A Comparative Study of Android Users’ Privacy Preferences Under the Runtime Permission Model (English)
- New search for: Andriotis, Panagiotis
- New search for: Li, Shancang
- New search for: Spyridopoulos, Theodoros
- New search for: Stringhini, Gianluca
- New search for: Tryfonas, Theo
- New search for: Andriotis, Panagiotis
- New search for: Li, Shancang
- New search for: Spyridopoulos, Theodoros
- New search for: Stringhini, Gianluca
In:
Human Aspects of Information Security, Privacy and Trust
: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings
;
Chapter: 42
;
604-622
;
2017
- Article/Chapter (Book) / Electronic Resource
-
Title:A Comparative Study of Android Users’ Privacy Preferences Under the Runtime Permission Model
-
Additional title:Lect.Notes Computer
-
Contributors:Tryfonas, Theo ( editor ) / Andriotis, Panagiotis ( author ) / Li, Shancang ( author ) / Spyridopoulos, Theodoros ( author ) / Stringhini, Gianluca ( author )
-
Conference:International Conference on Human Aspects of Information Security, Privacy, and Trust ; 2017 ; Vancouver, BC, Canada
-
Published in:Human Aspects of Information Security, Privacy and Trust : 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings ; Chapter: 42 ; 604-622Lecture Notes in Computer Science ; 10292 ; 604-622
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2017-05-13
-
Size:19 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:Runtime , Permissions , Android , Settings , Apps , Marshmallow , Privacy , Security , Usability , ProfileComputer Science , Models and Principles , Software Engineering/Programming and Operating Systems , Information Systems Applications (incl. Internet) , Computer Appl. in Social and Behavioral Sciences , Data Structures and Information Theory , Computer Systems Organization and Communication Networks
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The Design of Messages to Improve Cybersecurity Incident ReportingBriggs, Pam / Jeske, Debora / Coventry, Lynne et al. | 2017
- 2
-
Overcoming Fear of the Threat ModelCadzow, Scott et al. | 2017
- 3
-
“No Good Reason to Remove Features”Dodier-Lazaro, Steve / Becker, Ingolf / Krinke, Jens / Sasse, M. Angela et al. | 2017
- 4
-
Mobile Online Proficiency and Mobile Internet Use - Findings from FinlandErtiö, Titiana / Räsänen, Pekka et al. | 2017
- 5
-
Usability in Solutions of Secure Email – A Tools ReviewFerreira, Lucas / Anacleto, Junia et al. | 2017
- 6
-
A User-Centered Model for Usable Security and PrivacyFeth, Denis / Maier, Andreas / Polst, Svenja et al. | 2017
- 7
-
Information Security, Privacy, and Trust in Social Robotic Assistants for Older AdultsGiven-Wilson, Thomas / Legay, Axel / Sedwards, Sean et al. | 2017
- 8
-
Android App Permission and Users’ Adoption: A Case Study of Mental Health ApplicationHuang, Hsiao-Ying / Bashir, Masooda et al. | 2017
- 9
-
“If It’s Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It”: A Study into Home Data Security DecisionsNthala, Norbert / Flechais, Ivan et al. | 2017
- 10
-
Assessing the Impact of Affective Feedback on End-User Security AwarenessShepherd, Lynsay A. / Archibald, Jacqueline / Ferguson, Robert Ian et al. | 2017
- 11
-
A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIsWijayarathna, Chamila / Arachchilage, Nalin A. G. / Slay, Jill et al. | 2017
- 12
-
Managing User Experience: Usability and Security in a New Era of Software SupremacyZagouras, Panagiotis / Kalloniatis, Christos / Gritzalis, Stefanos et al. | 2017
- 13
-
PSV (Password Security Visualizer): From Password Checking to User EducationAljaffan, Nouf / Yuan, Haiyue / Li, Shujun et al. | 2017
- 14
-
Dear Password, I Know You Too WellBlauw, Frans F. et al. | 2017
- 15
-
Keystroke Inference Using Smartphone KinematicsBuckley, Oliver / Hodges, Duncan / Hadgkiss, Melissa / Morris, Sarah et al. | 2017
- 16
-
Live Gaze-Based Authentication and Gaming SystemWang, Quan / Deng, Lelai / Cheng, Hao / Fan, Hualei / Du, Xiaoping / Yang, Qinghong et al. | 2017
- 17
-
When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security SystemsYuan, Haiyue / Li, Shujun / Rusconi, Patrice / Aljaffan, Nouf et al. | 2017
- 18
-
“If It Wasn’t Secure, They Would Not Use It in the Movies” – Security Perceptions and User Acceptance of Authentication TechnologiesZimmermann, Verena / Gerber, Nina et al. | 2017
- 19
-
Identifying Changes in the Cybersecurity Threat Landscape Using the LDA-Web Topic Modelling Data Search EngineAl Moubayed, Noura / Wall, David / McGough, A. Stephen et al. | 2017
- 20
-
Secure Peripherals in a Converged Mobile Environmentdu Toit, Jaco / Ellefsen, Ian et al. | 2017
