{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:04:51Z","timestamp":1742911491288,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_13","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"168-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings"],"prefix":"10.1007","author":[{"given":"Haroon","family":"Elahi","sequence":"first","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1108\/IJPCC-04-2015-0020","volume":"11","author":"R Mueller","year":"2015","unstructured":"Mueller, R., Schrittwieser, S., Fruehwirt, P., Kieseberg, P., Weippl, E.: Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11, 132\u2013150 (2015). \n                  https:\/\/doi.org\/10.1108\/IJPCC-04-2015-0020","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Raval, N., Srivastava, A., Razeen, A., Lebeck, K., Machanavajjhala, A., Cox, L.P.: What you mark is what apps see. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys 2016, pp. 249\u2013261. ACM Press, New York (2016)","DOI":"10.1145\/2906388.2906405"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TC.2015.2470247","volume":"65","author":"Y Li","year":"2016","unstructured":"Li, Y., Dai, W., Ming, Z., Qiu, M.: Privacy protection for preventing data over-collection in smart city. IEEE Trans. Comput. 65, 1339\u20131350 (2016). \n                  https:\/\/doi.org\/10.1109\/TC.2015.2470247","journal-title":"IEEE Trans. Comput."},{"key":"13_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4951-5_1","volume-title":"Information Systems Development","author":"NK Taylor","year":"2013","unstructured":"Taylor, N.K., Papadopoulou, E., Gallacher, S., Williams, H.M.: Is there really a conflict between privacy and personalisation? In: Pooley, R., Coady, J., Schneider, C., Linger, H., Barry, C., Lang, M. (eds.) Information Systems Development. Springer, New York (2013). \n                  https:\/\/doi.org\/10.1007\/978-1-4614-4951-5_1"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1093\/ijlit\/eaw002","volume":"24","author":"D Wiese Schartum","year":"2016","unstructured":"Wiese Schartum, D.: Making privacy by design operative. Int. J. Law Inf. Technol. 24, 151\u2013175 (2016). \n                  https:\/\/doi.org\/10.1093\/ijlit\/eaw002","journal-title":"Int. J. Law Inf. Technol."},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-658-09508-6_5","volume-title":"The Value of Social Media for Predicting Stock Returns","author":"M Nofer","year":"2015","unstructured":"Nofer, M.: The economic impact of privacy violations and security breaches \u2013 a laboratory experiment. In: Nofer, M. (ed.) The Value of Social Media for Predicting Stock Returns, pp. 89\u2013108. Springer, Wiesbaden (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-658-09508-6_5"},{"key":"13_CR7","unstructured":"Solon, O.: A grand illusion: seven days that shattered Facebook\u2019s facade (2018). \n                  https:\/\/www.theguardian.com\/technology\/2018\/mar\/24\/cambridge-analytica-week-that-shattered-facebook-privacy"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Parker, F., Ophoff, J., Van Belle, J.-P., Karia, R.: Security awareness and adoption of security controls by smartphone users. In: 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), pp. 99\u2013104. IEEE (2015)","DOI":"10.1109\/InfoSec.2015.7435513"},{"key":"13_CR9","doi-asserted-by":"publisher","unstructured":"Zhu, J., Desai, B.C.: User agent and privacy compromise. In: Proceedings of the Eighth International C* Conference on Computer Science and Software Engineering - C3S2E 2015, pp. 38\u201345 (2008). \n                  https:\/\/doi.org\/10.1145\/2790798.2790803","DOI":"10.1145\/2790798.2790803"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47\u201366 (2013). \n                  https:\/\/doi.org\/10.1016\/j.cose.2012.11.004","journal-title":"Comput. Secur."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/mc.2016.184","volume":"49","author":"D Vecchiato","year":"2016","unstructured":"Vecchiato, D., Vieira, M., Martins, E.: The perils of android security configuration. Comput. (Long. Beach. Calif.) 49, 15\u201321 (2016). \n                  https:\/\/doi.org\/10.1109\/mc.2016.184","journal-title":"Comput. (Long. Beach. Calif.)"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2811257","volume":"22","author":"J Watson","year":"2015","unstructured":"Watson, J., Lipford, H.R., Besmer, A.: Mapping user preference to privacy default settings. ACM Trans. Comput. Interact. 22, 20 (2015). \n                  https:\/\/doi.org\/10.1145\/2811257","journal-title":"ACM Trans. Comput. Interact."