Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward

I Makhdoom, M Abolhasan, J Lipman, N Shariati… - IEEE …, 2024 - ieeexplore.ieee.org
The current age is witnessing an unprecedented dependence on data originating from
humans through the devices that comprise the Internet of Things. The data collected by …

The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences

P Wijesekera, A Baokar, L Tsai… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Current smartphone operating systems regulate application permissions by prompting users
on an ask-on-first-use basis. Prior research has shown that this method is ineffective …

Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications

M Tahaei, R Abu-Salma, A Rashid - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …

[HTML][HTML] Applying staged event-driven access control to combat ransomware

T McIntosh, ASM Kayes, YPP Chen, A Ng… - Computers & Security, 2023 - Elsevier
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

Proactive vs. reactive personalization: Can customization of privacy enhance user experience?

B Zhang, SS Sundar - International journal of human-computer studies, 2019 - Elsevier
Online recommender systems have triggered widespread privacy concerns due to their
reliance on personal user data for providing personalized services. To address these …

Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model

B Shen, L Wei, C **ang, Y Wu, M Shen… - 30th USENIX Security …, 2021 - usenix.org
Current smartphone operating systems enable users to manage permissions according to
their personal preferences with a runtime permission model. Nonetheless, the systems …

Dynamic user-centric access control for detection of ransomware attacks

T McIntosh, ASM Kayes, YPP Chen, A Ng… - Computers & Security, 2021 - Elsevier
Ransomware attacks are often catastrophic, yet existing reactive and preventative measures
could only partially mitigate ransomware damage, often not in a timely manner, and often …

Exploring decision making with {Android's} runtime permission dialogs using in-context surveys

B Bonné, ST Peddinti, I Bilogrevic, N Taft - Thirteenth Symposium on …, 2017 - usenix.org
A great deal of research on the management of user data on smartphones via permission
systems has revealed significant levels of user discomfort, lack of understanding, and lack of …

Contextualizing privacy decisions for better prediction (and protection)

P Wijesekera, J Reardon, I Reyes, L Tsai… - Proceedings of the …, 2018 - dl.acm.org
Modern mobile operating systems implement an ask-on-first-use policy to regulate
applications' access to private user data: the user is prompted to allow or deny access to a …