{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:09:32Z","timestamp":1774634972818,"version":"3.50.1"},"reference-count":79,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Smartphone users are often unaware of mobile applications\u2019 (\u201capps\u201d) third-party data collection and sharing practices, which put them at higher risk of privacy breaches. One way to raise awareness of these practices is by providing unobtrusive but pervasive visualizations that can be presented in a glanceable manner. In this paper, we applied Wogalter et al.\u2019s Communication-Human Information Processing model (C-HIP) to design and prototype eight different visualizations that depict smartphone apps\u2019 data sharing activities. We varied the granularity and type (i.e., data-centric or app-centric) of information shown to users and used the screensaver\/lock screen as a design probe. Through interview-based design probes with Android users (n=15), we investigated the aspects of the data exposure visualizations that influenced users\u2019 comprehension and privacy awareness. Our results shed light on how users\u2019 perceptions of privacy boundaries influence their preference regarding the information structure of these visualizations, and the tensions that exist in these visualizations between glanceability and granularity. We discuss how a pervasive, soft paternalistic approach to privacy-related visualization may raise awareness by enhancing the transparency of information flow, thereby, unobtrusively increasing users\u2019 understanding of data sharing practices of mobile apps. We also discuss implications for privacy research and glanceable security.<\/jats:p>","DOI":"10.2478\/popets-2020-0034","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T15:01:19Z","timestamp":1590505279000},"page":"416-435","source":"Crossref","is-referenced-by-count":10,"title":["Privacy at a Glance: The User-Centric Design of Glanceable Data Exposure Visualizations"],"prefix":"10.56553","volume":"2020","author":[{"given":"Daricia","family":"Wilkinson","sequence":"first","affiliation":[{"name":"Clemson University"}]},{"given":"Paritosh","family":"Bahirat","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Moses","family":"Namara","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Jing","family":"Lyu","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Arwa","family":"Alsubhi","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Jessica","family":"Qiu","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Pamela","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University"}]}],"member":"35752","published-online":{"date-parts":[[2020,5,8]]},"reference":[{"key":"2022050203061728923_j_popets-2020-0034_ref_001_w2aab3b7c42b1b6b1ab1ab1Aa","unstructured":"[1] \u201cMozilla: Lightbeam.\u201d [Online]. Available: https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/lightbeam\/"},{"key":"2022050203061728923_j_popets-2020-0034_ref_002_w2aab3b7c42b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] A. Acquisti, \u201cNudging privacy: The behavioral economics of personal information,\u201d IEEE security & privacy, vol. 7, no. 6, pp. 82\u201385, 2009.10.1109\/MSP.2009.163","DOI":"10.1109\/MSP.2009.163"},{"key":"2022050203061728923_j_popets-2020-0034_ref_003_w2aab3b7c42b1b6b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"[3] A. Adams and M. A. Sasse, \u201cUsers are not the enemy,\u201d Communications of the ACM, vol. 42, no. 12, pp. 40\u201346, 1999. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=32280610.1145\/322796.322806","DOI":"10.1145\/322796.322806"},{"key":"2022050203061728923_j_popets-2020-0034_ref_004_w2aab3b7c42b1b6b1ab1ab4Aa","doi-asserted-by":"crossref","unstructured":"[4] Y. Agarwal and M. Hall, \u201cProtectmyprivacy: detecting and mitigating privacy leaks on ios devices using crowdsourcing,\u201d in Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, 2013, pp. 97\u2013110.10.1145\/2462456.2464460","DOI":"10.1145\/2462456.2464460"},{"key":"2022050203061728923_j_popets-2020-0034_ref_005_w2aab3b7c42b1b6b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"[5] J. Angulo, S. Fischer-H\u00fcbner, T. Pulls, and E. W\u00e4stlund, \u201cUsable transparency with the data track: a tool for visualizing data disclosures,\u201d in Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2015, pp. 1803\u20131808.10.1145\/2702613.2732701","DOI":"10.1145\/2702613.2732701"},{"key":"2022050203061728923_j_popets-2020-0034_ref_006_w2aab3b7c42b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] A. Azfar, K.