},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Vecchiato, D., Vieira, M., Martins, E.: A security configuration assessment for android devices. In: Proceedings of the 30th Annual Symposium on Applied Computing - SAC 2015, pp. 2299\u20132304 (2015). \n                  https:\/\/doi.org\/10.1145\/2695664.2695679","DOI":"10.1145\/2695664.2695679"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-17016-9_6","volume-title":"Data privacy management, autonomous spontaneous security, and security assurance","author":"M Tschersich","year":"2015","unstructured":"Tschersich, M.: Configuration behavior of restrictive default privacy settings on social network sites. In: Garcia-Alfaro, J., et al. (eds.) DPM\/QASA\/SETOP - 2014. LNCS, vol. 8872, pp. 77\u201394. Springer, Cham (2015). \n                  https:\/\/doi.org\/10.1007\/978-3-319-17016-9_6"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.chb.2017.08.035","volume":"77","author":"L Dogruel","year":"2017","unstructured":"Dogruel, L., Joeckel, S., Vitak, J.: The valuation of privacy premium features for smartphone apps: the influence of defaults and expert recommendations. Comput. Human Behav. 77, 230\u2013239 (2017). \n                  https:\/\/doi.org\/10.1016\/j.chb.2017.08.035","journal-title":"Comput. Human Behav."},{"key":"13_CR16","unstructured":"Hossain, A.A., Zhang, W.: Privacy and security concern of online social networks from user perspective. In: ICISSP 2015 - International Conference on Information Systems Security and Privacy, Proceedings, pp. 246\u2013253. IEEE, Angers (2015)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J.I., Zhang, J.: Expectation and purpose\u202f: understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp 2012, p. 501. ACM Press, New York (2012)","DOI":"10.1145\/2370216.2370290"},{"key":"13_CR18","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-54433-5_4","volume-title":"Information Systems Security and Privacy","author":"T Nakamura","year":"2017","unstructured":"Nakamura, T., Kiyomoto, S., Tesfay, W.B., Serna, J.: Easing the burden of setting privacy preferences: a machine learning approach. In: Camp, O., Furnell, S., Mori, P. (eds.) ICISSP 2016. CCIS, vol. 691, pp. 44\u201363. Springer, Cham (2017). \n                  https:\/\/doi.org\/10.1007\/978-3-319-54433-5_4"},{"key":"13_CR19","doi-asserted-by":"publisher","unstructured":"Jose, S.: Privacy-enhancing of user\u2019s behaviour toward privacy settings in social networking sites. In: CHI Extended Abstract on Human Factors in Computing System, pp. 2758\u20132765 (2016). \n                  https:\/\/doi.org\/10.1145\/2851581.2892508","DOI":"10.1145\/2851581.2892508"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1080\/13691180802109097","volume":"11","author":"RC Shah","year":"2008","unstructured":"Shah, R.C., Kesan, J.P.: Setting online policy with software defaults. Inf. Commun. Soc. 11, 989\u20131007 (2008). \n                  https:\/\/doi.org\/10.1080\/13691180802109097","journal-title":"Inf. Commun. Soc."},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.clsr.2014.07.008","volume":"30","author":"Y Liu","year":"2014","unstructured":"Liu, Y.: User control of personal information concerning mobile-app: notice and consent? Comput. Law Secur. Rev. 30, 521\u2013529 (2014). \n                  https:\/\/doi.org\/10.1016\/j.clsr.2014.07.008","journal-title":"Comput. Law Secur. Rev."},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347, 509\u2013514 (2015). \n                  https:\/\/doi.org\/10.1126\/science.aaa1465","journal-title":"Science"},{"key":"13_CR23","unstructured":"Lin, J., Sadeh, N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In: Tenth Symposium on Usable Privacy and Security (SOUPS) 2014, pp. 199\u2013212. USENIX Association, Menlo Park (2014)"},{"key":"13_CR24","doi-asserted-by":"publisher","unstructured":"Reinhardt, D., Engelmann, F., Hollick, M.: Can i help you setting your privacy? A survey-based exploration of users\u2019 attitudes towards privacy suggestions. In: Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, pp. 347\u2013356. ACM (2015). \n                  https:\/\/doi.org\/10.1145\/2837126.2837130","DOI":"10.1145\/2837126.2837130"},{"key":"13_CR25","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-39498-0_10","volume-title":"The Economics of Information Security and Privacy","author":"S Egelman","year":"2013","unstructured":"Egelman, S., Felt, A.P., Wagner, D.: Choice architecture and smartphone privacy: there\u2019s a price for that. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy, pp. 211\u2013236. Springer, Heidelberg (2013). \n                  https:\/\/doi.org\/10.1007\/978-3-642-39498-0_10"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Wang, N., Wisniewski, P., Xu, H., Grossklags, J.: Designing the default privacy settings for Facebook applications. In: Proceedings of the Companion Publication of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW Companion 2014, pp. 249\u2013252. ACM Press, New York (2014)","DOI":"10.1145\/2556420.2556495"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.15779\/Z384K33","volume":"30","author":"JR Reidenberg","year":"2014","unstructured":"Reidenberg, J.R., et al.: Disagreeable privacy policies: mismatches between meaning and users\u2019 understanding. Berkeley Technol. Law J. 30, 39\u201388 (2014). \n                  https:\/\/doi.org\/10.15779\/Z384K33","journal-title":"Berkeley Technol. Law J."