Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Privacy Slider: Fine-Grain Privacy Control for Smartphones

Published: 24 September 2024 Publication History

Abstract

Today, users are constrained by binary choices when configuring permissions. These binary choices contrast with the complex data collected, limiting user control and transparency. For instance, weather applications do not need exact user locations when merely inquiring about local weather conditions. We envision sliders to empower users to fine-tune permissions. First, we ran two online surveys (N=123 & N=109) and a workshop (N=5) to develop the initial design of Privacy Slider. After the implementation phase, we evaluated our functional prototype using a lab study (N=32). The results show that our slider design for permission control outperforms today's system concerning all measures, including control and transparency.

References

[1]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI '15). Association for Computing Machinery, New York, NY, USA, 787--796. https://doi.org/10.1145/2702123.2702210
[2]
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, Phillipa Gill, and David Lie. 2011. Short paper: a look at smartphone permission models. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (Chicago, Illinois, USA) (SPSM '11). Association for Computing Machinery, New York, NY, USA, 63--68. https://doi.org/10.1145/2046614.2046626
[3]
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philipp von Styp-Rekowsky. 2013. AppGuard-Enforcing User Requirements on Android Apps. In TACAS, Vol. 13. Springer, Berlin, Heidelberg, Germany, 543--548. https://doi.org/10.1007/978--3--642--36742--7_39
[4]
Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, and Carolyn Nguyen. 2013. "Little Brothers Watching You": Raising Awareness of Data Leaks on Smartphones. In Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS '13). Association for Computing Machinery, New York, NY, USA, Article 12, 11 pages. https://doi.org/10.1145/2501604.2501616
[5]
David Barrera, H. Günecs Kayacik, Paul C. van Oorschot, and Anil Somayaji. 2010. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA) (CCS '10). Association for Computing Machinery, New York, NY, USA, 73--84. https://doi.org/10.1145/1866307.1866317
[6]
Florian Bemmann, Maximiliane Windl, Jonas Erbe, Sven Mayer, and Heinrich Hussmann. 2022. The Influence of Transparency and Control on the Willingness of Data Sharing in Adaptive Mobile Apps. Proc. ACM Hum.-Comput. Interact., Vol. 6, MHCI, Article 189 (sep 2022), 26 pages. https://doi.org/10.1145/3546724
[7]
Alastair R. Beresford, Andrew Rice, Nicholas Skehin, and Ripduman Sohan. 2011. MockDroid: trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (Phoenix, Arizona) (HotMobile '11). Association for Computing Machinery, New York, NY, USA, 49--54. https://doi.org/10.1145/2184489.2184500
[8]
Matthias Böhmer, Brent Hecht, Johannes Schöning, Antonio Krüger, and Gernot Bauer. 2011. Falling Asleep with Angry Birds, Facebook and Kindle: A Large Scale Study on Mobile Application Usage. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (Stockholm, Sweden) (MobileHCI '11). Association for Computing Machinery, New York, NY, USA, 47--56. https://doi.org/10.1145/2037373.2037383
[9]
Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, and Nina Taft. 2017. Exploring decision making with Androidtextquoterights runtime permission dialogs using in-context surveys. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 195--210. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/bonne
[10]
John Brooke. 1996. Sus: a 'quick and dirty'usability. Usability evaluation in industry, Vol. 189, 3 (1996), 189--194.
[11]
Lucas Brutschy, Pietro Ferrara, Omer Tripp, and Marco Pistoia. 2015. Shamdroid: gracefully degrading functionality in the presence of limited resource access. ACM SIGPLAN Notices, Vol. 50, 10 (2015), 316--331.
