{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:02:15Z","timestamp":1775041335130,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. National Science Foundation (NSF)","award":["#CNS-1814439"],"award-info":[{"award-number":["#CNS-1814439"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3517652","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T17:08:31Z","timestamp":1651165711000},"page":"1-18","source":"Crossref","is-referenced-by-count":21,"title":["Permission vs. App Limiters: Profiling Smartphone Users to Understand Differing Strategies for Mobile Privacy Management"],"prefix":"10.1145","author":[{"given":"Ashwaq","family":"Alsoubai","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]},{"given":"Reza","family":"Ghaiumy Anaraky","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"given":"Yao","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]},{"given":"Xinru","family":"Page","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Brigham Young University, United States"}]},{"given":"Bart","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Central Florida, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The theory of planned behavior. Organizational behavior and human decision processes 50, 2","author":"Ajzen Icek","year":"1991","unstructured":"Icek Ajzen . 1991. The theory of planned behavior. Organizational behavior and human decision processes 50, 2 ( 1991 ), 179\u2013211. Icek Ajzen. 1991. The theory of planned behavior. Organizational behavior and human decision processes 50, 2 (1991), 179\u2013211."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264477"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172982"},{"key":"e_1_3_2_2_5_1","volume-title":"The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013A systematic literature review. Telematics and informatics 34, 7","author":"Barth Susanne","year":"2017","unstructured":"Susanne Barth and Menno\u00a0 DT De\u00a0Jong . 2017. The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013A systematic literature review. Telematics and informatics 34, 7 ( 2017 ), 1038\u20131058. Susanne Barth and Menno\u00a0DT De\u00a0Jong. 2017. The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013A systematic literature review. Telematics and informatics 34, 7 (2017), 1038\u20131058."},{"key":"e_1_3_2_2_6_1","volume-title":"Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41","author":"Barth Susanne","year":"2019","unstructured":"Susanne Barth , Menno\u00a0 DT de Jong , Marianne Junger , Pieter\u00a0 H Hartel , and Janina\u00a0 C Roppelt . 2019. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41 ( 2019 ), 55\u201369. Susanne Barth, Menno\u00a0DT de Jong, Marianne Junger, Pieter\u00a0H Hartel, and Janina\u00a0C Roppelt. 2019. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41 (2019), 55\u201369."},{"key":"e_1_3_2_2_7_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Bonn\u00e9 Bram","year":"2017","unstructured":"Bram Bonn\u00e9 , Sai\u00a0Teja Peddinti , Igor Bilogrevic , and Nina Taft . 2017 . Exploring decision making with Android\u2019s runtime permission dialogs using in-context surveys . In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). ACM, Santa Clara, CA, USA, 195\u2013210. Bram Bonn\u00e9, Sai\u00a0Teja Peddinti, Igor Bilogrevic, and Nina Taft. 2017. Exploring decision making with Android\u2019s runtime permission dialogs using in-context surveys. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). ACM, Santa Clara, CA, USA, 195\u2013210."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1365\/s11621-014-0318-2"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/13674676.2018.1486394"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387469"},{"key":"e_1_3_2_2_11_1","volume-title":"Expectations and Engagement with Android Permissions. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Cao Weicheng","year":"2021","unstructured":"Weicheng Cao , Chunqiu Xia , Sai\u00a0Teja Peddinti , David Lie , Nina Taft , and Lisa\u00a0 M. Austin . 2021 . A Large Scale Study of User Behavior , Expectations and Engagement with Android Permissions. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, Virtual, 803\u2013820. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/cao-weicheng Weicheng Cao, Chunqiu Xia, Sai\u00a0Teja Peddinti, David Lie, Nina Taft, and Lisa\u00a0M. Austin. 2021. A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Virtual, 803\u2013820. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/cao-weicheng"},{"key":"e_1_3_2_2_12_1","unstructured":"Pew\u00a0Research Center. 