LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Kulyk, Oksana; Gerber, Paul; El Hanafi, Michael; Reinheimer, Benjamin; Renaud, Karen; Volkamer, Melanie (2016)
Languages: English
Types: Other
Subjects:

Classified by OpenAIRE into

ACM Ref: ComputingMilieux_COMPUTERSANDSOCIETY, GeneralLiterature_MISCELLANEOUS
Smartphone apps can harvest very personal details\ud from the phone with ease. This is a particular privacy concern.\ud Unthinking installation of untrustworthy apps constitutes risky\ud behaviour. This could be due to poor awareness or a lack of knowhow:\ud knowledge of how to go about protecting privacy. It seems\ud that Smartphone owners proceed with installation, ignoring any\ud misgivings they might have, and thereby irretrievably sacrifice\ud their privacy.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen, “Little brothers watching you: Raising awareness of data leaks on smartphones,” in Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, 2013, p. 12.
    • [2] K. Benton, L. J. Camp, and V. Garg, “Studying the effectiveness of android application permissions requests,” in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on. IEEE, 2013, pp. 291-296.
    • [3] Bundesamt fu¨r Sicherheit in der Informationstechnik, “ U¨berblickspapier Android,” accessed 18.12.2015. [Online]. Available: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/ Grundschutz/Download/Ueberblickspapier Android pdf --, “ U¨berblickspapier Apple iOS,” https://www.bsi.bund.
    • de/SharedDocs/Downloads/DE/BSI/Grundschutz/Download/ Ueberblickspapier Apple iOS pdf, accessed 18.12.2015.
    • [5] E. Chin, A. P. Felt, V. Sekar, and D. Wagner, “Measuring user confidence in smartphone security and privacy,” in Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012, p. 1.
    • [6] A. P. Felt, S. Egelman, and D. Wagner, “I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns,” in Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 2012, pp. 33-44.
    • [7] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android permissions: User attention, comprehension, and behavior,” in Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012, p. 3.
    • [8] P. Gerber, M. Volkamer, and K. Renaud, “Usability versus privacy instead of usable privacy: Google's balancing act between usability and privacy,” ACM SIGCAS Computers and Society, vol. 45, no. 1, pp. 16- 21, 2015.
    • [9] I. Ion, R. Reeder, and S. Consolvo, “... no one can hack my mind: Comparing expert and non-expert security practices,” in Symposium on Usable Privacy and Security (SOUPS), 2015, pp. 327-346.
    • [10] R. Kang, L. Dabbish, N. Fruchter, and S. Kiesler, “my data just goes everywhere: user mental models of the internet and implications for privacy and security,” in Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015, pp. 39-52.
    • [11] Kaspersky Lab, “Smartphone security,” accessed 18.12.2015. [Online]. Available: http://www.kaspersky.com/internet-security-center/ internet-safety/smartphones
    • [12] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall, “A conundrum of permissions: installing applications on an android smartphone,” in Financial Cryptography and Data Security. Springer, 2012, pp. 68-79.
    • [13] L. Kraus, T. Fiebig, V. Miruchna, S. Mo¨ller, and A. Shabtai, “Analyzing end-users knowledge and feelings surrounding smartphone security and privacy.”
    • [14] A. Lazou and G. Weir, “Perceived risk and sensitive data on mobile devices,” in Cyberforensics: Issue and Perspectives. University of Strathclyde, 2011.
    • [15] I. Muslukhov, Y. Boshmaf, C. Kuo, J. Lester, and K. Beznosov, “Understanding users' requirements for data protection in smartphones,” in Data Engineering Workshops (ICDEW), 2012 IEEE 28th International Conference on. IEEE, 2012, pp. 228-235.
    • [16] D. L. Schacter, The seven sins of memory: How the mind forgets and remembers. Houghton Mifflin Harcourt, 2002.
    • [17] M. Volkamer, K. Renaud, O. Kulyk, and S. Emero¨z, “A socio-technical investigation into smartphone security,” in Security and Trust Management. Springer, 2015, pp. 265-273.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article