{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T21:14:20Z","timestamp":1762809260532,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T00:00:00Z","timestamp":1647820800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,21]]},"DOI":"10.1109\/percom53586.2022.9762379","type":"proceedings-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:51:33Z","timestamp":1651089093000},"page":"207-214","source":"Crossref","is-referenced-by-count":7,"title":["Effect of User Expectation on Mobile App Privacy: A Field Study"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Mendes","sequence":"first","affiliation":[{"name":"University of Coimbra,CISUC, Dept. of Informatics Engineering,Coimbra,Portugal"}]},{"given":"Andre","family":"Brandao","sequence":"additional","affiliation":[{"name":"University of Porto,Faculty of Sciences,CRACS\/INESCTEC and CISUC, Dept. of Computer Science,Porto,Portugal"}]},{"given":"Joao P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"University of Porto,Faculty of Sciences,CRACS\/INESCTEC and CISUC, Dept. of Computer Science,Porto,Portugal"}]},{"given":"Alastair R.","family":"Beresford","sequence":"additional","affiliation":[{"name":"University of Cambridge,Dept. of Computer Science and Technology,Cambridge,England"}]}],"member":"263","reference":[{"year":"2018","key":"ref32","article-title":"Use of sms or call log permission groups"},{"journal-title":"Privacy changes in android 10","year":"2019","key":"ref31"},{"article-title":"COP-MODE Naive Permission Manager","year":"2021","author":"mendes","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"ref12","first-page":"235","article-title":"User comfort with android background resource accesses in different contexts","author":"votipka","year":"2018","journal-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"ref14","article-title":"Can systems explain permissions better? understanding users&#x2019; misperceptions under smartphone runtime permission model","author":"shen","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702404"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"ref18","first-page":"1","article-title":"A design space for effective privacy notices","author":"schaub","year":"2015","journal-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)"},{"key":"ref19","first-page":"321","article-title":"How short is too short? implications of length and framing on the effectiveness of privacy notices","author":"gluck","year":"2016","journal-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"journal-title":"Request app permissions","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.02.004"},{"key":"ref6","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"nissenbaum","year":"2004","journal-title":"Wash L Rev"},{"article-title":"COP-MODE Dataset Guide","year":"2021","author":"mendes","key":"ref29"},{"key":"ref5","article-title":"Android permissions remystified: A field study on contextual integrity","volume":"15","author":"wijesekera","year":"2015","journal-title":"Usenix Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"ref2","first-page":"195","article-title":"Exploring decision making with android&#x2019;s runtime permission dialogs using in-context surveys","author":"bonn\u00e9","year":"2017","journal-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"ref1","article-title":"Towards a Privacy Research Roadmap for the Computing Community","author":"cranor","year":"2015","journal-title":"A white paper prepared for the computing community consortium committee of the computing research association"},{"key":"ref20","article-title":"Follow my recommendations: A personalized privacy assistant for mobile app permissions","author":"liu","year":"2016","journal-title":"Symposium On Usable Privacy and Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"ref21","first-page":"785","article-title":"Explanation beats context: The effect of timing & rationales on users&#x2019; runtime permission decisions","author":"elbitar","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"article-title":"The Project COP-MODE","year":"2021","author":"mendes","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"}],"event":{"name":"2022 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2022,3,21]]},"location":"Pisa, Italy","end":{"date-parts":[[2022,3,25]]}},"container-title":["2022 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9762374\/9762351\/09762379.pdf?arnumber=9762379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:21:04Z","timestamp":1656364864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9762379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,21]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/percom53586.2022.9762379","relation":{},"subject":[],"published":{"date-parts":[[2022,3,21]]}}}