{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:06Z","timestamp":1740099126563,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983844"},{"type":"electronic","value":"9783319983851"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_2","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:47:49Z","timestamp":1532562469000},"page":"9-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Inquiry into Perception and Usage of Smartphone Permission Models"],"prefix":"10.1007","author":[{"given":"Lena","family":"Reinfelder","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Schankin","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Russ","sequence":"additional","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., et al.: Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787\u2013796. ACM (2015)","DOI":"10.1145\/2702123.2702210"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Andriotis, P., Sasse, M.A., Stringhini, G.: Permissions snapshots: assessing users\u2019 adaptation to the android runtime permission model. In: IEEE International Workshop on Information Forensics and Security (WIFS) (2016)","DOI":"10.1109\/WIFS.2016.7823922"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Benton, K., Camp, L.J., Garg, V.: Studying the effectiveness of android application permissions requests. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 291\u2013296, March 2013","DOI":"10.1109\/PerComW.2013.6529497"},{"key":"2_CR4","unstructured":"Bonn\u00e9, B., Peddinti, S.T., Bilogrevic, I., Taft, N.: Exploring decision making with android\u2019s runtime permission dialogs using in-context surveys. USENIX Association (2017)"},{"key":"2_CR5","first-page":"20","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences, pp. 20\u201326. Lawrence Earlbaum Associates, Hillsdale (1988)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS 2012, pp. 3:1\u20133:14. ACM, New York (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security & privacy decisions. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2647\u20132656. ACM (2014)","DOI":"10.1145\/2556288.2556978"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Jung, J., Han, S., Wetherall, D.: Short paper: enhancing mobile application permissions with runtime feedback and constraints. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 45\u201350. ACM (2012)","DOI":"10.1145\/2381934.2381944"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-34638-5_6","volume-title":"Financial Cryptography and Data Security","author":"PG Kelley","year":"2012","unstructured":"Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an Android smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 68\u201379. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-34638-5_6"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app decision-making process. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 3393\u20133402. ACM, New York (2013)","DOI":"10.1145\/2470654.2466466"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kraus, L., Wechsung, I., M\u00f6ller, S.: Using statistical information to communicate android permission risks to users. In: 2014 Workshop on Socio-Technical Aspects in Security and Trust, pp. 48\u201355, July 2014","DOI":"10.1109\/STAST.2014.15"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Micinski, K., Votipka, D., Stevens, R., Kofinas, N., Mazurek, M.L., Foster, J.S.: User interactions and permission use on android. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 362\u2013373. ACM (2017)","DOI":"10.1145\/3025453.3025706"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Tan, J., et al.: The effect of developer-specified explanations for permission requests on smartphone user behavior. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 91\u2013100. ACM (2014)","DOI":"10.1145\/2556288.2557400"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Thompson, C., Johnson, M., Egelman, S., Wagner, D., King, J.: When it\u2019s better to ask forgiveness than get permission: attribution mechanisms for smartphone resources. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 1. ACM (2013)","DOI":"10.1145\/2501604.2501605"},{"key":"2_CR15","unstructured":"Tsai, L., et al.: Turtle Guard: helping android users apply contextual privacy preferences. In: Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"2_CR16","unstructured":"Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., Beznosov, K.: Android permissions Remystified: a field study on contextual integrity. In: Proceedings of the 24th USENIX Conference on Security Symposium, SEC 2015, pp. 499\u2013514. USENIX Association, Berkeley (2015)"},{"key":"2_CR17","unstructured":"Zawacki-Richter, O., Hohlfeld, G., M\u00fcskens, W.: Mediennutzung im studium. Schriftenreihe zum Bildungs-und Wissenschaftsmanagement 1(1) (2014)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:49:01Z","timestamp":1532562541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}