetherall, D.3
-
23
-
-
80053445859
-
Enhanced active choice: A new method to motivate behavior change
-
Keller, P. A., Harlam, B., Loewenstein, G., and Volpp, K. G. Enhanced active choice: A new method to motivate behavior change. J. Consum. Psychol. 21, 4 (2011), 376-383.
-
(2011)
J. Consum. Psychol. 21
, vol.4
, pp. 376-383
-
-
Keller, P.A.1
Harlam, B.2
Loewenstein, G.3
Volpp, K.G.4
-
24
-
-
70350731253
-
A nutrition label for privacy
-
Kelley, P. G., Bresee, J., Cranor, L. F., and Reeder, R.W. A nutrition label for privacy. In Proc. SOUPS (2009).
-
(2009)
Proc. SOUPS
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
-
25
-
-
84883077076
-
Privacy as part of the app decision-making process
-
Kelley, P. G., Cranor, L. F., and Sadeh, N. Privacy as part of the app decision-making process. In Proc. CHI (2013).
-
(2013)
Proc. CHI
-
-
Kelley, P.G.1
Cranor, L.F.2
Sadeh, N.3
-
26
-
-
84867459428
-
Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
-
Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., and Zhang, J. Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing. In Proc. UbiComp (2012).
-
(2012)
Proc. Ubi Comp
-
-
Lin, J.1
Amini, S.2
Hong, J.I.3
Sadeh, N.4
Lindqvist, J.5
Zhang, J.6
-
27
-
-
84937431802
-
Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings
-
Lin, J., Liu, B., Sadeh, N., and Hong, J. I.Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In Proc. SOUPS (2014).
-
(2014)
Proc. SOUPS
-
-
Lin, J.1
Liu, B.2
Sadeh, N.3
Hong, J.I.4
-
28
-
-
84909586318
-
Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help?
-
Liu, B., Lin, J., and Sadeh, N. Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help? In Proc. WWW (2014), 201-212.
-
(2014)
Proc. WWW
, pp. 201-212
-
-
Liu, B.1
Lin, J.2
Sadeh, N.3
-
29
-
-
77954487766
-
Apex: Extending android permissionmodel and enforcement with user-defined runtime constraints
-
Nauman, M., Khan, S., and Zhang, X. Apex: Extending Android PermissionModel and Enforcement with User-defined Runtime Constraints. In Proc. CCS (2010).
-
(2010)
Proc. CCS
-
-
Nauman, M.1
Khan, S.2
Zhang, X.3
-
30
-
-
84950985114
-
Leakiness and creepiness in app space: Perceptions of privacy and mobile app use
-
Shklovski, I., Mainwaring, S. D., Skúladóttir, H. H., and Borgthorsson, H. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proc. CHI (2014).
-
(2014)
Proc. CHI
-
-
Shklovski, I.1
Mainwaring, S.D.2
Skúladóttir, H.H.3
Borgthorsson, H.4
-
31
-
-
77950464077
-
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
-
Spiekermann, S., Grossklags, J., and Berendt, B. E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In Proc. EC (2001).
-
(2001)
Proc. EC
-
-
Spiekermann, S.1
Grossklags, J.2
Berendt, B.3
-
32
-
-
84903035283
-
-
Yale University Press, 2008
-
Thaler, R. H., and Sunstein, C. R. Nudge: Improving decisions about health, wealth, and happiness. Yale University Press, 2008.
-
Nudge: Improving Decisions about Health, Wealth, and Happiness
-
-
Thaler, R.H.1
Sunstein, C.R.2
-
33
-
-
84950984355
-
Wall street journal
-
Published: 2012-2-16, Accessed: 2014-9-14
-
Wall Street Journal. Apple Bows to iPhone Privacy Pressures. http://on.wsj.com/160kjhv. Published: 2012-2-16, Accessed: 2014-9-14.
-
Apple Bows to IPhone Privacy Pressures
-
-
-
34
-
-
84973498590
-
A field trial of privacy nudges for facebook
-
Wang, Y., Leon, P. G., Acquisti, A., Cranor, L. F., Forget, A., and Sadeh, N. A field trial of privacy nudges for facebook. In Proc. CHI (2014).
-
(2014)
Proc. CHI
-
-
Wang, Y.1
Leon, P.G.2
Acquisti, A.3
Cranor, L.F.4
Forget, A.5
Sadeh, N.6
|