2016. Americans increasingly use smartphones for more than voice calls texting. https:\/\/www.pewresearch.org\/internet\/ft_01-27-16_smartphoneactivities_640\/  Pew\u00a0Research Center. 2016. Americans increasingly use smartphones for more than voice calls texting. https:\/\/www.pewresearch.org\/internet\/ft_01-27-16_smartphoneactivities_640\/"},{"key":"e_1_3_2_2_13_1","volume-title":"Demographics of Mobile Device Ownership and Adoption in the United States.https:\/\/www.pewresearch.org\/internet\/fact- sheet\/mobile\/. Retrieved","author":"Pew\u00a0Research Center","year":"2021","unstructured":"Pew\u00a0Research Center . 2021. Demographics of Mobile Device Ownership and Adoption in the United States.https:\/\/www.pewresearch.org\/internet\/fact- sheet\/mobile\/. Retrieved May 9, 2021 . Pew\u00a0Research Center. 2021. Demographics of Mobile Device Ownership and Adoption in the United States.https:\/\/www.pewresearch.org\/internet\/fact- sheet\/mobile\/. Retrieved May 9, 2021."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132029"},{"key":"e_1_3_2_2_15_1","volume-title":"Cronbach\u2019s coefficient alpha: Well known but poorly understood. Organizational research methods 18, 2","author":"Cho Eunseong","year":"2015","unstructured":"Eunseong Cho and Seonghoon Kim . 2015. Cronbach\u2019s coefficient alpha: Well known but poorly understood. Organizational research methods 18, 2 ( 2015 ), 207\u2013230. Eunseong Cho and Seonghoon Kim. 2015. Cronbach\u2019s coefficient alpha: Well known but poorly understood. Organizational research methods 18, 2 (2015), 207\u2013230."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359248"},{"key":"e_1_3_2_2_17_1","volume-title":"Construct validity in psychological tests.Psychological bulletin 52, 4","author":"Cronbach J","year":"1955","unstructured":"Lee\u00a0 J Cronbach and Paul\u00a0 E Meehl . 1955. Construct validity in psychological tests.Psychological bulletin 52, 4 ( 1955 ), 281. Lee\u00a0J Cronbach and Paul\u00a0E Meehl. 1955. Construct validity in psychological tests.Psychological bulletin 52, 4 (1955), 281."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00025"},{"key":"e_1_3_2_2_19_1","unstructured":"Larry Dignan. 2011. Google\u2019s Android wears big bullseye for mobile malware. https:\/\/www.zdnet.com\/article\/googles-android-wears-big-bullseye-for-mobile-malware\/  Larry Dignan. 2011. Google\u2019s Android wears big bullseye for mobile malware. https:\/\/www.zdnet.com\/article\/googles-android-wears-big-bullseye-for-mobile-malware\/"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"Egele Manuel","year":"2011","unstructured":"Manuel Egele , Christopher Kruegel , Engin Kirda , and Giovanni Vigna . 2011 . PiOS: Detecting Privacy Leaks in iOS Applications . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 , 6th February - 9th February 2011. The Internet Society, San Diego, California, USA, 15. https:\/\/www.ndss-symposium.org\/ndss2011\/pios-detecting-privacy-leaks-ios-applications-paper Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, 6th February - 9th February 2011. The Internet Society, San Diego, California, USA, 15. https:\/\/www.ndss-symposium.org\/ndss2011\/pios-detecting-privacy-leaks-ios-applications-paper"},{"key":"e_1_3_2_2_21_1","volume-title":"Choice architecture and smartphone privacy: There\u2019sa price for that","author":"Egelman Serge","unstructured":"Serge Egelman , Adrienne\u00a0Porter Felt , and David Wagner . 2013. Choice architecture and smartphone privacy: There\u2019sa price for that . Springer , Germany . 211\u2013236 pages. Serge Egelman, Adrienne\u00a0Porter Felt, and David Wagner. 2013. Choice architecture and smartphone privacy: There\u2019sa price for that. Springer, Germany. 211\u2013236 pages."},{"key":"e_1_3_2_2_22_1","volume-title":"Exploratory factor analysis","author":"Fabrigar R","unstructured":"Leandre\u00a0 R Fabrigar and Duane\u00a0 T Wegener . 2011. Exploratory factor analysis . Oxford University Press , England . Leandre\u00a0R Fabrigar and Duane\u00a0T Wegener. 2011. Exploratory factor analysis. Oxford University Press, England."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Zheran Fang Weili Han and Yingjiu Li. 2014. Permission based Android security: Issues and countermeasures. computers & security 43(2014) 205\u2013218.  Zheran Fang Weili Han and Yingjiu Li. 2014. Permission based Android security: Issues and countermeasures. computers & security 43(2014) 205\u2013218.","DOI":"10.1016\/j.cose.2014.02.007"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3374664.3375730"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Nina Gerber Paul Gerber and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security 77(2018) 226\u2013261.  