{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:18:30Z","timestamp":1743135510934,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_33","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"369-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Re-designing Permission Requirements to Encourage BYOD Policy Adherence"],"prefix":"10.1007","author":[{"given":"Lotus","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jeremiah D.","family":"Still","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"33_CR1","unstructured":"Akhawe, D., Felt, A.P.: Alice in Warningland: a large-scale field study of browser security warning effectiveness. In: Usenix Security, pp. 257\u2013272 (2013)"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Balebako, R., Marsh, A., Lin, J., Hong, J., Cranor, L.F.: The privacy and security behaviors of smartphone app developers. In: Workshop 2014 Usable Security Experiments (USEC) (2014)","DOI":"10.14722\/usec.2014.23006"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73\u201384 (2010)","DOI":"10.1145\/1866307.1866317"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Bohme, R., Kopsell, S.: Trained to accept? a field experiment on consent dialogs. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pp. 2403\u20132406 (2010)","DOI":"10.1145\/1753326.1753689"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Chia, P.H., Yamamoto, Y., Asokan, N.: Is this app safe? a large scale study on application permissions and risk signals. In: Proceedings of the 21st International Conference on World Wide Web, pp. 311\u2013320 (2012)","DOI":"10.1145\/2187836.2187879"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-40477-1_5","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"EK Choe","year":"2013","unstructured":"Choe, E.K., Jung, J., Lee, B., Fisher, K.: Nudging people away from privacy-invasive mobile apps through visual framing. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013, Part III. LNCS, vol. 8119, pp. 74\u201391. Springer, Heidelberg (2013)"},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1037\/0022-3514.36.5.463","volume":"36","author":"RB Cialdini","year":"1978","unstructured":"Cialdini, R.B., Cacioppo, J.T., Bassett, R., Miller, J.A.: Low-ball procedure for producing compliance: commitment then cost. J. Pers. Soc. Psychol. 36, 463\u2013476 (1978)","journal-title":"J. Pers. Soc. Psychol."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Egelman, S., Tsai, J., Cranor, L.F., Acquisti, A.: Timing is everything?: the effects of timing and placement of online privacy indicators. In: Proceedings of the Conference on Human Factors in Computing Systems, pp. 319\u2013328 (2009)","DOI":"10.1145\/1518701.1518752"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: Proceedings of the 18th on Computers and Communications Security, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Symposium on Usable Privacy and Security, pp. 1\u201314 (2012)","DOI":"10.1145\/2335356.2335360"},{"issue":"1","key":"33_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1207\/S15327566IJCE0401_04","volume":"4","author":"J-Y Jian","year":"2000","unstructured":"Jian, J.-Y., Bisantz, A.M., Drury, C.G.: Foundations for an empirically determined scale of trust in automated systems. Int. J. Cogn. Ergon. 4(1), 53\u201371 (2000)","journal-title":"Int. J. Cogn. Ergon."},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3758\/BF03197268","volume":"24","author":"J Jou","year":"1996","unstructured":"Jou, J., Shanteau, J., Harris, R.J.: An information processing view of framing effects: the role of causal schemas in decision making. Mem. Cogn. 24, 1\u201315 (1996)","journal-title":"Mem. Cogn."},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing application on an android smartphone. In: Conference of Financial Cyptography and Data Security, Workshop on Usable Security, pp. 1\u201312 (2012)","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app decision-making process. In: Proceedings of the 2013 ACM Annual Conference on Human Factors in Computing Systems, pp. 3393\u20133402 (2013)","DOI":"10.1145\/2470654.2466466"},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? security awareness in smartphone platforms. J. Comput. Secur. 34, 47\u201366 (2013)","journal-title":"J. Comput. Secur."},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Mylonas, A., Theoharidou, M., Gritzalis, D.: Assessing privacy risks in Android: a user-centric approach. In: Proceedings of the 1st International Workshop on Risk Assessment and Risk-Driven Testing, pp. 21\u201337 (2014)","DOI":"10.1007\/978-3-319-07076-6_2"},{"issue":"4","key":"33_CR17","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"SL Pfleeger","year":"2012","unstructured":"Pfleeger, S.L., Caputo, D.D.: Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31(4), 597\u2013611 (2012)","journal-title":"Comput. Secur."},{"key":"33_CR18","first-page":"1880","volume":"126","author":"DJ Solove","year":"2013","unstructured":"Solove, D.J.: Privacy self-management and the consent dilemma. Harv. Law Rev. 126, 1880\u20131903 (2013)","journal-title":"Harv. Law Rev."},{"key":"33_CR19","first-page":"247","volume-title":"Security and Usability: Designing Secure Systems that People can Use","author":"KP Yee","year":"2005","unstructured":"Yee, K.P.: Guidelines and strategies for secure interaction design. In: Russell, D. (ed.) Security and Usability: Designing Secure Systems that People can Use, pp. 247\u2013273. O\u2019Reilly Media Inc., Sebastopol (2005)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:18:53Z","timestamp":1583507933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}