共 27 条
[1]
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model
[J].
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017),
2017, 10292
:604-622
[2]
Permissions Snapshots: Assessing Users' Adaptation to the Android Runtime Permission Model
[J].
2016 8TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS 2016),
2016,
[3]
[Anonymous], 2017, 13 S US PRIV SEC SOU
[4]
[Anonymous], 2014, FACTORIAL SURVEY EXP
[5]
How Dangerous Permissions are Described in Android Apps' Privacy Policies?
[J].
11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018),
2018,
[6]
Benton Kevin, 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2013), P291
[7]
A Theory of Vagueness and Privacy Risk Perception
[J].
2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE),
2016,
:26-35
[8]
Cavanagh G F., 1985, Using vignettes in business ethics research
[9]
Engel U., 2014, Improving survey methods: Lessons from recent research
[10]
Felt A.P., 2012, P 8 S US PRIV SEC WA, P1, DOI [10.1145/2335356.2335360, DOI 10.1145/2335356.2335360]