{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:07:26Z","timestamp":1755839246731,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1814068,CNS-1814110, CNS-1814439"],"award-info":[{"award-number":["CNS-1814068,CNS-1814110, CNS-1814439"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481513","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"223-235","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Examining Power Use and the Privacy Paradox between Intention vs. Actual Use of Mobile Applications"],"prefix":"10.1145","author":[{"given":"Moses","family":"Namara","sequence":"first","affiliation":[{"name":"Clemson University, USA"}]},{"given":"Reza Ghaiumy","family":"Anaraky","sequence":"additional","affiliation":[{"name":"Clemson University, USA"}]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"University of Central Florida, USA"}]},{"given":"Xinru","family":"Page","sequence":"additional","affiliation":[{"name":"Brigham Young University, USA"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Pre-installed apps: T-Mobile REVVL. https:\/\/www.t-mobile.com\/support\/devices\/android\/t-mobile-revvl\/pre-installed-apps-t-mobile-revvl  2021. Pre-installed apps: T-Mobile REVVL. https:\/\/www.t-mobile.com\/support\/devices\/android\/t-mobile-revvl\/pre-installed-apps-t-mobile-revvl"},{"key":"e_1_3_2_1_2_1","volume-title":"Comparing Security and Privacy Attitudes Among US Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium On Usable Privacy and Security ({SOUPS}","author":"Abrokwa Desiree","year":"2021","unstructured":"Desiree Abrokwa , Shruti Das , Omer Akgul , and Michelle\u00a0 L Mazurek . 2021 . Comparing Security and Privacy Attitudes Among US Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium On Usable Privacy and Security ({SOUPS} 2021). 139\u2013158. Desiree Abrokwa, Shruti Das, Omer Akgul, and Michelle\u00a0L Mazurek. 2021. Comparing Security and Privacy Attitudes Among US Users of Different Smartphone and Smart-Speaker Platforms. In Seventeenth Symposium On Usable Privacy and Security ({SOUPS} 2021). 139\u2013158."},{"volume-title":"Action control","author":"Ajzen Icek","key":"e_1_3_2_1_3_1","unstructured":"Icek Ajzen . 1985. From intentions to actions: A theory of planned behavior . In Action control . Springer , 11\u201339. Icek Ajzen. 1985. From intentions to actions: A theory of planned behavior. In Action control. Springer, 11\u201339."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71501-8_4"},{"key":"e_1_3_2_1_5_1","unstructured":"Amazon. 2020. Participation Agreement. https:\/\/www.mturk.com\/participation-agreement  Amazon. 2020. Participation Agreement. https:\/\/www.mturk.com\/participation-agreement"},{"key":"e_1_3_2_1_6_1","unstructured":"Monica Anderson. 2015. Mobile apps privacy and permissions: 5 key takeaways. https:\/\/www.pewresearch.org\/fact-tank\/2015\/11\/10\/key-takeaways-mobile-apps\/  Monica Anderson. 2015. Mobile apps privacy and permissions: 5 key takeaways. https:\/\/www.pewresearch.org\/fact-tank\/2015\/11\/10\/key-takeaways-mobile-apps\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_42"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2016.7823922"},{"key":"e_1_3_2_1_9_1","unstructured":"Brooke Auxier Lee Rainie Monica Anderson Andrew Perrin Madhu Kumar and Erica Turner. 2020. Americans and Privacy: Concerned Confused and Feeling Lack of Control Over Their Personal Information. https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/  Brooke Auxier Lee Rainie Monica Anderson Andrew Perrin Madhu Kumar and Erica Turner. 2020. Americans and Privacy: Concerned Confused and Feeling Lack of Control Over Their Personal Information. https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264477"},{"key":"e_1_3_2_1_11_1","volume-title":"The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013A systematic literature review. Telematics and informatics 34, 7","author":"Barth Susanne","year":"2017","unstructured":"Susanne Barth and Menno\u00a0 DT De\u00a0Jong . 2017. The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013A systematic literature review. Telematics and informatics 34, 7 ( 2017 ), 1038\u20131058. Susanne Barth and Menno\u00a0DT De\u00a0Jong. 2017. The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013A systematic literature review. Telematics and informatics 34, 7 (2017), 1038\u20131058."