Nina Gerber Paul Gerber and Melanie Volkamer. 2018. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & security 77(2018) 226\u2013261.","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445204"},{"key":"e_1_3_2_2_28_1","volume-title":"Retrieved","year":"2021","unstructured":"Google. 2021 . Google and Open Handset Alliance. n.d. Android API Guide.https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions . Retrieved Feb 21, 2021. Google. 2021. Google and Open Handset Alliance. n.d. Android API Guide.https:\/\/developer.android.com\/guide\/topics\/permissions\/overview#dangerous_permissions. Retrieved Feb 21, 2021."},{"key":"e_1_3_2_2_29_1","unstructured":"Google. 2022. Android Developers. https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-element  Google. 2022. Android Developers. https:\/\/developer.android.com\/guide\/topics\/manifest\/manifest-element"},{"key":"e_1_3_2_2_30_1","unstructured":"L Harris AF Westin 2003. Consumer Privacy Attitudes: A Major Shift Since 2000 and Why.  L Harris AF Westin 2003. Consumer Privacy Attitudes: A Major Shift Since 2000 and Why."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331450"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-Berlin.2017.8210616"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078843"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64(2017) 122\u2013134.  Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64(2017) 122\u2013134.","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103284"},{"key":"e_1_3_2_2_39_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Lin Jialiu","year":"2014","unstructured":"Jialiu Lin , Bin Liu , Norman Sadeh , and Jason\u00a0 I Hong . 2014 . Modeling users\u2019 mobile app privacy preferences: Restoring usability in a sea of permission settings . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). Usenix, Menlo Park, California, 199\u2013212. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason\u00a0I Hong. 2014. Modeling users\u2019 mobile app privacy preferences: Restoring usability in a sea of permission settings. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). Usenix, Menlo Park, California, 199\u2013212."},{"key":"e_1_3_2_2_40_1","volume-title":"Twelfth Symposium on Usable Privacy and Security ({SOUPS}","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads\u00a0Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun\u00a0Aerin Zhang , Norman Sadeh , Yuvraj Agarwal , and Alessandro Acquisti . 2016 . Follow my recommendations: A personalized privacy assistant for mobile app permissions . In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). usenix, Denver, Colorado, USA, 27\u201341. Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0Aerin Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). usenix, Denver, Colorado, USA, 27\u201341."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_3_2_2_42_1","volume-title":"Investigating population heterogeneity with factor mixture models.Psychological methods 10, 1","author":"Lubke H","year":"2005","unstructured":"Gitta\u00a0 H Lubke and Bengt Muth\u00e9n . 2005. Investigating population heterogeneity with factor mixture models.Psychological methods 10, 1 ( 2005 ), 21. Gitta\u00a0H Lubke and Bengt Muth\u00e9n. 2005. Investigating population heterogeneity with factor mixture models.Psychological methods 10, 1 (2005), 21."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2425132"},{"key":"e_1_3_2_2_44_1","unstructured":"Mary Madden Lee Rainie Kathryn Zickuhr Maeve Duggan and Aaron Smith. 2014. Public perceptions of privacy and security in the post-Snowden era.  Mary Madden Lee Rainie Kathryn Zickuhr Maeve Duggan and Aaron Smith. 2014. Public perceptions of privacy and security in the post-Snowden era."},{"key":"e_1_3_2_2_45_1","volume-title":"Internet users","author":"Malhotra K","year":"2004","unstructured":"Naresh\u00a0 K Malhotra , Sung\u00a0 S Kim , and James Agarwal . 2004. Internet users \u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 ( 2004 ), 336\u2013355. Naresh\u00a0K Malhotra, Sung\u00a0S Kim, and James Agarwal. 2004. Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336\u2013355."},{"key":"e_1_3_2_2_46_1","first-page":"343","article-title":"Alternatives to F-test in one way ANOVA in case of heterogeneity of variances (a simulation study)","volume":"52","author":"Moder Karl","year":"2010","unstructured":"Karl Moder . 