{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:44:00Z","timestamp":1770990240407,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T00:00:00Z","timestamp":1568678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,17]]},"DOI":"10.1145\/3351108.3351131","type":"proceedings-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:32:59Z","timestamp":1567513979000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Characterization of Digital Native Approaches To Mobile Privacy and Security"],"prefix":"10.1145","author":[{"given":"Sarina","family":"Till","sequence":"first","affiliation":[{"name":"Independent Institute of Education Durban, South Africa, University of Cape Town, Cape Town, South Africa"}]},{"given":"Melissa","family":"Densmore","sequence":"additional","affiliation":[{"name":"University of Cape Town, Cape Town, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2019,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_2_1_2_1","unstructured":"Android. 2018. Developers Guide Permissions Overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview  Android. 2018. Developers Guide Permissions Overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"e_1_3_2_1_3_1","unstructured":"Android. 2018. Developers Permission Best Practices. https:\/\/developer.android.com\/training\/permissions\/usage- notes  Android. 2018. Developers Permission Best Practices. https:\/\/developer.android.com\/training\/permissions\/usage- notes"},{"key":"e_1_3_2_1_4_1","unstructured":"Android. 2018. Manifest Permissions Change Wi-Fi Sate. https:\/\/developer.android.com\/training\/permissions\/usage-notes  Android. 2018. Manifest Permissions Change Wi-Fi Sate. https:\/\/developer.android.com\/training\/permissions\/usage-notes"},{"key":"e_1_3_2_1_5_1","unstructured":"Android. 2018. ReleaseNotes SDK Platform Release Notes. https:\/\/developer.android.com\/studio\/releases\/platforms  Android. 2018. ReleaseNotes SDK Platform Release Notes. https:\/\/developer.android.com\/studio\/releases\/platforms"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2018.01.016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.554"},{"key":"e_1_3_2_1_8_1","first-page":"2018","article-title":"The Cambridge Analytica Files","volume":"17","author":"Cadwalladr Carol","year":"2018","journal-title":"The Guardian. Retrieved Mar"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.23962\/10539\/23572"},{"key":"e_1_3_2_1_10_1","unstructured":"CHE. 2018. Counsel for Higher Education Review of Higher Education in South Africa. http:\/\/www.che.ac.za\/sites\/default\/files\/publications\/Review_HE_SA_2007_Complete_0.pdf  CHE. 2018. Counsel for Higher Education Review of Higher Education in South Africa. http:\/\/www.che.ac.za\/sites\/default\/files\/publications\/Review_HE_SA_2007_Complete_0.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2016.12"},{"key":"e_1_3_2_1_12_1","unstructured":"Laura Czerniewicz Neetha Ravjee and Nhlanhla Mlitwa. 2006. ICTs and the South African higher education landscape. (2006).  Laura Czerniewicz Neetha Ravjee and Nhlanhla Mlitwa. 2006. ICTs and the South African higher education landscape. (2006)."},{"key":"e_1_3_2_1_13_1","volume-title":"Information Security for South Africa (ISSA)","author":"Kock Ryan De","year":"2016"},{"key":"e_1_3_2_1_14_1","volume-title":"XDA 2017 Year in review. https:\/\/www.xda-developers.com\/play-store-permissions-change-opens-door-to-rogue-apps\/","author":"Developer Admin XDA","year":"2014"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720160"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/iere.12115"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Zheran Fang Weili Han and Yingjiu Li. 2014. Permission based Android security: Issues and countermeasures. computers & security 43 (2014) 205--218.  Zheran Fang Weili Han and Yingjiu Li. 2014. Permission based Android security: Issues and countermeasures. computers & security 43 (2014) 205--218.","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2738210.2738214"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/info8020042"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2015.1117842"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.16"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.02.004"},{"key":"e_1_3_2_1_23_1","unstructured":"Cullen Hoback. 2013. Terms and Conditions May Apply. iMDB.  Cullen Hoback. 2013. Terms and Conditions May Apply. iMDB."