[12]
Weicheng Cao, Chunqiu Xia, Sai Teja Peddinti, David Lie, Nina Taft, and Lisa M. Austin. 2021. A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Berkeley, CA, USA, 803--820. https://www.usenix.org/conference/usenixsecurity21/presentation/cao-weicheng
[13]
Filip Carlèn. 2017. User Onboarding An investigation in how to increase the activation of new customers using design. Master's thesis. Chalmers University of Technology. https://hdl.handle.net/20.500.12380/252779
[14]
Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I. Hong, and Yuvraj Agarwal. 2017. Does this App Really Need My Location? Context-Aware Privacy Management for Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., Vol. 1, 3, Article 42 (sep 2017), 22 pages. https://doi.org/10.1145/3132029
[15]
Hanbyul Choi, Jonghwa Park, and Yoonhyuk Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior, Vol. 81 (2018), 42--51. https://doi.org/10.1016/j.chb.2017.12.001
[16]
Delphine Christin, Andreas Reinhardt, Salil S Kanhere, and Matthias Hollick. 2011. A survey on privacy in mobile participatory sensing applications. Journal of systems and software, Vol. 84, 11 (2011), 1928--1946. https://doi.org/10.1016/j.jss.2011.06.073
[17]
Mauro Conti, Vu Thien Nga Nguyen, and Bruno Crispo. 2011. Crepe: Context-related policy enforcement for android. In Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25--28, 2010, Revised Selected Papers 13. Springer, Berlin, Heidelberg, Germany, 331--345. https://doi.org/10.1007/978--3--642--18178--8_29
[18]
Mary J Culnan and Pamela K Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science, Vol. 10, 1 (1999), 104--115. https://doi.org/10.1287/orsc.10.1.104
[19]
Alexander De Luca, Emanuel von Zezschwitz, Ngo Dieu Huong Nguyen, Max-Emanuel Maurer, Elisa Rubegni, Marcello Paolo Scipioni, and Marc Langheinrich. 2013. Back-of-device authentication on smartphones. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Paris, France) (CHI '13). Association for Computing Machinery, New York, NY, USA, 2389--2398. https://doi.org/10.1145/2470654.2481330
[20]
Nora A Draper and Joseph Turow. 2019. The corporate cultivation of digital resignation. New media & society, Vol. 21, 8 (2019), 1824--1839. https://doi.org/10.1177/1461444819833331
[21]
Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, and Sven Bugiel. 2021. Explanation Beats Context: The Effect of Timing & Rationales on Userstextquoteright Runtime Permission Decisions. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Berkeley, CA, USA, 785--802. https://www.usenix.org/conference/usenixsecurity21/presentation/elbitar
[22]
William Enck, Machigar Ongtang, and Patrick McDaniel. 2009. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security (Chicago, Illinois, USA) (CCS '09). Association for Computing Machinery, New York, NY, USA, 235--245. https://doi.org/10.1145/1653662.1653691
[23]
Zheran Fang, Weili Han, and Yingjiu Li. 2014. Permission based Android security: Issues and countermeasures. computers & security, Vol. 43 (2014), 205--218.
[24]
Johannes Feichtner and Stefan Gruber. 2020. Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (New Orleans, LA, USA) (CODASPY '20). Association for Computing Machinery, New York, NY, USA, 203--214. https://doi.org/10.1145/3374664.3375730
[25]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (Washington, D.C.) (SOUPS '12). Association for Computing Machinery, New York, NY, USA, Article 3, 14 pages. https://doi.org/10.1145/2335356.2335360
[26]
Thomas Franke, Christiane Attig, and Daniel Wessel. 2019. A personal resource for technology interaction: development and validation of the affinity for technology interaction (ATI) scale. International Journal of Human-Computer Interaction, Vol. 35, 6 (2019), 456--467.