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2479938"},{"key":"e_1_3_2_1_13_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Bonn\u00e9 Bram","year":"2017","unstructured":"Bram Bonn\u00e9 , Sai\u00a0Teja Peddinti , Igor Bilogrevic , and Nina Taft . 2017 . Exploring decision making with Android\u2019s runtime permission dialogs using in-context surveys . In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 195\u2013210. Bram Bonn\u00e9, Sai\u00a0Teja Peddinti, Igor Bilogrevic, and Nina Taft. 2017. Exploring decision making with Android\u2019s runtime permission dialogs using in-context surveys. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 195\u2013210."},{"key":"e_1_3_2_1_14_1","volume-title":"Apple will require apps to add privacy \u2019nutrition labels","author":"Campbell Ian\u00a0Carlos","year":"2020","unstructured":"Ian\u00a0Carlos Campbell . 2020. Apple will require apps to add privacy \u2019nutrition labels \u2019 starting December 8th. https:\/\/www.theverge.com\/ 2020 \/11\/5\/21551926\/apple-privacy-developers-nutrition-labels-app-store-ios-14 Ian\u00a0Carlos Campbell. 2020. Apple will require apps to add privacy \u2019nutrition labels\u2019 starting December 8th. https:\/\/www.theverge.com\/2020\/11\/5\/21551926\/apple-privacy-developers-nutrition-labels-app-store-ios-14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132029"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443716674363"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.26"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814453"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897914"},{"key":"e_1_3_2_1_22_1","volume-title":"Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. In 10th ACM Conference on Data and Application Security and Privacy.","author":"Feichtner Johannes","year":"2020","unstructured":"Johannes Feichtner and Stefan Gruber . 2020 . Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. In 10th ACM Conference on Data and Application Security and Privacy. Johannes Feichtner and Stefan Gruber. 2020. Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. In 10th ACM Conference on Data and Application Security and Privacy."},{"key":"e_1_3_2_1_23_1","unstructured":"Carol\u00a0J Fung Bahman Rashidi and Vivian\u00a0Genaro Motti. [n.d.]. Multi-View Permission Risk Notification for Smartphone System.([n.\u00a0d.]).  Carol\u00a0J Fung Bahman Rashidi and Vivian\u00a0Genaro Motti. [n.d.]. Multi-View Permission Risk Notification for Smartphone System.([n.\u00a0d.])."},{"key":"e_1_3_2_1_24_1","volume-title":"Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security 77 (Aug","author":"Gerber Nina","year":"2018","unstructured":"Nina Gerber , Paul Gerber , and Melanie Volkamer . 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security 77 (Aug . 2018 ), 226\u2013261. https:\/\/doi.org\/10.1016\/j.cose.2018.04.002 10.1016\/j.cose.2018.04.002 Nina Gerber, Paul Gerber, and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security 77 (Aug. 2018), 226\u2013261. https:\/\/doi.org\/10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940343.2940346"},{"key":"e_1_3_2_1_26_1","unstructured":"Google. 2020. Manifest.permission. https:\/\/developer.android.com\/reference\/android\/Manifest.permission  Google. 2020. Manifest.permission. https:\/\/developer.android.com\/reference\/android\/Manifest.permission"},{"key":"e_1_3_2_1_27_1","unstructured":"Google. 2020. Permissions overview:Android Developers. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions  Google. 2020. Permissions overview:Android Developers. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions"},{"key":"e_1_3_2_1_28_1","volume-title":"Introduction to mediation analysis with structural equation modeling. Shanghai archives of psychiatry 25, 6","author":"Gunzler Douglas","year":"2013","unstructured":"Douglas Gunzler , Tian Chen , Pan Wu , and Hui Zhang . 2013. Introduction to mediation analysis with structural equation modeling. Shanghai archives of psychiatry 25, 6 ( 2013 ), 390. Douglas Gunzler, Tian Chen, Pan Wu, and Hui Zhang. 2013. Introduction to mediation analysis with structural equation modeling. Shanghai archives of psychiatry 25, 6 (2013), 390."},{"key":"e_1_3_2_1_29_1","volume-title":"Kenneth Bamberger","author":"Han Catherine","year":"2020","unstructured":"Catherine Han , Irwin Reyes , \u00c1lvaro Feal , Joel Reardon , Primal Wijesekera , Narseo Vallina-Rodriguez , Amit Elazari Bar\u00a0On , Kenneth Bamberger , Serge Egelman, 2020 . The Price is (Not) Right: Comparing Privacy in Free and Paid Apps . (2020). Catherine Han, Irwin Reyes, \u00c1lvaro Feal, Joel Reardon, Primal Wijesekera, Narseo Vallina-Rodriguez, Amit Elazari Bar\u00a0On, Kenneth Bamberger, Serge Egelman, 2020. The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. (2020)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Diarmaid Harkin and Adam Molnar. 