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2686776.2686785"},{"key":"e_1_3_2_1_25_1","volume-title":"International journal of Education and Development using ICT 3, 4","author":"Jaffer Shaheeda","year":"2007"},{"key":"e_1_3_2_1_26_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). USENIX Association Berkeley, CA, 39--52","author":"Kang Ruogu","year":"2015"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_1_28_1","volume-title":"Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on. IEEE, 106--109","author":"Khandelwal Ankita","year":"2015"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2010.5514610"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.15"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_2_1_33_1","unstructured":"Segametsi Molawa. 2010. The \u00e2\u0102IJfirst\u00e2\u0102\u0130 and \u00e2\u0102IJthird world\u00e2\u00c2\u0130 in Africa: knowledge access challenges and current technological innovations in Africa. (2010).  Segametsi Molawa. 2010. The \u00e2\u0102IJfirst\u00e2\u0102\u0130 and \u00e2\u0102IJthird world\u00e2\u00c2\u0130 in Africa: knowledge access challenges and current technological innovations in Africa. (2010)."},{"key":"e_1_3_2_1_34_1","unstructured":"Wulystan P Mtega Ronald Bernard Andrew C Msungu and Rachel Sanare. 2012. Using mobile phones for teaching and learning purposes in higher learning institutions: The case of Sokoine University of Agriculture in Tanzania. (2012).  Wulystan P Mtega Ronald Bernard Andrew C Msungu and Rachel Sanare. 2012. Using mobile phones for teaching and learning purposes in higher learning institutions: The case of Sokoine University of Agriculture in Tanzania. (2012)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.004"},{"key":"e_1_3_2_1_36_1","unstructured":"John Gorham Palfrey and Urs Gasser. 2011. Born digital: Understanding the first generation of digital natives. ReadHowYouWant. com.  John Gorham Palfrey and Urs Gasser. 2011. Born digital: Understanding the first generation of digital natives. ReadHowYouWant. com."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.02.011"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12057"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140304"},{"key":"e_1_3_2_1_40_1","first-page":"1","article-title":"A South African university's readiness assessment for bringing your own device for teaching and learning","volume":"20","author":"Ruxwana Nkqubela","year":"2018","journal-title":"South African Journal of Information Management"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2017.8062197"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Laurie R Santos and Alexandra G Rosati. 2015. The evolutionary roots of human decision making. Annual review of psychology 66 (2015) 321--347.  Laurie R Santos and Alexandra G Rosati. 2015. The evolutionary roots of human decision making. Annual review of psychology 66 (2015) 321--347.","DOI":"10.1146\/annurev-psych-010814-015310"},{"key":"e_1_3_2_1_43_1","volume-title":"International Conference on","volume":"3","author":"Singh Pooja","year":"2016"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.218"},{"key":"e_1_3_2_1_45_1","unstructured":"European Data Protection Supervisor. 2014. EDPS Guidelines on the Protection of Personal Data Processed By Mobile Applications. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/16-11-07_guidelines_mobile_apps_en.pdf  European Data Protection Supervisor. 2014. EDPS Guidelines on the Protection of Personal Data Processed By Mobile Applications. https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/16-11-07_guidelines_mobile_apps_en.pdf"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2733306"},{"key":"e_1_3_2_1_47_1","volume-title":"Trustcom\/BigDataSE\/ICESS","author":"Tang Junwei","year":"2017"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2015.1041408"},{"key":"e_1_3_2_1_49_1","first-page":"1","article-title":"Thriving Millennials: The Next Generation of Industry Professionals","volume":"35","author":"Wheeler Scott A","year":"2017","journal-title":"The Journal of Equipment Lease Financing (Online)"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.417"}],"event":{"name":"SAICSIT '19: Conference of the South African Institute of Computer Scientists and Information Technologists 2019","location":"Skukuza South Africa","acronym":"SAICSIT '19"},"container-title":["Proceedings of the South African Institute of Computer Scientists and Information Technologists 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351108.3351131","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351108.3351131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:40Z","timestamp":1750202020000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351108.3351131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,17]]},"references-count":50,"alternative-id":["10.1145\/3351108.3351131","10.1145\/3351108"],"URL":"https:\/\/doi.org\/10.1145\/3351108.3351131","relation":{},"subject":[],"published":{"date-parts":[[2019,9,17]]},"assertion":[{"value":"2019-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}