A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Ask the experts: What should be on an IoT privacy and security label?

P Emami-Naeini, Y Agarwal, LF Cranor… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Information about the privacy and security of Internet of Things (IoT) devices is not readily
available to consumers who want to consider it before making purchase decisions. While …

Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications

M Tahaei, R Abu-Salma, A Rashid - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …

Analyzing user perspectives on mobile app privacy at scale

P Nema, P Anthonysamy, N Taft… - Proceedings of the 44th …, 2022 - dl.acm.org
In this paper we present a methodology to analyze users' concerns and perspectives about
privacy at scale. We leverage NLP techniques to process millions of mobile app reviews and …

A systematic survey on android api usage for data-driven analytics with smartphones

H Lee, J Park, U Lee - ACM Computing Surveys, 2022 - dl.acm.org
Recent industrial and academic research has focused on data-driven analytics with
smartphones by collecting user interaction, context, and device systems data through …

Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model

B Shen, L Wei, C **ang, Y Wu, M Shen… - 30th USENIX Security …, 2021 - usenix.org
Current smartphone operating systems enable users to manage permissions according to
their personal preferences with a runtime permission model. Nonetheless, the systems …

A large scale study of user behavior, expectations and engagement with android permissions

W Cao, C **a, ST Peddinti, D Lie, N Taft… - 30th USENIX Security …, 2021 - usenix.org
We conduct a global study on the behaviors, expectations and engagement of 1,719
participants across 10 countries and regions towards Android application permissions …

Contextualizing privacy decisions for better prediction (and protection)

P Wijesekera, J Reardon, I Reyes, L Tsai… - Proceedings of the …, 2018 - dl.acm.org
Modern mobile operating systems implement an ask-on-first-use policy to regulate
applications' access to private user data: the user is prompted to allow or deny access to a …

Honeysuckle: Annotation-guided code generation of in-app privacy notices

T Li, EB Neundorfer, Y Agarwal, JI Hong - Proceedings of the ACM on …, 2021 - dl.acm.org
In-app privacy notices can help smartphone users make informed privacy decisions.
However, they are rarely used in real-world apps, since developers often lack the …

Android custom permissions demystified: From privilege escalation to design shortcomings

R Li, W Diao, Z Li, J Du, S Guo - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Permission is the fundamental security mechanism for protecting user data and privacy on
Android. Given its importance, security researchers have studied the design and usage of …