{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:31:19Z","timestamp":1725741079547},"reference-count":7,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iisa.2017.8316392","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T16:46:49Z","timestamp":1521132409000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Mobile apps and data privacy: When the service is free, the product is your data"],"prefix":"10.1109","author":[{"given":"Spyros E.","family":"Polykalas","sequence":"first","affiliation":[]},{"given":"George N.","family":"Prezerakos","sequence":"additional","affiliation":[]},{"given":"Froso D.","family":"Chrysidou","sequence":"additional","affiliation":[]},{"given":"Eleni D.","family":"Pylarinou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"21","article-title":"Privacy revelations for web and mobile apps","author":"wetherall","year":"2011","journal-title":"Proceedings of the 13th USENIX conference on Hot topics in operating systems (HotOS'13) USENIX Association"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"ref6","first-page":"2347","article-title":"Leakiness and creepiness in app space: perceptions of privacy and mobile app use","author":"irina","year":"2014","journal-title":"Proc SIGCHI Conf Human Factors in Computing Systems (CHI"},{"key":"ref5","first-page":"501","author":"jialiu","year":"2012","journal-title":"Expectation and purpose understanding users' mental models of mobile app privacy through crowdsourcing In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5772\/51645"},{"key":"ref2","article-title":"Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing","author":"eun","year":"2013","journal-title":"Human-Computer Interaction -INTERACT 2013 14th IFIP TC 13 International Conference"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"}],"event":{"name":"2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2017,8,27]]},"location":"Larnaca","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 8th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8308011\/8316350\/08316392.pdf?arnumber=8316392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T17:08:06Z","timestamp":1523293686000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8316392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/iisa.2017.8316392","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}