2020. Operating-System Design and Its Implications for Victims of Family Violence: The Comparative Threat of Smart Phone Spyware for Android Versus iPhone Users. Violence Against Women(2020) 1077801220923731.  Diarmaid Harkin and Adam Molnar. 2020. Operating-System Design and Its Implications for Victims of Family Violence: The Comparative Threat of Smart Phone Spyware for Android Versus iPhone Users. Violence Against Women(2020) 1077801220923731.","DOI":"10.1177\/1077801220923731"},{"key":"e_1_3_2_1_31_1","unstructured":"Apple Inc.[n.d.]. App Privacy Details - App Store. https:\/\/developer.apple.com\/app-store\/app-privacy-details\/  Apple Inc.[n.d.]. App Privacy Details - App Store. https:\/\/developer.apple.com\/app-store\/app-privacy-details\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2015.0340"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.016"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_35_1","volume-title":"2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 3731\u20133734","author":"Kesswani Nishtha","year":"2016","unstructured":"Nishtha Kesswani and Frank Lin . 2016 . How privacy invasive Android apps are? . In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 3731\u20133734 . Nishtha Kesswani and Frank Lin. 2016. How privacy invasive Android apps are?. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 3731\u20133734."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.059"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481369"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959189"},{"volume-title":"Recommender Systems Handbook","author":"Knijnenburg P","key":"e_1_3_2_1_39_1","unstructured":"Bart\u00a0 P Knijnenburg and Martijn\u00a0 C Willemsen . 2015. Evaluating recommender systems with user experiments . In Recommender Systems Handbook . Springer , 309\u2013352. Bart\u00a0P Knijnenburg and Martijn\u00a0C Willemsen. 2015. Evaluating recommender systems with user experiments. In Recommender Systems Handbook. Springer, 309\u2013352."},{"key":"e_1_3_2_1_40_1","volume-title":"Seventeenth Symposium On Usable Privacy and Security ({SOUPS}","author":"Kollnig Konrad","year":"2021","unstructured":"Konrad Kollnig , Reuben Binns , Pierre Dewitte , Max Van\u00a0Kleek , Ge Wang , Daniel Omeiza , Helena Webb , and Nigel Shadbolt . 2021 . A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps . In Seventeenth Symposium On Usable Privacy and Security ({SOUPS} 2021). 181\u2013195. Konrad Kollnig, Reuben Binns, Pierre Dewitte, Max Van\u00a0Kleek, Ge Wang, Daniel Omeiza, Helena Webb, and Nigel Shadbolt. 2021. A Fait Accompli? An Empirical Study into the Absence of Consent to Third-Party Tracking in Android Apps. In Seventeenth Symposium On Usable Privacy and Security ({SOUPS} 2021). 181\u2013195."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.10.002"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2013.6523820"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815686"},{"key":"e_1_3_2_1_45_1","unstructured":"Sampada Marathe S\u00a0Shyam Sundar M Nije\u00a0Bijvank Henriette\u00a0C van Vugt and Jolanda Veldhuis. 2007. Who are these power users anyway? Building a psychological profile. (2007).  Sampada Marathe S\u00a0Shyam Sundar M Nije\u00a0Bijvank Henriette\u00a0C van Vugt and Jolanda Veldhuis. 2007. Who are these power users anyway? Building a psychological profile. (2007)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Scott\u00a0R Moore Huangyi Ge Ninghui Li and Robert\u00a0W Proctor. 2019. Cybersecurity for android applications: Permissions in android 5 and 6. International Journal of Human\u2013Computer Interaction 35 7(2019) 630\u2013640.  Scott\u00a0R Moore Huangyi Ge Ninghui Li and Robert\u00a0W Proctor. 2019. Cybersecurity for android applications: Permissions in android 5 and 6. International Journal of Human\u2013Computer Interaction 35 7(2019) 630\u2013640.","DOI":"10.1080\/10447318.2018.1489580"},{"key":"e_1_3_2_1_47_1","unstructured":"Jack Morse. 2020. As coronavirus spreads yet another company brags about tracking you. https:\/\/mashable.com\/article\/coronavirus-location-data-tracking-mobile-phones\/  Jack Morse. 