{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:06Z","timestamp":1750220406381,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,22]]},"DOI":"10.1145\/3494885.3494931","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T01:53:51Z","timestamp":1640051631000},"page":"257-261","source":"Crossref","is-referenced-by-count":1,"title":["The Assessment Method of Mobile privacy security Based on AHP and Risk Matrix"],"prefix":"10.1145","author":[{"given":"Ming","family":"Yang","sequence":"first","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, China"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, China"}]},{"given":"Tilei","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, China"}]},{"given":"Di","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, China"}]},{"given":"Di","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information, Yunnan University of Finance and Economics, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Research on risk factors and risk assessment methods of user privacy disclosure in mobile commerce [D]","author":"Zhang Tao","year":"2021","unstructured":"Zhang Tao . Research on risk factors and risk assessment methods of user privacy disclosure in mobile commerce [D] . Yunnan University of Finance and economics, 2021 . Zhang Tao. Research on risk factors and risk assessment methods of user privacy disclosure in mobile commerce [D]. Yunnan University of Finance and economics, 2021."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3067917.3159215"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.09.015"},{"key":"e_1_3_2_1_5_1","volume-title":"Su Han Mobile advertising Loophole attack technology based on host app's permission [J]. Journal of software","author":"Wang Chi-Heng","year":"2018","unstructured":"Wang Chi-Heng , Chen Jing , Su Han Mobile advertising Loophole attack technology based on host app's permission [J]. Journal of software , 2018 , 29 (05): 1392-1409. Wang Chi-Heng, Chen Jing, Su Han Mobile advertising Loophole attack technology based on host app's permission [J]. Journal of software, 2018, 29 (05): 1392-1409."},{"key":"e_1_3_2_1_6_1","volume-title":"Research on influencing factors and configuration effects of privacy information setting behavior of mobile app users [J]. Information science","author":"Zhu Hou","year":"2021","unstructured":"Zhu Hou ,Zhang Ming-Xin. Research on influencing factors and configuration effects of privacy information setting behavior of mobile app users [J]. Information science , 2021 ,39 (07): 54-62. Zhu Hou,Zhang Ming-Xin. Research on influencing factors and configuration effects of privacy information setting behavior of mobile app users [J]. Information science, 2021,39 (07): 54-62."},{"key":"e_1_3_2_1_7_1","volume-title":"International Workshop on Risk Assessment and Risk-driven Testing","author":"Mylonas A.","year":"2013","unstructured":"Mylonas A. , Theoharidou M. , Gritzalis D. Assessing privacy risks in android: A user-centric approach[C] . International Workshop on Risk Assessment and Risk-driven Testing . Springer , Cham , 2013 : 21-37. Mylonas A., Theoharidou M., Gritzalis D. Assessing privacy risks in android: A user-centric approach[C]. International Workshop on Risk Assessment and Risk-driven Testing. Springer, Cham, 2013: 21-37."},{"key":"e_1_3_2_1_8_1","volume-title":"Empirical Study on the impact and interaction of privacy preference setting and privacy feedback on Mobile Commerce Users' behavior intention [J]. China management science","author":"Liu Bai-Ling","year":"2018","unstructured":"Liu Bai-Ling , Yang Shi-Long, Li Yan-Hui . Empirical Study on the impact and interaction of privacy preference setting and privacy feedback on Mobile Commerce Users' behavior intention [J]. China management science , 2018 , 26 (08): 164-178. Liu Bai-Ling, Yang Shi-Long, Li Yan-Hui. Empirical Study on the impact and interaction of privacy preference setting and privacy feedback on Mobile Commerce Users' behavior intention [J]. China management science, 2018, 26 (08): 164-178."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/e21050462"},{"key":"e_1_3_2_1_10_1","volume-title":"CHEN Ye, Yang Jiayun. Research on fuzzy evaluation of privacy risk of social networks in big data environment [J]. Situation Journal of science","author":"Zhu Guang","year":"2016","unstructured":"Zhu Guang , Feng mining , CHEN Ye, Yang Jiayun. Research on fuzzy evaluation of privacy risk of social networks in big data environment [J]. Situation Journal of science , 2016 , 34 (09): 94-98. Zhu Guang, Feng mining, CHEN Ye, Yang Jiayun. Research on fuzzy evaluation of privacy risk of social networks in big data environment [J]. Situation Journal of science, 2016, 34 (09): 94-98."},{"key":"e_1_3_2_1_11_1","first-page":"75826","volume-title":"IEEE Access","author":"Yang M","year":"2021","unstructured":"Yang M , Jia L , Xie W , Research on Risk Assessment Model of Epidemic Diseases in a Certain Region Based on Markov Chain and AHP[J] . IEEE Access , 2021 , PP(99): 75826 - 75839 . Yang M , Jia L , Xie W , Research on Risk Assessment Model of Epidemic Diseases in a Certain Region Based on Markov Chain and AHP[J]. IEEE Access, 2021, PP(99):75826-75839."},{"key":"e_1_3_2_1_12_1","volume-title":"Research on model of Big data Usability and mining strategy based on AHP [J]. Computer technology and development","author":"Yang Ming","year":"2018","unstructured":"Yang Ming , Li Tie-bing, Jiang Rong , Research on model of Big data Usability and mining strategy based on AHP [J]. Computer technology and development , 2018 , 28 (05): 57-60 + 64. Yang Ming, Li Tie-bing, Jiang Rong, Research on model of Big data Usability and mining strategy based on AHP [J]. Computer technology and development, 2018, 28 (05): 57-60 + 64."}],"event":{"name":"CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering","acronym":"CSSE 2021","location":"Singapore Singapore"},"container-title":["2021 4th International Conference on Computer Science and Software Engineering (CSSE 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494885.3494931","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494885.3494931","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:59Z","timestamp":1750191539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494885.3494931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,22]]},"references-count":12,"alternative-id":["10.1145\/3494885.3494931","10.1145\/3494885"],"URL":"https:\/\/doi.org\/10.1145\/3494885.3494931","relation":{},"subject":[],"published":{"date-parts":[[2021,10,22]]}}}