A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Ask the experts: What should be on an IoT privacy and security label?
Information about the privacy and security of Internet of Things (IoT) devices is not readily
available to consumers who want to consider it before making purchase decisions. While …
available to consumers who want to consider it before making purchase decisions. While …
Stuck in the permissions with you: Developer & end-user perspectives on app permissions & their privacy ramifications
While the literature on permissions from the end-user perspective is rich, there is a lack of
empirical research on why developers request permissions, their conceptualization of …
empirical research on why developers request permissions, their conceptualization of …
Analyzing user perspectives on mobile app privacy at scale
In this paper we present a methodology to analyze users' concerns and perspectives about
privacy at scale. We leverage NLP techniques to process millions of mobile app reviews and …
privacy at scale. We leverage NLP techniques to process millions of mobile app reviews and …
A systematic survey on android api usage for data-driven analytics with smartphones
Recent industrial and academic research has focused on data-driven analytics with
smartphones by collecting user interaction, context, and device systems data through …
smartphones by collecting user interaction, context, and device systems data through …
Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model
Current smartphone operating systems enable users to manage permissions according to
their personal preferences with a runtime permission model. Nonetheless, the systems …
their personal preferences with a runtime permission model. Nonetheless, the systems …
A large scale study of user behavior, expectations and engagement with android permissions
We conduct a global study on the behaviors, expectations and engagement of 1,719
participants across 10 countries and regions towards Android application permissions …
participants across 10 countries and regions towards Android application permissions …
Contextualizing privacy decisions for better prediction (and protection)
Modern mobile operating systems implement an ask-on-first-use policy to regulate
applications' access to private user data: the user is prompted to allow or deny access to a …
applications' access to private user data: the user is prompted to allow or deny access to a …
Honeysuckle: Annotation-guided code generation of in-app privacy notices
In-app privacy notices can help smartphone users make informed privacy decisions.
However, they are rarely used in real-world apps, since developers often lack the …
However, they are rarely used in real-world apps, since developers often lack the …
Android custom permissions demystified: From privilege escalation to design shortcomings
Permission is the fundamental security mechanism for protecting user data and privacy on
Android. Given its importance, security researchers have studied the design and usage of …
Android. Given its importance, security researchers have studied the design and usage of …