iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3025453.3025556
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:00:16Z","timestamp":1730318416423,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T00:00:00Z","timestamp":1525219200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1639994"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EPSRC","award":["EP\/J017728\/2"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025556","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"5208-5220","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Better the Devil You Know"],"prefix":"10.1145","author":[{"given":"Max","family":"Van Kleek","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford,Oxfordshire, United Kingdom"}]},{"given":"Ilaria","family":"Liccardi","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Reuben","family":"Binns","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxfod, Oxfordshire, United Kingdom"}]},{"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford,Oxfordshire, United Kingdom"}]},{"given":"Daniel J.","family":"Weitzner","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"volume-title":"Essential Readings in Economics","author":"Akerlof George","key":"e_1_3_2_2_1_1","unstructured":"George Akerlof . 1995. The market for \"lemons\": Quality uncertainty and the market mechanism . In Essential Readings in Economics . Springer , 175--188. George Akerlof. 1995. The market for \"lemons\": Quality uncertainty and the market mechanism. In Essential Readings in Economics. Springer, 175--188."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732701"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"volume-title":"Proceedings of Workshop on Persuasion, Nudge, Influence and Coercion.","year":"2011","author":"Balebako Rebecca","key":"e_1_3_2_2_7_1","unstructured":"Rebecca Balebako , Pedro G Leon , Hazim Almuhimedi , Patrick Gage Kelley , Jonathan Mugan , Alessandro Acquisti , Lorrie Faith Cranor , and Norman Sadeh . 2011 . Nudging users towards privacy on mobile devices . In Proceedings of Workshop on Persuasion, Nudge, Influence and Coercion. Rebecca Balebako, Pedro G Leon, Hazim Almuhimedi, Patrick Gage Kelley, Jonathan Mugan, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2011. Nudging users towards privacy on mobile devices. In Proceedings of Workshop on Persuasion, Nudge, Influence and Coercion."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2011.6112328"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"volume-title":"Privacy and Data Management on Mobile Devices. Pew's Report: Mobile Identity (September 5th","year":"2012","author":"Boyles Jan Lauren","key":"e_1_3_2_2_11_1","unstructured":"Jan Lauren Boyles , Aaron Smith , and Mary Madden . 2012. Privacy and Data Management on Mobile Devices. Pew's Report: Mobile Identity (September 5th 2012 ), 1--19. Jan Lauren Boyles, Aaron Smith, and Mary Madden. 2012. Privacy and Data Management on Mobile Devices. Pew's Report: Mobile Identity (September 5th 2012), 1--19."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iws024"},{"key":"e_1_3_2_2_14_1","unstructured":"A Cortesi and M Hils. 2013. mitmproxy: a man-in-the-middle proxy. (2013). A Cortesi and M Hils. 2013. mitmproxy: a man-in-the-middle proxy. (2013)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125890"},{"key":"e_1_3_2_2_16_1","unstructured":"Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183. Manuel Egele Christopher Kruegel Engin Kirda and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications.. In NDSS. 177--183."},{"volume-title":"Adrienne Porter Felt, and David Wagner","year":"2013","author":"Egelman Serge","key":"e_1_3_2_2_17_1","unstructured":"Serge Egelman , Adrienne Porter Felt, and David Wagner . 2013 . Choice architecture and smartphone privacy: There'sa price for that. In The economics of information security and privacy. Springer , 211--236. Serge Egelman, Adrienne Porter Felt, and David Wagner. 2013. Choice architecture and smartphone privacy: There'sa price for that. In The economics of information security and privacy. Springer, 211--236."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Chris Evans Chris Palmer and Ryan Sleevi. 2015. Public key pinning extension for HTTP. RFC 7469. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc7469 Chris Evans Chris Palmer and Ryan Sleevi. 2015. Public key pinning extension for HTTP. RFC 7469. RFC Editor. https:\/\/tools.ietf.org\/html\/rfc7469","DOI":"10.17487\/RFC7469"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_2_22_1","unstructured":"Electronic Frontier Foundation. 