{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T21:15:24Z","timestamp":1762809324220,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031171390"},{"type":"electronic","value":"9783031171406"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17140-6_8","type":"book-chapter","created":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T06:19:49Z","timestamp":1664000389000},"page":"153-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Enhancing User Privacy in\u00a0Mobile Devices Through Prediction of\u00a0Privacy Preferences"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2077-7223","authenticated-orcid":false,"given":"Ricardo","family":"Mendes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8920-8128","authenticated-orcid":false,"given":"Mariana","family":"Cunha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5805-1351","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0818-6535","authenticated-orcid":false,"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,25]]},"reference":[{"issue":"6221","key":"8_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013515 (2015)","journal-title":"Science"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., et al.: Your location has been shared 5,398 times!: a field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787\u2013796. ACM (2015)","DOI":"10.1145\/2702123.2702210"},{"key":"8_CR3","first-page":"31","volume":"40","author":"P Andriotis","year":"2018","unstructured":"Andriotis, P., Stringhini, G., Sasse, M.A.: Studying users\u2019 adaptation to Android\u2019s run-time fine-grained access control system. J. Inf. Secur. Appl. 40, 31\u201343 (2018)","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Balebako, R., Jung, J., Lu, W., Cranor, L.F., Nguyen, C.: Little brothers watching you: raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security\u2013SOUPS 2013, p. 1 (2013)","DOI":"10.1145\/2501604.2501616"},{"key":"8_CR5","unstructured":"Bonn\u00e9, B., Peddinti, S.T., Bilogrevic, I., Taft, N.: Exploring decision making with android\u2019s runtime permission dialogs using in-context surveys. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 195\u2013210. USENIX Association, Santa Clara, CA (2017)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Brand\u00e3o, A., Mendes, R., Vilela, J.P.: Prediction of mobile app privacy preferences with user profiles via federated learning. In: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy, pp. 89\u2013100 (2022)","DOI":"10.1145\/3508398.3511526"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012). Association for Computing Machinery, New York, NY, USA (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 68\u201379. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34638-5_6","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"8_CR9","unstructured":"Lin, J., Liu, B., Sadeh, N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 199\u2013212. USENIX Association, Menlo Park, CA (2014)"},{"key":"8_CR10","unstructured":"Liu, B., Andersen, M.S., Schaub, F., Almuhimedi, H., Zhang, S., Sadeh, N., Acquisti, A., Agarwal, Y.: Follow my recommendations: A personalized privacy assistant for mobile app permissions. In: Symposium on Usable Privacy and Security (2016)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Liu, B., Lin, J., Sadeh, N.: Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In: Proceedings of the 23rd International Conference on World Wide Web\u2013WWW 2014, pp. 201\u2013212 (2014)","DOI":"10.1145\/2566486.2568035"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Mendes, R., Brand\u00e3o, A., Vilela, J.P., Beresford, A.R.: Effect of user expectation on mobile app privacy: a field study. In: 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 207\u2013214 (2022)","DOI":"10.1109\/PerCom53586.2022.9762379"},{"key":"8_CR13","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. L. Rev. 79, 119 (2004)","journal-title":"Wash. L. Rev."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Olejnik, K., Dacosta, I., Machado, J.S., Huguenin, K., Khan, M.E., Hubaux, J.P.: SmarPer: context-aware and automatic runtime-permissions for mobile devices. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 1058\u20131076. IEEE (2017)","DOI":"10.1109\/SP.2017.25"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03168-7_1","volume-title":"Privacy Enhancing Technologies","author":"R Ravichandran","year":"2009","unstructured":"Ravichandran, R., Benisch, M., Kelley, P.G., Sadeh, N.M.: Capturing social networking privacy preferences. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 1\u201318. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_1"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Sanchez, O.R., Torre, I., He, Y., Knijnenburg, B.P.: A recommendation approach for user privacy preferences in the fitness domain. User Model. User-Adapted Interact. 30(3), 513\u2013565 (2020)","DOI":"10.1007\/s11257-019-09246-3"},{"key":"8_CR17","unstructured":"Shen, B., et al.: Can systems explain permissions better? Understanding users\u2019 misperceptions under smartphone runtime permission model. In: 30th USENIX Security Symposium (USENIX Security 21) (2021)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Shklovski, I., Mainwaring, S.D., Sk\u00falad\u00f3ttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2347\u20132356. ACM (2014)","DOI":"10.1145\/2556288.2557421"},{"key":"8_CR19","unstructured":"Tsai, L., et al.: Turtle guard: helping android users apply contextual privacy preferences. In: Symposium on Usable Privacy and Security (SOUPS) 2017 (Soups) (2017)"},{"key":"8_CR20","unstructured":"Union, E.: Regulation (eu) 2016\/679 of the european parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation). Off. J. L110 59, 1\u201388 (2016)"},{"key":"8_CR21","unstructured":"Votipka, D., Rabin, S.M., Micinski, K., Gilray, T., Mazurek, M.L., Foster, J.S.: User comfort with android background resource accesses in different contexts. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 235\u2013250 (2018)"},{"key":"8_CR22","unstructured":"Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D., Beznosov, K.: Android permissions remystified: a field study on contextual integrity. In: USENIX Security, vol. 15 (2015)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Wijesekera, P., et al.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences. In: Proceedings\u2013IEEE Symposium on Security and Privacy, pp. 1077\u20131093 (2017)","DOI":"10.1109\/SP.2017.51"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Wijesekera, P., et al.: Contextualizing privacy decisions for better prediction (and protection). In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 268:1\u2013268:13. CHI 2018, ACM, New York, NY, USA (2018)","DOI":"10.1145\/3173574.3173842"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17140-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T06:22:05Z","timestamp":1664000525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17140-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171390","9783031171406"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17140-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}