},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1108\/ICS-10-2014-0071","volume":"23","author":"M Tsavli","year":"2015","unstructured":"Tsavli, M., Efraimidis, P.S., Katos, V., Mitrou, L.: Reengineering the user: privacy concerns about personal data on smartphones. Inf. Comput. Secur. 23, 394\u2013405 (2015). \n                  https:\/\/doi.org\/10.1108\/ICS-10-2014-0071","journal-title":"Inf. Comput. Secur."},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Chen, J., Gates, C.S., Li, N., Proctor, R.W., Yu, T.: Dimensions of risk in mobile applications. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy - CODASPY 2015, pp. 49\u201360. ACM Press, New York (2015)","DOI":"10.1145\/2699026.2699108"},{"key":"13_CR30","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1016\/j.clsr.2015.08.006","volume":"31","author":"Z Wang","year":"2015","unstructured":"Wang, Z., Yu, Q.: Privacy trust crisis of personal data in China in the era of big data: the survey and countermeasures. Comput. Law Secur. Rev. 31, 782\u2013792 (2015). \n                  https:\/\/doi.org\/10.1016\/j.clsr.2015.08.006","journal-title":"Comput. Law Secur. Rev."},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Jonassen, D., Strobel, J., Lee, C.: Everyday Problem Solving in Engineering\u202f: Lessons for Engineering Educators (2006)","DOI":"10.1002\/j.2168-9830.2006.tb00885.x"},{"key":"13_CR32","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1046\/j.0963-7214.2003.01267.x","volume":"12","author":"J Feldman","year":"2010","unstructured":"Feldman, J.: The simplicity principle concept learning in human. Psychol. Sci. 12, 227\u2013232 (2010). \n                  https:\/\/doi.org\/10.1046\/j.0963-7214.2003.01267.x","journal-title":"Psychol. Sci."},{"key":"13_CR33","doi-asserted-by":"publisher","unstructured":"Buchan, J., Bano, M., Zowghi, D., MacDonell, S., Shinde, A.: Alignment of stakeholder expectations about user involvement in agile software development. In: Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering \u2013 EASE 2017, pp. 334\u2013343 (2017). \n                  https:\/\/doi.org\/10.1145\/3084226.3084251","DOI":"10.1145\/3084226.3084251"},{"key":"13_CR34","doi-asserted-by":"publisher","unstructured":"Taylor, V.F., Martinovic, I.: DEMO: starving permission-Hungry Android apps using SecuRank. In: Proceedings of the ACM Conference on Computer and Communications Security, 24\u201328 October, pp. 1850\u20131852 (2016). \n                  https:\/\/doi.org\/10.1145\/2976749.2989032","DOI":"10.1145\/2976749.2989032"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Balebako, R., Marsh, A., Lin, J., Hong, J., Faith Cranor, L.: The privacy and security behaviors of smartphone app developers. In: Proceedings 2014 Workshop on Usable Security (2014)","DOI":"10.14722\/usec.2014.23006"},{"key":"13_CR36","doi-asserted-by":"publisher","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security &amp; privacy decisions. In: Proceedings of the 32nd Annual ACM Conference on Human Factors Computing Systems - CHI 2014, pp. 2647\u20132656 (2014). \n                  https:\/\/doi.org\/10.1145\/2556288.2556978","DOI":"10.1145\/2556288.2556978"},{"key":"13_CR37","doi-asserted-by":"publisher","first-page":"223","DOI":"10.2307\/1122704","volume":"86","author":"JR Macey","year":"1986","unstructured":"Macey, J.R.: Promoting public-regarding legislation through statutory interpretation: an interest group model. Columbia Law Rev. Assoc. 86, 223\u2013268 (1986)","journal-title":"Columbia Law Rev. Assoc."},{"key":"13_CR38","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1016\/j.jnca.2005.12.008","volume":"30","author":"MJ O\u2019Grady","year":"2007","unstructured":"O\u2019Grady, M.J., O\u2019Hare, G.M.P., Donaghey, C.: Delivering adaptivity through context-awareness. J. Netw. Comput. Appl. 30, 1007\u20131033 (2007). \n                  https:\/\/doi.org\/10.1016\/j.jnca.2005.12.008","journal-title":"J. Netw. Comput. Appl."},{"key":"13_CR39","doi-asserted-by":"publisher","unstructured":"Baarslag, T., et al.: Negotiation as an interaction mechanism for deciding app permissions. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems - CHI EA 2016, pp. 2012\u20132019 (2016). \n                  https:\/\/doi.org\/10.1145\/2851581.2892340","DOI":"10.1145\/2851581.2892340"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:51:15Z","timestamp":1558396275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}