- 21
-
System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and AnalysisFagade, Tesleem / Spyridopoulos, Theo / Albishry, Nabeel / Tryfonas, Theo et al. | 2017
- 22
-
Developing Usable Interface for Internet of Things (IoT) Security Analysis SoftwareHong, Seokjun / Kim, Youngsun / Kim, Gerard J. et al. | 2017
- 23
-
Visualization Technologies of Information Security Support System Using Haptic DevicesIshihara, Manabu / Kanayama, Taiki et al. | 2017
- 24
-
Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care SystemsKammüller, Florian et al. | 2017
- 25
-
Sharing or Non-sharing Credentials: A Study of What Motivates People to Be Malicious InsidersNiihara, Koichi / Yamada, Michihiro / Kikuchi, Hiroaki et al. | 2017
- 26
-
An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting SystemNurse, Jason R. C. / Agrafiotis, Ioannis / Erola, Arnau / Bada, Maria / Roberts, Taylor / Williams, Meredydd / Goldsmith, Michael / Creese, Sadie et al. | 2017
- 27
-
Application of Work Domain Analysis for CybersecurityWang, Hao / Lau, Nathan / Gerdes, Ryan et al. | 2017
- 28
-
Using Human Factor Approaches to an Organisation’s Bring Your Own Device SchemeWard, Jodie / Dogan, Huseyin / Apeh, Edward / Mylonas, Alexios / Katos, Vasilios et al. | 2017
- 29
-
A Case Study: Heartbleed Vulnerability Management and Swedish MunicipalitiesWen, Shao-Fang / Kowalski, Stewart et al. | 2017
- 30
-
Usable Security Management for Network Access Rules of Critical InfrastructureYun, Jeong-Han / Choi, Seungoh / Kim, Woonyon / Kang, Hwasun / Kim, Sung-Woo et al. | 2017
- 31
-
Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?Buldas, Ahto / Saarepera, Märt et al. | 2017
- 32
-
Walking the Line: The Everyday Security Ties that BindColes-Kemp, Lizzie / Hansen, René Rydhof et al. | 2017
- 33
-
Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCIHinds, Joanne / Joinson, Adam et al. | 2017
- 34
-
Its Not All About the Money: Self-efficacy and Motivation in Defensive and Offensive Cyber Security ProfessionalsHodges, Duncan / Buckley, Oliver et al. | 2017
- 35
-
Behavioural Profiling in Cyber-Social SystemsPerno, Jason / Probst, Christian W. et al. | 2017
- 36
-
The Impact of Changing Technology on International Cybersecurity CurriculaRead, Huw / Sutherland, Iain / Xynos, Konstantinos / Drange, Tom / Sundt, Ernst et al. | 2017
- 37
-
Towards a Conceptualisation of Cloud (Cyber) CrimeWall, David S. et al. | 2017
- 38
-
How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime?Warren, Steve / Oxburgh, Gavin / Briggs, Pam / Wall, David et al. | 2017
- 39
-
Modelling Trust and Trust-Building Among IT-Security ProfessionalsWeissinger, Laurin B. et al. | 2017
- 40
-
Law Infringements in Social Live Streaming ServicesZimmer, Franziska / Fietkiewicz, Kaja J. / Stock, Wolfgang G. et al. | 2017
- 41
-
Privacy Decision-Making in the Digital Era: A Game Theoretic ReviewAnastasopoulou, Kallia / Kokolakis, Spyros / Andriotis, Panagiotis et al. | 2017
- 42
-
A Comparative Study of Android Users’ Privacy Preferences Under the Runtime Permission ModelAndriotis, Panagiotis / Li, Shancang / Spyridopoulos, Theodoros / Stringhini, Gianluca et al. | 2017
- 43
-
Communicability Evaluation of Privacy Settings on Facebook for AndroidBrito do Rêgo, Beatriz / Monteiro, Ingrid Teixeira / Sampaio, Andréia Libório et al. | 2017
- 44
-
Sharing the ‘Real Me’ – How Usage Motivation and Personality Relate to Privacy Protection Behavior on FacebookGerber, Nina / Gerber, Paul / Hernando, Maria et al. | 2017
- 45
-
Exploring Consumers’ Attitudes of Smart TV Related Privacy RisksGhiglieri, Marco / Volkamer, Melanie / Renaud, Karen et al. | 2017
- 46
-
Sharing Information with Web Services – A Mental Model Approach in the Context of Optional InformationKulyk, Oksana / Reinheimer, Benjamin Maximilian / Volkamer, Melanie et al. | 2017
- 47
-
Integrating a Practice Perspective to Privacy by DesignLentzsch, Christopher / Loser, Kai-Uwe / Degeling, Martin / Nolte, Alexander et al. | 2017
- 48
-
Detection and Auto-protection of Cache File Privacy Leakage for Mobile Social Networking Applications in AndroidLi, Hui / Liu, Wenling / Wang, Bin / Zhang, Wen et al. | 2017
- 49
-
A Privacy-Driven Data Management Model for Smart Personal AssistantsNogueira, Danilo M. / Maciel, Cristiano / Viterbo, José / Vecchiato, Daniel et al. | 2017
- 50
-
Designing Privacy for You: A Practical Approach for User-Centric PrivacySenarath, Awanthika / Arachchilage, Nalin A. G. / Slay, Jill et al. | 2017
- 51
-
Correction to: Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCIHinds, Joanne / Joinson, Adam et al. | 2017