2016. Coders' Rights Project Reverse Engineering FAQ. (2016). https: \/\/www.eff.org\/issues\/coders\/reverse-engineering-faq Electronic Frontier Foundation. 2016. Coders' Rights Project Reverse Engineering FAQ. (2016). https: \/\/www.eff.org\/issues\/coders\/reverse-engineering-faq"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23044"},{"volume-title":"An analysis of the principal-agent problem. Econometrica: Journal of the Econometric Society","year":"1983","author":"Grossman Sanford J","key":"e_1_3_2_2_24_1","unstructured":"Sanford J Grossman and Oliver D Hart . 1983. An analysis of the principal-agent problem. Econometrica: Journal of the Econometric Society ( 1983 ), 7--45. Sanford J Grossman and Oliver D Hart. 1983. An analysis of the principal-agent problem. Econometrica: Journal of the Econometric Society (1983), 7--45."},{"volume-title":"Data-Driven Privacy Indicators. In Symposium on Usable Privacy and Security. USENIX Association.","year":"2016","author":"Harkous Hamza","key":"e_1_3_2_2_25_1","unstructured":"Hamza Harkous , Rameez Rahman , and Karl Aberer . 2016 . Data-Driven Privacy Indicators. In Symposium on Usable Privacy and Security. USENIX Association. Hamza Harkous, Rameez Rahman, and Karl Aberer. 2016. Data-Driven Privacy Indicators. In Symposium on Usable Privacy and Security. USENIX Association."},{"volume-title":"Proceedings of Symposium On Usable Privacy and Security. 39--52","year":"2015","author":"Kang Ruogu","key":"e_1_3_2_2_26_1","unstructured":"Ruogu Kang , Laura Dabbish , Nathaniel Fruchter , and Sara Kiesler . 2015 . \" My Data Just Goes Everywhere:\" User Mental Models of the Internet and Implications for Privacy and Security . In Proceedings of Symposium On Usable Privacy and Security. 39--52 . Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My Data Just Goes Everywhere:\" User Mental Models of the Internet and Implications for Privacy and Security. In Proceedings of Symposium On Usable Privacy and Security. 39--52."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"volume-title":"How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. Smartphones and Privacy Expectations","year":"2012","author":"King Jennifer","key":"e_1_3_2_2_29_1","unstructured":"Jennifer King . 2012. How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. Smartphones and Privacy Expectations ( 2012 ). Jennifer King. 2012. How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. Smartphones and Privacy Expectations (2012)."},{"volume-title":"Proceedings of the Symposium on Usable Privacy and Security.","year":"2015","author":"Leon Pedro Giovanni","key":"e_1_3_2_2_30_1","unstructured":"Pedro Giovanni Leon , Ashwini Rao , Florian Schaub , Abigail Marsh , Lorrie Faith Cranor , and Norman Sadeh . 2015 . Privacy and Behavioral Advertising: Towards Meeting Users' Preferences . In Proceedings of the Symposium on Usable Privacy and Security. Pedro Giovanni Leon, Ashwini Rao, Florian Schaub, Abigail Marsh, Lorrie Faith Cranor, and Norman Sadeh. 2015. Privacy and Behavioral Advertising: Towards Meeting Users' Preferences. In Proceedings of the Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i2.630"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobiquitous.2014.258066"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"volume-title":"Symposium On Usable Privacy and Security. 199--212","year":"2014","author":"Lin Jialiu","key":"e_1_3_2_2_35_1","unstructured":"Jialiu Lin , Bin Liu , Norman Sadeh , and Jason I Hong . 2014 . Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings . In Symposium On Usable Privacy and Security. 199--212 . Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I Hong. 2014. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium On Usable Privacy and Security. 199--212."},{"volume-title":"Proceedings of the Symposium on Usable Privacy and Security.","year":"2016","author":"Liu Bin","key":"e_1_3_2_2_36_1","unstructured":"Bin Liu , Mads Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun Aerin Zhang , Norman Sadeh , Yuvraj Agarwal , and Alessandro Acquisti . 2016 . Follow My Recommendations: A Personalized Assistant for Mobile App Permissions . In Proceedings of the Symposium on Usable Privacy and Security. Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Assistant for Mobile App Permissions. In Proceedings of the Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2016.1153012"},{"key":"e_1_3_2_2_38_1","first-page":"41","article-title":"What Do We Worry About When We Worry About Price Discrimination? The Law and Ethics of Using Personal Information for Pricing","volume":"19","author":"Miller Akiva A","year":"2014","unstructured":"Akiva A Miller . 