{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:13:28Z","timestamp":1766733208672,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3319723","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"94-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Characterizing security and privacy practices in emerging digital credit applications"],"prefix":"10.1145","author":[{"given":"Jasmine","family":"Bowers","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Imani N.","family":"Sherman","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Kevin R. B.","family":"Butler","sequence":"additional","affiliation":[{"name":"University of Florida"}]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_2_1","unstructured":"Rachel Botsman. 2017. Big data meets Big Brother as China moves to rate its citizens. http:\/\/www.wired.co.uk\/article\/chinese-government-social-credit-score-privacy-invasion.  Rachel Botsman. 2017. Big data meets Big Brother as China moves to rate its citizens. http:\/\/www.wired.co.uk\/article\/chinese-government-social-credit-score-privacy-invasion."},{"volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS","year":"2017","author":"Bowers Jasmine","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001913.3001919"},{"key":"e_1_3_2_1_5_1","unstructured":"Central Intelligence Agency. {n. d.}. The World Factbook. https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/fields\/2205.html.  Central Intelligence Agency. {n. d.}. The World Factbook. https:\/\/www.cia.gov\/library\/publications\/the-world-factbook\/fields\/2205.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2911988"},{"key":"e_1_3_2_1_7_1","unstructured":"Division Computer Security and Laboratory Information Technology and National Institute of Standards and Technology and Commerce U. S. Department of. {n. d.}. Update to Current Use and Deprecation of TDEA | CSRC. https:\/\/goo.gl\/B73ACB.  Division Computer Security and Laboratory Information Technology and National Institute of Standards and Technology and Commerce U. S. Department of. {n. d.}. Update to Current Use and Deprecation of TDEA | CSRC. https:\/\/goo.gl\/B73ACB."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_9_1","unstructured":"Federal Trade Commmission. {n. d.}. Gramm-Leach-Bliley Act. https:\/\/www.ftc.gov\/tips-advice\/business-center\/privacy-and-security\/gramm-leach-bliley-act.  Federal Trade Commmission. {n. d.}. Gramm-Leach-Bliley Act. https:\/\/www.ftc.gov\/tips-advice\/business-center\/privacy-and-security\/gramm-leach-bliley-act."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00223891.2012.660291"},{"volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","year":"2016","author":"Gluck Joshua","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Google. 2018. Review App Permissions thru Android 5.9 - Android. https:\/\/goo.gl\/xr4gWv.  Google. 2018. Review App Permissions thru Android 5.9 - Android. https:\/\/goo.gl\/xr4gWv."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"volume-title":"Privacy and Security Concerns Associated with Mobile Money Applications in Africa Mobile Money Symposium 2013","year":"2012","author":"Harris Andrew","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Mark Hochhauser. 2001. Lost in the Fine Print: Readability of Financial Privacy Notices. https:\/\/www.privacyrights.org\/blog\/lost-fine-print-readability-financial-privacy-notices-hochhauser.  Mark Hochhauser. 2001. Lost in the Fine Print: Readability of Financial Privacy Notices. https:\/\/www.privacyrights.org\/blog\/lost-fine-print-readability-financial-privacy-notices-hochhauser."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837121"},{"key":"e_1_3_2_1_18_1","unstructured":"Juspay Technologies. {n. d.}. Github: ec-android-demo. https:\/\/github.com\/juspay\/ec-android-demo.  Juspay Technologies. {n. d.}. Github: ec-android-demo. https:\/\/github.com\/juspay\/ec-android-demo."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_20_1","unstructured":"Ethan Loufield Dennis Ferenzy and Tess Johnson. 2018. Accelerating Financial Inclusion with New Data. Mainstreaming Financial Inclusion: Best Practices (may 2018).  Ethan Loufield Dennis Ferenzy and Tess Johnson. 2018. Accelerating Financial Inclusion with New Data. Mainstreaming Financial Inclusion: Best Practices (may 2018)."},{"key":"e_1_3_2_1_21_1","unstructured":"Mary Brophy Marcus. 