[27]
Frederik Funke and Ulf-Dietrich Reips. 2012. Why semantic differentials in web-based research should be made from visual analogue scales and not from 5-point scales. Field methods, Vol. 24, 3 (2012), 310--327. https://doi.org/10.1177/1525822X12444061
[28]
Marco Furini, Silvia Mirri, Manuela Montangero, and Catia Prandi. 2020. Privacy perception when using smartphone applications. Mobile Networks and Applications, Vol. 25, 3 (2020), 1055--1061. https://doi.org/10.1007/s11036-020-01529-z
[29]
Hongcan Gao, Chenkai Guo, Yanfeng Wu, Naipeng Dong, Xiaolei Hou, Sihan Xu, and Jing Xu. 2019. AutoPer: Automatic Recommender for Runtime-Permission in Android Applications. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Vol. 1. IEEE, New York, NY, USA, 107--116. https://doi.org/10.1109/COMPSAC.2019.00024
[30]
Gabriella M Harari. 2020. A process-oriented approach to respecting privacy in the context of mobile phone tracking. Current opinion in psychology, Vol. 31 (2020), 141--147. https://doi.org/10.1016/j.copsyc.2019.09.007
[31]
Gunnar Harboe and Elaine M. Huang. 2015. Real-World Affinity Diagramming Practices: Bridging the Paper-Digital Gap. In Proc. 33rd Annual ACM Conf. Human Factors in Computing Systems. ACM, New York, NY, USA, 95--104. https://doi.org/10.1145/2702123.2702561
[32]
Jason I. Hong, Yuvraj Agarwal, Matt Fredrikson, Mike Czapik, Shawn Hanna, Swarup Sahoo, Judy Chun, Won-Woo Chung, Aniruddh Iyer, Ally Liu, Shen Lu, Rituparna Roychoudhury, Qian Wang, Shan Wang, Siqi Wang, Vida Zhang, Jessica Zhao, Yuan Jiang, Haojian Jin, Sam Kim, Evelyn Kuo, Tianshi Li, Jinping Liu, Yile Liu, and Robert Zhang. 2021. The Design of the User Interfaces for Privacy Enhancements for Android. https://doi.org/10.48550/arXiv.2104.12032 arxiv: 2104.12032 [cs.CR]
[33]
Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, and Todd Millstein. 2012. Dr. Android and Mr. Hide: fine-grained permissions in android applications. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (Raleigh, North Carolina, USA) (SPSM '12). Association for Computing Machinery, New York, NY, USA, 3--14. https://doi.org/10.1145/2381934.2381938
[34]
Aycan Kaya, Reha Ozturk, and Cigdem Altin Gumussoy. 2019. Usability measurement of mobile applications with system usability scale (SUS). In Industrial Engineering in the Big Data Era: Selected Papers from the Global Joint Conference on Industrial Engineering and Its Application Areas (Nevsehir, Turkey) (GJCIE 2018). Springer, Cham, Switzerland, 389--400.
[35]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A conundrum of permissions: installing applications on an android smartphone. In Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers 16. Springer, Cham, Switzerland, 68--79.
[36]
Paul E Ketelaar and Mark Van Balen. 2018. The smartphone as your follower: The role of smartphone literacy in the relation between privacy concerns, attitude and behaviour towards phone-embedded tracking. Computers in Human Behavior, Vol. 78 (2018), 174--182. https://doi.org/10.1016/j.chb.2017.09.034
[37]
Florian Keusch, Bella Struminskaya, Christopher Antoun, Mick P Couper, and Frauke Kreuter. 2019. Willingness to participate in passive mobile data collection. Public opinion quarterly, Vol. 83, S1 (2019), 210--235. https://doi.org/10.1093/poq/nfz007
[38]
Florian Künzler. 2019. Context-aware notification management systems for just-in-time adaptive interventions. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, New York, NY, USA, 435--436. https://doi.org/10.1109/PERCOMW.2019.8730874
[39]
Nicholas D Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T Campbell. 2010. A survey of mobile phone sensing. IEEE Communications magazine, Vol. 48, 9 (2010), 140--150.
[40]
Hansoo Lee, Joonyoung Park, and Uichin Lee. 2022. A Systematic Survey on Android API Usage for Data-Driven Analytics with Smartphones. ACM Comput. Surv., Vol. 55, 5, Article 104 (dec 2022), 38 pages. https://doi.org/10.1145/3530814
[41]
Yuanchun Li, Yao Guo, and Xiangqun Chen. 2016. PERUIM: Understanding Mobile Application Privacy with Permission-UI Mapping. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Heidelberg, Germany) (UbiComp '16). Association for Computing Machinery, New York, NY, USA, 682--693. https://doi.org/10.1145/2971648.2971693
[42]
Andrew Lowe, Anthony C Norris, A Jane Farris, and Duncan R Babbage. 2018. Quantifying thematic saturation in qualitative data analysis. Field methods, Vol. 30, 3 (2018), 191--207.
[43]
Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, Vol. 15, 4 (2004), 336--355.