2014 . What Do We Worry About When We Worry About Price Discrimination? The Law and Ethics of Using Personal Information for Pricing . Journal of Technology Law & Policy 19 (2014), 41 . Akiva A Miller. 2014. What Do We Worry About When We Worry About Price Discrimination? The Law and Ethics of Using Personal Information for Pricing. Journal of Technology Law & Policy 19 (2014), 41.","journal-title":"Journal of Technology Law & Policy"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/572020.572033"},{"volume-title":"App Permissions in the Google Play Store","year":"2015","author":"Olmstead Kenneth","key":"e_1_3_2_2_40_1","unstructured":"Kenneth Olmstead and Michelle Atkinson . 2015. App Permissions in the Google Play Store : Chapter 1: The Majority of Smartphone Owners Download Apps. Pew's Report: Numbers , fact and Trends Shaping the world (November 19th 2015 ), 1--19. Kenneth Olmstead and Michelle Atkinson. 2015. App Permissions in the Google Play Store: Chapter 1: The Majority of Smartphone Owners Download Apps. Pew's Report: Numbers, fact and Trends Shaping the world (November 19th 2015), 1--19."},{"key":"e_1_3_2_2_41_1","unstructured":"TNS Opinion. 2015. Special Eurobarometer 431 Data protection. (2015). http:\/\/ec.europa.eu\/public_opinion\/ archives\/eb_special_439_420_en.htm#431 TNS Opinion. 2015. Special Eurobarometer 431 Data protection. (2015). http:\/\/ec.europa.eu\/public_opinion\/ archives\/eb_special_439_420_en.htm#431"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_2_43_1","unstructured":"Jeremy Pounder. 2015. For what it's worth - the future of personalised pricing. (2015). Jeremy Pounder. 2015. For what it's worth - the future of personalised pricing. (2015)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249466"},{"key":"e_1_3_2_2_45_1","unstructured":"Ashwini Rao Florian Schaub Norman Sadeh Alessandro Acquisti and Ruogu Kang. Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online. Ashwini Rao Florian Schaub Norman Sadeh Alessandro Acquisti and Ruogu Kang. Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2938559.2938563"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702404"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_2_49_1","unstructured":"Statistica. 2016. Number of smartphone users in the United States from 2010 to 2019 (in millions). (2016). http:\/\/www.statista.com\/statistics\/201182\/ forecast-of-smartphone-users-in-the-us\/ Statistica. 2016. Number of smartphone users in the United States from 2010 to 2019 (in millions). (2016). http:\/\/www.statista.com\/statistics\/201182\/ forecast-of-smartphone-users-in-the-us\/"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819992"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785845"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811257"},{"volume-title":"Who knows what about me? A survey of behind the scenes personal data sharing to third parties by mobile apps. Proceeding of Technology Science","year":"2015","author":"Zang Jinyan","key":"e_1_3_2_2_54_1","unstructured":"Jinyan Zang , Krysta Dummit , James Graves , Paul Lisker , and Latanya Sweeney . 2015. Who knows what about me? A survey of behind the scenes personal data sharing to third parties by mobile apps. Proceeding of Technology Science ( 2015 ). Jinyan Zang, Krysta Dummit, James Graves, Paul Lisker, and Latanya Sweeney. 2015. Who knows what about me? A survey of behind the scenes personal data sharing to third parties by mobile apps. Proceeding of Technology Science (2015)."},{"volume-title":"Improving privacy protection in the area of behavioural targeting. SSRN 2654213","year":"2015","author":"Zuiderveen Borgesius Frederik J","key":"e_1_3_2_2_55_1","unstructured":"Frederik J Zuiderveen Borgesius . 2015. Improving privacy protection in the area of behavioural targeting. SSRN 2654213 ( 2015 ). Frederik J Zuiderveen Borgesius. 2015. Improving privacy protection in the area of behavioural targeting. SSRN 2654213 (2015)."}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Denver Colorado USA","acronym":"CHI '17"},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025556","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:40:43Z","timestamp":1673138443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025556"}},"subtitle":["Exposing the Data Sharing Practices of Smartphone Apps"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":55,"alternative-id":["10.1145\/3025453.3025556","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025556","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}