2016. Fitbit Fitness Tracker Detects Woman's Pregnancy. https:\/\/www.cbsnews.com\/news\/fitbit-fitness-tracker-tells-woman-shes-pregnant\/.  Mary Brophy Marcus. 2016. Fitbit Fitness Tracker Detects Woman's Pregnancy. https:\/\/www.cbsnews.com\/news\/fitbit-fitness-tracker-tells-woman-shes-pregnant\/."},{"volume-title":"Proceedings of the USENIX Security Symposium.","year":"2013","author":"Octeau Damien","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"PNF Software. {n. d.}. JEB by PNF Software: Reverse Engineering for Professionals. https:\/\/www.pnfsoftware.com\/.  PNF Software. {n. d.}. JEB by PNF Software: Reverse Engineering for Professionals. https:\/\/www.pnfsoftware.com\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Qualys SSL Labs. {n. d.}. SSL Server Test. https:\/\/www.ssllabs.com\/ssltest\/.  Qualys SSL Labs. {n. d.}. SSL Server Test. https:\/\/www.ssllabs.com\/ssltest\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996358"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092368"},{"volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Reaves Bradley","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1778331.1778346"},{"volume-title":"Rating Indicator Criteria for Privacy Policies. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","year":"2016","author":"Reidenberg Joel R.","key":"e_1_3_2_1_29_1"},{"volume-title":"Symposium On Usable Privacy and Security (SOUPS).","year":"2015","author":"Schaub Florian","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","first-page":"943","article-title":"Evaluation of the Effect of US Financial Privacy Legislation Through the Analysis of Privacy Policies","volume":"2","author":"Sheng Xinguang","year":"2005","journal-title":"ISJLP"},{"key":"e_1_3_2_1_32_1","unstructured":"Gayle Swenson. 2005. NIST Withdraws Outdated Data Encryption Standard. https:\/\/www.nist.gov\/news-events\/news\/2005\/06\/nist-withdraws-outdated-data-encryption-standard.  Gayle Swenson. 2005. NIST Withdraws Outdated Data Encryption Standard. https:\/\/www.nist.gov\/news-events\/news\/2005\/06\/nist-withdraws-outdated-data-encryption-standard."},{"key":"e_1_3_2_1_33_1","unstructured":"U.S. Computer Emergency Readiness Team. {n. d.}. CVE-2014--0224 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0224.  U.S. Computer Emergency Readiness Team. {n. d.}. CVE-2014--0224 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0224."},{"key":"e_1_3_2_1_34_1","unstructured":"U.S. Computer Emergency Readiness Team. {n. d.}. CVE-2016--2107 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-2107.  U.S. Computer Emergency Readiness Team. {n. d.}. CVE-2016--2107 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-2107."},{"key":"e_1_3_2_1_35_1","unstructured":"U.S. Computer Emergency Readiness Team. {n. d.}. OpenSSL 'Heartbleed' Vulnerability (CVE-2014--0160). https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-098A.  U.S. Computer Emergency Readiness Team. {n. d.}. OpenSSL 'Heartbleed' Vulnerability (CVE-2014--0160). https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-098A."},{"key":"e_1_3_2_1_36_1","unstructured":"U.S. Computer Emergency Readiness Team. {n. d.}. SSL 3.0 Protocol Vulnerability and POODLE Attack. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-290A.  U.S. Computer Emergency Readiness Team. {n. d.}. SSL 3.0 Protocol Vulnerability and POODLE Attack. https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-290A."},{"key":"e_1_3_2_1_37_1","unstructured":"U.S. Government Publishing Office. {n. d.}. Public Law 106 - 102 - Gramm-Leach-Bliley Act. https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-106publ102\/content-detail.html.  U.S. Government Publishing Office. {n. d.}. Public Law 106 - 102 - Gramm-Leach-Bliley Act. https:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-106publ102\/content-detail.html."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Zimmeck Sebastian","key":"e_1_3_2_1_39_1"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3319723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:17Z","timestamp":1750276877000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3319723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":39,"alternative-id":["10.1145\/3317549.3319723","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3319723","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}