[44]
Vikas Kumar Malviya, Chee Wei Leow, Ashok Kasthuri, Yan Naing Tun, Lwin Khin Shar, and Lingxiao Jiang. 2023. Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering (Rochester, MI, USA) (ASE '22). Association for Computing Machinery, New York, NY, USA, Article 186, 6 pages. https://doi.org/10.1145/3551349.3559556
[45]
Kristopher Micinski, Daniel Votipka, Rock Stevens, Nikolaos Kofinas, Michelle L. Mazurek, and Jeffrey S. Foster. 2017. User Interactions and Permission Use on Android. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI '17). Association for Computing Machinery, New York, NY, USA, 362--373. https://doi.org/10.1145/3025453.3025706
[46]
Mohammad Nauman, Sohail Khan, and Xinwen Zhang. 2010. Apex: extending Android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (Beijing, China) (ASIACCS '10). Association for Computing Machinery, New York, NY, USA, 328--332. https://doi.org/10.1145/1755688.1755732
[47]
Katarzyna Olejnik, Italo Dacosta, Joana Soares Machado, Kévin Huguenin, Mohammad Emtiyaz Khan, and Jean-Pierre Hubaux. 2017. Smarper: Context-aware and automatic runtime-permissions for mobile devices. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, New York, NY, USA, 1058--1076. https://doi.org/10.1109/SP.2017.25
[48]
Emmanuel Onu, Michael Mireku Kwakye, and Ken Barker. 2020. Contextual Privacy Policy Modeling in IoT. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). IEEE, New York, NY, USA, 94--102. https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00030
[49]
John O'Donoghue and John Herbert. 2012. Data Management within mHealth Environments: Patient Sensors, Mobile Devices, and Databases. J. Data and Information Quality, Vol. 4, 1, Article 5 (oct 2012), 20 pages. https://doi.org/10.1145/2378016.2378021
[50]
Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, and David Wagner. 2012. AdDroid: privilege separation for applications and advertisers in Android. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (Seoul, Korea) (ASIACCS '12). Association for Computing Machinery, New York, NY, USA, 71--72. https://doi.org/10.1145/2414456.2414498
[51]
Jan Pennekamp, Martin Henze, and Klaus Wehrle. 2017. A survey on the evolution of privacy enforcement on smartphones and the road ahead. Pervasive and Mobile Computing, Vol. 42 (2017), 58--76.
[52]
Sarah Prange, Sven Mayer, Maria-Lena Bittl, Mariam Hassib, and Florian Alt. 2021. Investigating User Perceptions Towards Wearable Mobile Electromyography. In Human-Computer Interaction--INTERACT 2021: 18th IFIP TC 13 International Conference (Bari, Italy). Springer, Cham, switzerland, 339--360. https://doi.org/10.1007/978--3-030--85610--6_20
[53]
Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, and Haojin Zhu. 2020. Automatic permission optimization framework for privacy enhancement of mobile applications. IEEE Internet of Things Journal, Vol. 8, 9 (2020), 7394--7406. https://doi.org/10.1109/JIOT.2020.3039472
[54]
Ulf-Dietrich Reips and Frederik Funke. 2008. Interval-level measurement with visual analogue scales in Internet-based research: VAS Generator. Behavior research methods, Vol. 40, 3 (2008), 699--704. https://doi.org/10.3758/BRM.40.3.699
[55]
Alireza Sahami Shirazi, Niels Henze, Tilman Dingler, Martin Pielot, Dominik Weber, and Albrecht Schmidt. 2014. Large-Scale Assessment of Mobile Notifications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI '14). Association for Computing Machinery, New York, NY, USA, 3055--3064. https://doi.org/10.1145/2556288.2557189
[56]
Kanthashree Mysore Sathyendra, Shomir Wilson, Florian Schaub, Sebastian Zimmeck, and Norman Sadeh. 2017. Identifying the provision of choices in privacy policy text. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Kerrville, TX, USA, 2774--2779. https://doi.org/10.18653/v1/D17--1294
[57]
Albrecht Schmidt, Michael Beigl, and Hans Gellersen. 1999. There is more to context than location. Computers & Graphics, Vol. 23, 6 (1999), 893--901. https://doi.org/10.1016/S0097--8493(99)00120-X
[58]
Gian Luca Scoccia, Ivano Malavolta, Marco Autili, Amleto Di Salle, and Paola Inverardi. 2019. Enhancing trustability of android applications via user-centric flexible permissions. IEEE Transactions on Software Engineering, Vol. 47, 10 (2019), 2032--2051. https://doi.org/10.1109/TSE.2019.2941936
[59]
John S. Seberger, Marissel Llavore, Nicholas Nye Wyant, Irina Shklovski, and Sameer Patil. 2021. Empowering Resignation: There's an App for That. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI '21). Association for Computing Machinery, New York, NY, USA, Article 552, 18 pages. https://doi.org/10.1145/3411764.3445293
[60]
Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, and Xinxin Jin. 2021. Can Systems Explain Permissions Better? Understanding Userstextquoteright Misperceptions under Smartphone Runtime Permission Model. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Berkeley, CA, USA, 751--768. https://www.usenix.org/conference/usenixsecurity21/presentation/shen-bingyu
[61]
Gulshan Shrivastava, Prabhat Kumar, Deepak Gupta, and Joel JPC Rodrigues. 2020. Privacy issues of android application permissions: A literature review. Transactions on Emerging Telecommunications Technologies, Vol. 31, 12 (2020), e3773. https://doi.org/10.1002/ett.3773
[62]
Christoph Stach and Bernhard Mitschang. 2013. Privacy management for mobile platforms--a review of concepts and approaches. In 2013 IEEE 14th International Conference on Mobile Data Management, Vol. 1. IEEE, New York, NY, USA, 305--313. https://doi.org/10.1109/MDM.2013.45
[63]
Mohammad Tahaei, Ruba Abu-Salma, and Awais Rashid. 2023. Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 168, 24 pages. https://doi.org/10.1145/3544548.3581060
[64]
Christopher Thompson, Maritza Johnson, Serge Egelman, David Wagner, and Jennifer King. 2013. When It's Better to Ask Forgiveness than Get Permission: Attribution Mechanisms for Smartphone Resources. In Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS '13). Association for Computing Machinery, New York, NY, USA, Article 1, 14 pages. https://doi.org/10.1145/2501604.2501605
[65]
Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good, and Jung-Wei Chen. 2017. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 145--162. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/tsai
[66]
Na Wang, Bo Zhang, Bin Liu, and Hongxia Jin. 2015. Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services (Copenhagen, Denmark) (MobileHCI '15). Association for Computing Machinery, New York, NY, USA, 373--382. https://doi.org/10.1145/2785830.2785845
[67]
Yang Wang, Huichuan Xia, and Yun Huang. 2016. Examining American and Chinese Internet Users' Contextual Privacy Preferences of Behavioral Advertising. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (San Francisco, California, USA) (CSCW '16). Association for Computing Machinery, New York, NY, USA, 539--552. https://doi.org/10.1145/2818048.2819941
[68]
Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, and Konstantin Beznosov. 2018. Dynamically Regulating Mobile Application Permissions. IEEE Security & Privacy, Vol. 16, 1 (2018), 64--71. https://doi.org/10.1109/MSP.2018.1331031
[69]
Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David Wagner, Konstantin Beznosov, and Serge Egelman. 2018. Contextualizing Privacy Decisions for Better Prediction (and Protection). In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI '18). Association for Computing Machinery, New York, NY, USA, 1--13. https://doi.org/10.1145/3173574.3173842
[70]
Maximiliane Windl, Niels Henze, Albrecht Schmidt, and Sebastian S. Feger. 2022. Automating Contextual Privacy Policies: Design and Evaluation of a Production Tool for Digital Consumer Privacy Awareness. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI '22). Association for Computing Machinery, New York, NY, USA, Article 34, 18 pages. https://doi.org/10.1145/3491102.3517688
[71]
Jacob O. Wobbrock, Leah Findlater, Darren Gergle, and James J. Higgins. 2011. The Aligned Rank Transform for Nonparametric Factorial Analyses Using Only Anova Procedures. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI '11). Association for Computing Machinery, New York, NY, USA, 143--146. https://doi.org/10.1145/1978942.1978963
[72]
Kuang-Wen Wu, Shaio Yan Huang, David C Yen, and Irina Popova. 2012. The effect of online privacy policy on consumer privacy concern and trust. Computers in human behavior, Vol. 28, 3 (2012), 889--897. https://doi.org/10.1016/j.chb.2011.12.008
[73]
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, and Vincent W Freeh. 2011. Taming information-stealing smartphone applications (on android). In Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22--24, 2011. Proceedings 4. Springer, Berlin, Heidelberg, Germany, 93--107.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue MHCI
MHCI
September 2024
1136 pages
EISSN:2573-0142
DOI:10.1145/3697825
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 September 2024
Published in PACMHCI Volume 8, Issue MHCI

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile devices
  2. permissions
  3. privacy
  4. smartphone

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 117
    Total Downloads
  • Downloads (Last 12 months)117
  • Downloads (Last 6 weeks)11
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media