A systematic literature review of empirical methods and risk representation in usable privacy and security research

V Distler, M Fassl, H Habib, K Krombholz… - ACM Transactions on …, 2021 - dl.acm.org
Usable privacy and security researchers have developed a variety of approaches to
represent risk to research participants. To understand how these approaches are used and …

Developers say the darnedest things: Privacy compliance processes followed by developers of child-directed apps

N Alomar, S Egelman - Proceedings on Privacy Enhancing …, 2022 - petsymposium.org
We investigate the privacy compliance processes followed by developers of child-directed
mobile apps. While children's online privacy laws have existed for decades in the US, prior …

Can systems explain permissions better? understanding users' misperceptions under smartphone runtime permission model

B Shen, L Wei, C **ang, Y Wu, M Shen… - 30th USENIX Security …, 2021 - usenix.org
Current smartphone operating systems enable users to manage permissions according to
their personal preferences with a runtime permission model. Nonetheless, the systems …

The influence of transparency and control on the willingness of data sharing in adaptive mobile apps

F Bemmann, M Windl, J Erbe, S Mayer… - Proceedings of the ACM …, 2022 - dl.acm.org
Today, adaptive mobile applications use mobile sensing and user tracking, allowing for
adaptation to the users' context and needs. This raises several privacy concerns. Privacy …

The best of both worlds: Mitigating trade-offs between accuracy and user burden in capturing mobile app privacy preferences

D Smullen, Y Feng, SA Zhang… - Proceedings on Privacy …, 2020 - petsymposium.org
In today's data-centric economy, data flows are increasingly diverse and complex. This is
best exemplified by mobile apps, which are given access to an increasing number of …

[HTML][HTML] Reconciling the what, when and how of privacy notifications in fitness tracking scenarios

P Murmann, M Beckerle, S Fischer-Hübner… - Pervasive and Mobile …, 2021 - Elsevier
The increasing number of fitness tracking wearables deployed worldwide poses challenges
to the privacy of their users, esp. in terms of transparency. Privacy notifications facilitate …

A large-scale empirical study on android runtime-permission rationale messages

X Liu, Y Leng, W Yang, W Wang… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
After Android 6.0 introduces the runtime-permission system, many apps provide runtime-
permission-group rationales for the users to better understand the permissions requested by …

Enhancing user privacy in mobile devices through prediction of privacy preferences

R Mendes, M Cunha, JP Vilela… - European Symposium on …, 2022 - Springer
The multitude of applications and security configurations of mobile devices requires
automated approaches for effective user privacy protection. Current permission managers …

Effect of user expectation on mobile app privacy: a field study

R Mendes, A Brandão, JP Vilela… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Runtime permission managers for mobile devices allow requests to be performed at the time
in which permissions are required, thus enabling the user to grant/deny requests in context …

Websites Need Your Permission Too--User Sentiment and Decision-Making on Web Permission Prompts in Desktop Chrome

M Harbach - Proceedings of the CHI Conference on Human Factors …, 2024 - dl.acm.org
The web utilizes permission prompts to moderate access to certain capabilities. We present
the first investigation of user behavior and sentiment of this security and privacy measure on …