2020. As coronavirus spreads yet another company brags about tracking you. https:\/\/mashable.com\/article\/coronavirus-location-data-tracking-mobile-phones\/"},{"key":"e_1_3_2_1_48_1","volume-title":"The Potential for User-Tailored Privacy on Facebook. In 2018 IEEE Symposium on Privacy-Aware Computing (PAC). IEEE, 31\u201342","author":"Namara Moses","year":"2018","unstructured":"Moses Namara , Henry Sloan , Priyanka Jaiswal , and Bart\u00a0 P Knijnenburg . 2018 . The Potential for User-Tailored Privacy on Facebook. In 2018 IEEE Symposium on Privacy-Aware Computing (PAC). IEEE, 31\u201342 . Moses Namara, Henry Sloan, Priyanka Jaiswal, and Bart\u00a0P Knijnenburg. 2018. The Potential for User-Tailored Privacy on Facebook. In 2018 IEEE Symposium on Privacy-Aware Computing (PAC). IEEE, 31\u201342."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.195"},{"key":"e_1_3_2_1_51_1","volume-title":"Sixth International AAAI Conference on Weblogs and Social Media.","author":"Page Xinru","year":"2012","unstructured":"Xinru Page , Alfred Kobsa , and Bart\u00a0 P Knijnenburg . 2012 . Don\u2019t disturb my circles! Boundary preservation is at the center of location-sharing concerns . In Sixth International AAAI Conference on Weblogs and Social Media. Xinru Page, Alfred Kobsa, and Bart\u00a0P Knijnenburg. 2012. Don\u2019t disturb my circles! Boundary preservation is at the center of location-sharing concerns. In Sixth International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236137"},{"key":"e_1_3_2_1_53_1","unstructured":"Andrew Perrin. 2020. Half of Americans have decided not to use a product or service because of privacy concerns. https:\/\/www.pewresearch.org\/fact-tank\/2020\/04\/14\/half-of-americans-have-decided-not-to-use-a-product-or-service-because-of-privacy-concerns\/  Andrew Perrin. 2020. Half of Americans have decided not to use a product or service because of privacy concerns. https:\/\/www.pewresearch.org\/fact-tank\/2020\/04\/14\/half-of-americans-have-decided-not-to-use-a-product-or-service-because-of-privacy-concerns\/"},{"key":"e_1_3_2_1_54_1","unstructured":"Rakesh and Rakesh. 2021. Samsung Bloatware List (2020): Remove Samsung Bloatware Safely. https:\/\/technastic.com\/remove-samsung-bloatware-safe-to-remove-apps\/  Rakesh and Rakesh. 2021. Samsung Bloatware List (2020): Remove Samsung Bloatware Safely. https:\/\/technastic.com\/remove-samsung-bloatware-safe-to-remove-apps\/"},{"key":"e_1_3_2_1_55_1","volume-title":"Security Symposium ({USENIX} Security 19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon , \u00c1lvaro Feal , Primal Wijesekera , Amit Elazari\u00a0Bar On , Narseo Vallina-Rodriguez , and Serge Egelman . 2019 . 50 Ways to Leak Your Data: An Exploration of Apps\u2019 Circumvention of the Android Permissions System. In 28th {USENIX} Security Symposium ({USENIX} Security 19) . 603\u2013620. Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari\u00a0Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps\u2019 Circumvention of the Android Permissions System. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 603\u2013620."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09770-1_14"},{"key":"e_1_3_2_1_58_1","volume-title":"Women and games: Technologies of the gendered self. New media & society 9, 4","author":"Royse Pam","year":"2007","unstructured":"Pam Royse , Joon Lee , Baasanjav Undrahbuyan , Mark Hopson , and Mia Consalvo . 2007. Women and games: Technologies of the gendered self. New media & society 9, 4 ( 2007 ), 555\u2013576. Pam Royse, Joon Lee, Baasanjav Undrahbuyan, Mark Hopson, and Mia Consalvo. 2007. Women and games: Technologies of the gendered self. New media & society 9, 4 (2007), 555\u2013576."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2019.23014"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210134"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.04.041"},{"key":"e_1_3_2_1_62_1","volume-title":"The intention\u2013behavior gap. Social and personality psychology compass 10, 9","author":"Sheeran Paschal","year":"2016","unstructured":"Paschal Sheeran and Thomas\u00a0 L Webb . 2016. The intention\u2013behavior gap. Social and personality psychology compass 10, 9 ( 2016 ), 503\u2013518. Paschal Sheeran and Thomas\u00a0L Webb. 2016. The intention\u2013behavior gap. Social and personality psychology compass 10, 9 (2016), 503\u2013518."},{"volume-title":"Apple macOS and iOS System Administration","author":"Smith Drew","key":"e_1_3_2_1_63_1","unstructured":"Drew Smith . 