2010 . Alternatives to F-test in one way ANOVA in case of heterogeneity of variances (a simulation study) . Psychological Test and Assessment Modeling 52 , 4 (2010), 343 \u2013 353 . Karl Moder. 2010. Alternatives to F-test in one way ANOVA in case of heterogeneity of variances (a simulation study). Psychological Test and Assessment Modeling 52, 4 (2010), 343\u2013353.","journal-title":"Psychological Test and Assessment Modeling"},{"key":"e_1_3_2_2_47_1","volume-title":"Statistical analysis with latent variables","author":"Muth\u00e9n Bengt","unstructured":"Bengt Muth\u00e9n and Bengt\u00a0 O Muth\u00e9n . 2009. Statistical analysis with latent variables . Wiley, New York , NY. Bengt Muth\u00e9n and Bengt\u00a0O Muth\u00e9n. 2009. Statistical analysis with latent variables. Wiley, New York, NY."},{"key":"e_1_3_2_2_48_1","volume-title":"Actual Use of Mobile Applications. In European Symposium on Usable Security","author":"Namara Moses","year":"2021","unstructured":"Moses Namara , Reza\u00a0Ghaiumy Anaraky , Pamela Wisniewski , Xinru Page , and Bart\u00a0 P Knijnenburg . 2021 . Examining Power Use and the Privacy Paradox between Intention vs . Actual Use of Mobile Applications. In European Symposium on Usable Security 2021. ACM, Virtual, 223\u2013235. Moses Namara, Reza\u00a0Ghaiumy Anaraky, Pamela Wisniewski, Xinru Page, and Bart\u00a0P Knijnenburg. 2021. Examining Power Use and the Privacy Paradox between Intention vs. Actual Use of Mobile Applications. In European Symposium on Usable Security 2021. ACM, Virtual, 223\u2013235."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Karen\u00a0L Nylund Tihomir Asparouhov and Bengt\u00a0O Muth\u00e9n. 2007. Deciding on the number of classes in latent class analysis and growth mixture modeling: A Monte Carlo simulation study. Structural equation modeling: A multidisciplinary Journal 14 4(2007) 535\u2013569.  Karen\u00a0L Nylund Tihomir Asparouhov and Bengt\u00a0O Muth\u00e9n. 2007. Deciding on the number of classes in latent class analysis and growth mixture modeling: A Monte Carlo simulation study. Structural equation modeling: A multidisciplinary Journal 14 4(2007) 535\u2013569.","DOI":"10.1080\/10705510701575396"},{"key":"e_1_3_2_2_50_1","volume-title":"Apps permissions in the Google Play store","author":"Olmstead K","unstructured":"K Olmstead and M Atkinson . 2017. Apps permissions in the Google Play store . Pew Research Center . K Olmstead and M Atkinson. 2017. Apps permissions in the Google Play store. Pew Research Center."},{"key":"e_1_3_2_2_51_1","unstructured":"Privacy and American Business.1997. Commerce Communication and Privacy Online: A National Survey of Computer Users.  Privacy and American Business.1997. Commerce Communication and Privacy Online: A National Survey of Computer Users."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_2_53_1","volume-title":"Recommender systems handbook","author":"Rubens Neil","unstructured":"Neil Rubens , Mehdi Elahi , Masashi Sugiyama , and Dain Kaplan . 2015. Active learning in recommender systems . In Recommender systems handbook . Springer , Boston, MA , 809\u2013846. Neil Rubens, Mehdi Elahi, Masashi Sugiyama, and Dain Kaplan. 2015. Active learning in recommender systems. In Recommender systems handbook. Springer, Boston, MA, 809\u2013846."},{"key":"e_1_3_2_2_54_1","volume-title":"A recommendation approach for user privacy preferences in the fitness domain. User Modeling and User-Adapted Interaction 30 (Oct","author":"Sanchez Odnan\u00a0Ref","year":"2019","unstructured":"Odnan\u00a0Ref Sanchez , Ilaria Torre , Yangyang He , and Bart\u00a0 P. Knijnenburg . 2019. A recommendation approach for user privacy preferences in the fitness domain. User Modeling and User-Adapted Interaction 30 (Oct . 2019 ), 513\u2013565. https:\/\/doi.org\/10.1007\/s11257-019-09246-3 Odnan\u00a0Ref Sanchez, Ilaria Torre, Yangyang He, and Bart\u00a0P. Knijnenburg. 2019. A recommendation approach for user privacy preferences in the fitness domain. User Modeling and User-Adapted Interaction 30 (Oct. 2019), 513\u2013565. https:\/\/doi.org\/10.1007\/s11257-019-09246-3"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/0734282911406653"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"Claude\u00a0Elwood Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5 1(2001) 3\u201355.  Claude\u00a0Elwood Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review 5 1(2001) 3\u201355.","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph8041084"},{"key":"e_1_3_2_2_58_1","volume-title":"Apple macOS and iOS System Administration","author":"Smith Drew","unstructured":"Drew Smith . 