{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:42:14Z","timestamp":1730259734896,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/icta.2015.7426873","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T17:06:31Z","timestamp":1459184791000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["Mobile app permissions awareness"],"prefix":"10.1109","author":[{"given":"Solomon","family":"Negash","sequence":"first","affiliation":[]},{"given":"Hossain","family":"Shahriar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"56","volume":"42","author":"allam","year":"2014","journal-title":"Smartphone information security awareness A victim of operational pressures"},{"key":"ref11","first-page":"183","volume":"27","author":"rasmussen","year":"1997","journal-title":"Risk management in a dynamic society a modellin Problem"},{"journal-title":"Cisco","year":"2015","key":"ref12"},{"key":"ref13","first-page":"3","volume":"28","author":"botha","year":"2009","journal-title":"From desktop to mobile examining the security experience"},{"key":"ref14","first-page":"332","volume":"17","author":"nicolaou","year":"2006","journal-title":"Perceived Information Quality in Data Exchanges Effects on Risk Trust and Intention to Use"},{"journal-title":"Before You Download That App","year":"2015","key":"ref4"},{"journal-title":"Spying on users' smartphone","year":"2015","key":"ref3"},{"journal-title":"Mobile Technology Fact Sheet","year":"2015","key":"ref6"},{"key":"ref5","first-page":"299","article-title":"It's like I trust it so much that I don't really check where it is I'm going before I leave","volume":"1","author":"bertel","year":"2013","journal-title":"Informational uses of smartphones among Danish youth Media & Communication"},{"journal-title":"Android Permissions User Attention Comprehension and Behavior","year":"2012","author":"felt","key":"ref8"},{"journal-title":"US Smartphone Use in 2015","year":"2015","key":"ref7"},{"journal-title":"App Permission Risk","year":"2015","key":"ref2"},{"journal-title":"Smartphone OS Market Share","year":"2015","key":"ref1"},{"key":"ref9","first-page":"47","volume":"34","author":"mylonas","year":"2013","journal-title":"Delegate the Smartphone User? Security Awareness in Smartphone Platforms"}],"event":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","start":{"date-parts":[[2015,12,21]]},"location":"Marrakech","end":{"date-parts":[[2015,12,23]]}},"container-title":["2015 5th International Conference on Information &amp; Communication Technology and Accessibility (ICTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7416367\/7426869\/07426873.pdf?arnumber=7426873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:51:05Z","timestamp":1489888265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7426873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icta.2015.7426873","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}