2020. iOS Client Administration . In Apple macOS and iOS System Administration . Springer , 109\u2013144. Drew Smith. 2020. iOS Client Administration. In Apple macOS and iOS System Administration. Springer, 109\u2013144."},{"key":"e_1_3_2_1_64_1","volume-title":"Workshop on Mobile Security Technologies (MoST), Vol.\u00a010","author":"Stevens Ryan","year":"2012","unstructured":"Ryan Stevens , Clint Gibler , Jon Crussell , Jeremy Erickson , and Hao Chen . 2012 . Investigating user privacy in android ad libraries . In Workshop on Mobile Security Technologies (MoST), Vol.\u00a010 . Citeseer. Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, and Hao Chen. 2012. Investigating user privacy in android ad libraries. In Workshop on Mobile Security Technologies (MoST), Vol.\u00a010. Citeseer."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01377.x"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5539\/ijms.v5n2p11"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556420.2556495"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785845"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39256-6_15"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(85)90017-4"},{"key":"e_1_3_2_1_72_1","volume-title":"Eleventh Symposium On Usable Privacy and Security ({SOUPS}","author":"Wash Rick","year":"2015","unstructured":"Rick Wash and Emilee Rader . 2015 . Too much knowledge? security beliefs and protective behaviors among united states internet users . In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 309\u2013325. Rick Wash and Emilee Rader. 2015. Too much knowledge? security beliefs and protective behaviors among united states internet users. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 309\u2013325."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420956"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675256"},{"key":"e_1_3_2_1_75_1","volume-title":"Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 377\u2013382","author":"Wisniewski Pamela","year":"2017","unstructured":"Pamela Wisniewski , Jessica Vitak , Xinru Page , Bart Knijnenburg , Yang Wang , and Casey Fiesler . 2017 . In whose best interest? Exploring the real, potential, and imagined ethical concerns in privacy-focused agenda . In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 377\u2013382 . Pamela Wisniewski, Jessica Vitak, Xinru Page, Bart Knijnenburg, Yang Wang, and Casey Fiesler. 2017. In whose best interest? Exploring the real, potential, and imagined ethical concerns in privacy-focused agenda. In Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 377\u2013382."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_2_1_77_1","volume-title":"Measuring mobile users","author":"Xu Heng","year":"2012","unstructured":"Heng Xu , Sumeet Gupta , Mary\u00a0Beth Rosson , and John\u00a0 M Carroll . 2012. Measuring mobile users \u2019 concerns for information privacy. ( 2012 ). Heng Xu, Sumeet Gupta, Mary\u00a0Beth Rosson, and John\u00a0M Carroll. 2012. Measuring mobile users\u2019 concerns for information privacy. (2012)."},{"key":"e_1_3_2_1_78_1","volume-title":"ICIS 2004 proceedings(2004)","author":"Xu Heng","year":"2004","unstructured":"Heng Xu and Hock-Hai Teo . 2004 . Alleviating consumers\u2019 privacy concerns in location-based services: a psychological control perspective . ICIS 2004 proceedings(2004) , 64. Heng Xu and Hock-Hai Teo. 2004. Alleviating consumers\u2019 privacy concerns in location-based services: a psychological control perspective. ICIS 2004 proceedings(2004), 64."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971696"},{"key":"e_1_3_2_1_80_1","volume-title":"From smartphones to iPad: Power users","author":"Zhong Bu","year":"2013","unstructured":"Bu Zhong . 2013. From smartphones to iPad: Power users \u2019 disposition toward mobile media devices. Computers in human behavior 29, 4 ( 2013 ), 1742\u20131748. Bu Zhong. 2013. From smartphones to iPad: Power users\u2019 disposition toward mobile media devices. Computers in human behavior 29, 4 (2013), 1742\u20131748."}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","acronym":"EuroUSEC '21","location":"Karlsruhe Germany"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481513","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":79,"alternative-id":["10.1145\/3481357.3481513","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481513","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}