A systematic literature review of empirical methods and risk representation in usable privacy and security research
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …
represent risk to research participants. To understand how these approaches are used and …
Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
mobile apps. While children's online privacy laws have existed for decades in the US, prior …
Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model
Current smartphone operating systems enable users to manage permissions according to
their personal preferences with a runtime permission model. Nonetheless, the systems …
their personal preferences with a runtime permission model. Nonetheless, the systems …
The influence of transparency and control on the willingness of data sharing in adaptive mobile apps
Today, adaptive mobile applications use mobile sensing and user tracking, allowing for
adaptation to the users' context and needs. This raises several privacy concerns. Privacy …
adaptation to the users' context and needs. This raises several privacy concerns. Privacy …
The best of both worlds: Mitigating trade-offs between accuracy and user burden in capturing mobile app privacy preferences
In today's data-centric economy, data flows are increasingly diverse and complex. This is
best exemplified by mobile apps, which are given access to an increasing number of …
best exemplified by mobile apps, which are given access to an increasing number of …
[HTML][HTML] Reconciling the what, when and how of privacy notifications in fitness tracking scenarios
P Murmann, M Beckerle, S Fischer-Hübner… - Pervasive and Mobile …, 2021 - Elsevier
The increasing number of fitness tracking wearables deployed worldwide poses challenges
to the privacy of their users, esp. in terms of transparency. Privacy notifications facilitate …
to the privacy of their users, esp. in terms of transparency. Privacy notifications facilitate …
A large-scale empirical study on android runtime-permission rationale messages
After Android 6.0 introduces the runtime-permission system, many apps provide runtime-
permission-group rationales for the users to better understand the permissions requested by …
permission-group rationales for the users to better understand the permissions requested by …
Enhancing user privacy in mobile devices through prediction of privacy preferences
The multitude of applications and security configurations of mobile devices requires
automated approaches for effective user privacy protection. Current permission managers …
automated approaches for effective user privacy protection. Current permission managers …
Effect of user expectation on mobile app privacy: a field study
Runtime permission managers for mobile devices allow requests to be performed at the time
in which permissions are required, thus enabling the user to grant/deny requests in context …
in which permissions are required, thus enabling the user to grant/deny requests in context …
Websites Need Your Permission Too--User Sentiment and Decision-Making on Web Permission Prompts in Desktop Chrome
M Harbach - Proceedings of the CHI Conference on Human Factors …, 2024 - dl.acm.org
The web utilizes permission prompts to moderate access to certain capabilities. We present
the first investigation of user behavior and sentiment of this security and privacy measure on …
the first investigation of user behavior and sentiment of this security and privacy measure on …