2020. iOS Client Administration . In Apple macOS and iOS System Administration . Springer , Apress , 109\u2013144. Drew Smith. 2020. iOS Client Administration. In Apple macOS and iOS System Administration. Springer, Apress, 109\u2013144."},{"key":"e_1_3_2_2_59_1","volume-title":"Information privacy: Measuring individuals","author":"Smith H\u00a0Jeff","year":"1996","unstructured":"H\u00a0Jeff Smith , Sandra\u00a0 J Milberg , and Sandra\u00a0 J Burke . 1996. Information privacy: Measuring individuals \u2019 concerns about organizational practices. MIS quarterly 20( 1996 ), 167\u2013196. H\u00a0Jeff Smith, Sandra\u00a0J Milberg, and Sandra\u00a0J Burke. 1996. Information privacy: Measuring individuals\u2019 concerns about organizational practices. MIS quarterly 20(1996), 167\u2013196."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0011"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102517"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2212-5671(15)00123-9"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_3_2_2_66_1","volume-title":"Introduction to robust estimation and hypothesis testing","author":"Wilcox R","unstructured":"Rand\u00a0 R Wilcox . 2011. Introduction to robust estimation and hypothesis testing . Academic press , Global . Rand\u00a0R Wilcox. 2011. Introduction to robust estimation and hypothesis testing. Academic press, Global."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"crossref","unstructured":"Pamela Wisniewski AKM Islam Heather Richter\u00a0Lipford and David\u00a0C Wilson. 2016. Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for information systems 38 1(2016) 10.  Pamela Wisniewski AKM Islam Heather Richter\u00a0Lipford and David\u00a0C Wilson. 2016. Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for information systems 38 1(2016) 10.","DOI":"10.17705\/1CAIS.03810"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa014"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_2_2_71_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Woodruff Allison","year":"2014","unstructured":"Allison Woodruff , Vasyl Pihur , Sunny Consolvo , Laura Brandimarte , and Alessandro Acquisti . 2014 . Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? the westin categories, behavioral intentions, and consequences . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). Usenix, Menlo Park, California, 1\u201318. Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Laura Brandimarte, and Alessandro Acquisti. 2014. Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? the westin categories, behavioral intentions, and consequences. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). Usenix, Menlo Park, California, 1\u201318."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100118"},{"key":"e_1_3_2_2_73_1","volume-title":"Thirty Third International Conference on Information Systems","author":"Xu Heng","year":"2012","unstructured":"Heng Xu , Sumeet Gupta , Mary\u00a0Beth Rosson , and John\u00a0 M Carroll . 2012 . Measuring mobile users\u2019 concerns for information privacy . In Thirty Third International Conference on Information Systems . Citeseer, Orlando, FL, USA, 16. Heng Xu, Sumeet Gupta, Mary\u00a0Beth Rosson, and John\u00a0M Carroll. 2012. Measuring mobile users\u2019 concerns for information privacy. In Thirty Third International Conference on Information Systems. Citeseer, Orlando, FL, USA, 16."},{"key":"e_1_3_2_2_74_1","volume-title":"Proceedings of the International Conference on Information Systems. Association for Information Systems","author":"Xu Heng","year":"2004","unstructured":"Heng Xu and Hock-Hai Teo . 2004 . Alleviating consumers\u2019 privacy concerns in location-based services: a psychological control perspective . In Proceedings of the International Conference on Information Systems. Association for Information Systems , Washington, DC, USA, 64. Heng Xu and Hock-Hai Teo. 2004. Alleviating consumers\u2019 privacy concerns in location-based services: a psychological control perspective. In Proceedings of the International Conference on Information Systems. Association for Information Systems, Washington, DC, USA, 64."}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3517652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:00Z","timestamp":1750191420000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":73,"alternative-id":["10.1145\/3491102.3517652","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3517652","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}