Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward
The current age is witnessing an unprecedented dependence on data originating from
humans through the devices that comprise the Internet of Things. The data collected by …
humans through the devices that comprise the Internet of Things. The data collected by …
The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences
Current smartphone operating systems regulate application permissions by prompting users
on an ask-on-first-use basis. Prior research has shown that this method is ineffective …
on an ask-on-first-use basis. Prior research has shown that this method is ineffective …
Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …
empirical research on why developers request permissions, their conceptualization of …
[HTML][HTML] Applying staged event-driven access control to combat ransomware
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
Proactive vs. reactive personalization: Can customization of privacy enhance user experience?
B Zhang, SS Sundar - International journal of human-computer studies, 2019 - Elsevier
Online recommender systems have triggered widespread privacy concerns due to their
reliance on personal user data for providing personalized services. To address these …
reliance on personal user data for providing personalized services. To address these …
Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model
Current smartphone operating systems enable users to manage permissions according to
their personal preferences with a runtime permission model. Nonetheless, the systems …
their personal preferences with a runtime permission model. Nonetheless, the systems …
Dynamic user-centric access control for detection of ransomware attacks
Ransomware attacks are often catastrophic, yet existing reactive and preventative measures
could only partially mitigate ransomware damage, often not in a timely manner, and often …
could only partially mitigate ransomware damage, often not in a timely manner, and often …
Exploring decision making with {Android's} runtime permission dialogs using in-context surveys
A great deal of research on the management of user data on smartphones via permission
systems has revealed significant levels of user discomfort, lack of understanding, and lack of …
systems has revealed significant levels of user discomfort, lack of understanding, and lack of …
Contextualizing privacy decisions for better prediction (and protection)
Modern mobile operating systems implement an ask-on-first-use policy to regulate
applications' access to private user data: the user is prompted to allow or deny access to a …
applications' access to private user data: the user is prompted to allow or deny access to a …