-K. R. Choo, and L. Liu, \u201cForensic taxonomy of android productivity apps,\u201d Multimedia Tools and Applications, vol. 76, no. 3, pp. 3313\u20133341, 2017.","DOI":"10.1007\/s11042-016-3718-2"},{"key":"2022050203061728923_j_popets-2020-0034_ref_007_w2aab3b7c42b1b6b1ab1ab7Aa","doi-asserted-by":"crossref","unstructured":"[7] M. Backes, S. Bugiel, and E. Derr, \u201cReliable third-party library detection in android and its security applications,\u201d in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 356\u2013367.10.1145\/2976749.2978333","DOI":"10.1145\/2976749.2978333"},{"key":"2022050203061728923_j_popets-2020-0034_ref_008_w2aab3b7c42b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] P. Bahirat, Y. He, A. Menon, and B. Knijnenburg, \u201cA Data-Driven Approach to Developing IoT Privacy-Setting Interfaces,\u201d in 23rd International Conference on Intelligent User Interfaces. ACM, 2018, pp. 165\u2013176.10.1145\/3172944.3172982","DOI":"10.1145\/3172944.3172982"},{"key":"2022050203061728923_j_popets-2020-0034_ref_009_w2aab3b7c42b1b6b1ab1ab9Aa","doi-asserted-by":"crossref","unstructured":"[9] K. Benton, L. J. Camp, and C. Small, \u201cOpenFlow vulnerability assessment,\u201d in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 151\u2013152.10.1145\/2491185.2491222","DOI":"10.1145\/2491185.2491222"},{"key":"2022050203061728923_j_popets-2020-0034_ref_010_w2aab3b7c42b1b6b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] R. B\u00f6hme and J. Grossklags, \u201cThe security cost of cheap user interaction,\u201d in Proceedings of the 2011 workshop on New security paradigms workshop. ACM, 2011, pp. 67\u201382. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=207328410.1145\/2073276.2073284","DOI":"10.1145\/2073276.2073284"},{"key":"2022050203061728923_j_popets-2020-0034_ref_011_w2aab3b7c42b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"[11] R. Binns, U. Lyngs, M. Van Kleek, J. Zhao, T. Libert, and N. Shadbolt, \u201cThird Party Tracking in the Mobile Ecosystem,\u201d arXiv preprint arXiv:1804.03603, 2018.","DOI":"10.31235\/osf.io\/u7qmz"},{"key":"2022050203061728923_j_popets-2020-0034_ref_012_w2aab3b7c42b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"[12] D. M. Boyd and N. B. Ellison, \u201cSocial network sites: Definition, history, and scholarship,\u201d Journal of computer-mediated Communication, vol. 13, no. 1, pp. 210\u2013230, 2007.10.1111\/j.1083-6101.2007.00393.x","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"2022050203061728923_j_popets-2020-0034_ref_013_w2aab3b7c42b1b6b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] K. Caine, \u201cLocal Standards for Sample Size at CHI,\u201d in Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ser. CHI \u201916. New York, NY, USA: ACM, 2016, pp. 981\u2013992, event-place: San Jose, California, USA. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2858036.285849810.1145\/2858036.2858498","DOI":"10.1145\/2858036.2858498"},{"key":"2022050203061728923_j_popets-2020-0034_ref_014_w2aab3b7c42b1b6b1ab1ac14Aa","unstructured":"[14] P. R. Center, \u201cMobile Fact Sheet,\u201d Pew Research Center: Internet, Science & Tech, Feb. 2018. [Online]. Available: http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/"},{"key":"2022050203061728923_j_popets-2020-0034_ref_015_w2aab3b7c42b1b6b1ab1ac15Aa","unstructured":"[15] L. Cerejo, \u201cGlanceability & The Glanceable User Experience,\u201d Jul. 2013. [Online]. Available: https:\/\/www.capgemini.com\/2013\/07\/glanceability-the-glanceable-user-experience\/"},{"key":"2022050203061728923_j_popets-2020-0034_ref_016_w2aab3b7c42b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] T. Chen, I. Ullah, M. A. Kaafar, and R. Boreli, \u201cInformation Leakage Through Mobile Analytics Services,\u201d in Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, ser. HotMobile \u201914. New York, NY, USA: ACM, 2014, pp. 15:1\u201315:6. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2565585.256559310.1145\/2565585.2565593","DOI":"10.1145\/2565585.2565593"},{"key":"2022050203061728923_j_popets-2020-0034_ref_017_w2aab3b7c42b1b6b1ab1ac17Aa","doi-asserted-by":"crossref","unstructured":"[17] P. H. Chia, Y. Yamamoto, and N. Asokan, \u201cIs this app safe?: a large scale study on application permissions and risk signals,\u201d in Proceedings of the 21st international conference on World Wide Web. ACM, 2012, pp. 311\u2013320. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=218787910.1145\/2187836.2187879","DOI":"10.1145\/2187836.2187879"},{"key":"2022050203061728923_j_popets-2020-0034_ref_018_w2aab3b7c42b1b6b1ab1ac18Aa","doi-asserted-by":"crossref","unstructured":"[18] R. Compa\u00f1\u00f3 and W. Lusoli, \u201cThe policy maker\u2019s anguish: Regulating personal data behavior between paradoxes and dilemmas,\u201d in Economics of Information Security and Privacy. Springer, 2010, pp. 169\u2013185.10.1007\/978-1-4419-6967-5_9","DOI":"10.1007\/978-1-4419-6967-5_9"},{"key":"2022050203061728923_j_popets-2020-0034_ref_019_w2aab3b7c42b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"[19] I. Dey, Qualitative data analysis: A user friendly guide for social scientists. Routledge, 2003.10.4324\/9780203412497","DOI":"10.4324\/9780203412497"},{"key":"2022050203061728923_j_popets-2020-0034_ref_020_w2aab3b7c42b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, \u201cTaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,\u201d ACM Transactions on Computer Systems (TOCS), vol. 32, no. 2, p. 5, 2014.10.1145\/2619091","DOI":"10.1145\/2619091"},{"key":"2022050203061728923_j_popets-2020-0034_ref_021_w2aab3b7c42b1b6b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, \u201cAndroid permissions: User attention, comprehension, and behavior,\u201d in Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012, p. 3. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=233536010.1145\/2335356.2335360","DOI":"10.1145\/2335356.2335360"},{"key":"2022050203061728923_j_popets-2020-0034_ref_022_w2aab3b7c42b1b6b1ab1ac22Aa","doi-asserted-by":"crossref","unstructured":"[22] S. Fischer-H\u00fcbner, J. Angulo, F. Karegar, and T. Pulls, \u201cTransparency, Privacy and Trust\u2013Technology for Tracking and Controlling My Data Disclosures: Does This Work?\u201d in IFIP International Conference on Trust Management. Springer, 2016, pp. 3\u201314.10.1007\/978-3-319-41354-9_1","DOI":"10.1007\/978-3-319-41354-9_1"},{"key":"2022050203061728923_j_popets-2020-0034_ref_023_w2aab3b7c42b1b6b1ab1ac23Aa","doi-asserted-by":"crossref","unstructured":"[23] H. Fu, Y. Yang, N. Shingte, J. Lindqvist, and M. Gruteser, \u201cA field study of run-time location access disclosures on android smartphones,\u201d Proc. USEC, vol. 14, 2014.10.14722\/usec.2014.23044","DOI":"10.14722\/usec.2014.23044"},{"key":"2022050203061728923_j_popets-2020-0034_ref_024_w2aab3b7c42b1b6b1ab1ac24Aa","doi-asserted-by":"crossref","unstructured":"[24] R. Gouveia, E. Karapanos, and M. Hassenzahl, \u201cHow do we engage with activity trackers?: a longitudinal study of habito,\u201d in Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2015, pp. 1305\u20131316.10.1145\/2750858.2804290","DOI":"10.1145\/2750858.2804290"},{"key":"2022050203061728923_j_popets-2020-0034_ref_025_w2aab3b7c42b1b6b1ab1ac25Aa","doi-asserted-by":"crossref","unstructured":"[25] R. Gouveia, F. Pereira, A. Caraban, S. A. Munson, and E. Karapanos, \u201cYou have 5 seconds: designing glanceable feedback for physical activity trackers,\u201d in Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, 2015, pp. 643\u2013647.10.1145\/2800835.2809437","DOI":"10.1145\/2800835.2809437"},{"key":"2022050203061728923_j_popets-2020-0034_ref_026_w2aab3b7c42b1b6b1ab1ac26Aa","doi-asserted-by":"crossref","unstructured":"[26] R. Gouveia, F. Pereira, E. Karapanos, S. A. Munson, and M. Hassenzahl, \u201cExploring the design space of glanceable feedback for physical activity trackers,\u201d in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2016, pp. 144\u2013155.10.1145\/2971648.2971754","DOI":"10.1145\/2971648.2971754"},{"key":"2022050203061728923_j_popets-2020-0034_ref_027_w2aab3b7c42b1b6b1ab1ac27Aa","unstructured":"[27] G. Gronier, \u201cMeasuring the First Impression: Testing the Validity of the 5 Second Test,\u201d J. Usability Studies, vol. 12, no. 1, pp. 8\u201325, Nov. 2016. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=3040226.3040228"},{"key":"2022050203061728923_j_popets-2020-0034_ref_028_w2aab3b7c42b1b6b1ab1ac28Aa","doi-asserted-by":"crossref","unstructured":"[28] G. Guest, K. MacQueen, and E. Namey, Applied Thematic Analysis. SAGE Publications, Inc., 2012. [Online]. Available: http:\/\/methods.sagepub.com\/book\/applied-thematic-analysis10.4135\/9781483384436","DOI":"10.4135\/9781483384436"},{"key":"2022050203061728923_j_popets-2020-0034_ref_029_w2aab3b7c42b1b6b1ab1ac29Aa","doi-asserted-by":"crossref","unstructured":"[29] R. Herbster, S. DellaTorre, P. Druschel, and B. Bhattacharjee, \u201cPrivacy Capsules: Preventing Information Leaks by Mobile Apps,\u201d in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys \u201916. New York, NY, USA: ACM, 2016, pp. 399\u2013411. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2906388.290640910.1145\/2906388.2906409","DOI":"10.1145\/2906388.2906409"},{"key":"2022050203061728923_j_popets-2020-0034_ref_030_w2aab3b7c42b1b6b1ab1ac30Aa","doi-asserted-by":"crossref","unstructured":"[30] Q. Ismail, T. Ahmed, K. Caine, A. Kapadia, and M. Reiter, \u201cTo permit or not to permit, that is the usability question: Crowdsourcing mobile apps\u2019 privacy permission settings,\u201d Proceedings on Privacy Enhancing Technologies, vol. 2017, no. 4, pp. 119\u2013137, 2017.","DOI":"10.1515\/popets-2017-0041"},{"key":"2022050203061728923_j_popets-2020-0034_ref_031_w2aab3b7c42b1b6b1ab1ac31Aa","unstructured":"[31] P. Karr-Wisniewski, D. Wilson, and H. Richter-Lipford, \u201cA new social order: Mechanisms for social network site boundary regulation,\u201d in Americas Conference on Information Systems, AMCIS, 2011. [Online]. Available: http:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1141&context=amcis2011_submissions"},{"key":"2022050203061728923_j_popets-2020-0034_ref_032_w2aab3b7c42b1b6b1ab1ac32Aa","doi-asserted-by":"crossref","unstructured":"[32] P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder, \u201cA \u201cNutrition Label\u201d for Privacy,\u201d in Proceedings of the 5th Symposium on Usable Privacy and Security, ser. SOUPS \u201909. New York, NY, USA: ACM, 2009, pp. 4:1\u20134:12. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1572532.157253810.1145\/1572532.1572538","DOI":"10.1145\/1572532.1572538"},{"key":"2022050203061728923_j_popets-2020-0034_ref_033_w2aab3b7c42b1b6b1ab1ac33Aa","doi-asserted-by":"crossref","unstructured":"[33] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall, \u201cA Conundrum of Permissions: Installing Applications on an Android Smartphone,\u201d in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, J. Blyth, S. Dietrich, and L. J. Camp, Eds., vol. 7398. Springer Berlin Heidelberg, 2012, pp. 68\u201379.","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"2022050203061728923_j_popets-2020-0034_ref_034_w2aab3b7c42b1b6b1ab1ac34Aa","doi-asserted-by":"crossref","unstructured":"[34] P. G. Kelley, L. F. Cranor, and N. Sadeh, \u201cPrivacy As Part of the App Decision-making Process,\u201d in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI \u201913. New York, NY, USA: ACM, 2013, pp. 3393\u20133402. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2470654.246646610.1145\/2470654.2466466","DOI":"10.1145\/2470654.2466466"},{"key":"2022050203061728923_j_popets-2020-0034_ref_035_w2aab3b7c42b1b6b1ab1ac35Aa","doi-asserted-by":"crossref","unstructured":"[35] P. Klasnja, S. Consolvo, D. W. McDonald, J. A. Landay, and W. Pratt, \u201cUsing mobile & personal sensing technologies to support health behavior change in everyday life: lessons learned,\u201d in AMIA Annual Symposium Proceedings, vol. 2009. American Medical Informatics Association, 2009, p. 338.","DOI":"10.1145\/1518701.1518766"},{"key":"2022050203061728923_j_popets-2020-0034_ref_036_w2aab3b7c42b1b6b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] B. P. Knijnenburg, \u201cPrivacy? I Can\u2019t Even! Making a Case for User-Tailored Privacy,\u201d IEEE Security & Privacy, vol. 15, no. 4, pp. 62\u201367, 2017.10.1109\/MSP.2017.3151331","DOI":"10.1109\/MSP.2017.3151331"},{"key":"2022050203061728923_j_popets-2020-0034_ref_037_w2aab3b7c42b1b6b1ab1ac37Aa","doi-asserted-by":"crossref","unstructured":"[37] B. P. Knijnenburg and A. Kobsa, \u201cMaking decisions about privacy: information disclosure in context-aware recommender systems,\u201d ACM Transactions on Interactive Intelligent Systems (TiiS), vol. 3, no. 3, p. 20, 2013.10.1145\/2499670","DOI":"10.1145\/2499670"},{"key":"2022050203061728923_j_popets-2020-0034_ref_038_w2aab3b7c42b1b6b1ab1ac38Aa","unstructured":"[38] H. D. Laswell, \u201cThe structure and function of communication in society,\u201d The communication of ideas, 1948."},{"key":"2022050203061728923_j_popets-2020-0034_ref_039_w2aab3b7c42b1b6b1ab1ac39Aa","doi-asserted-by":"crossref","unstructured":"[39] A. Le, J. Varmarken, S. Langhoff, A. Shuba, M. Gjoka, and A. Markopoulou, \u201cAntMonitor: A system for monitoring from mobile devices,\u201d in Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data. ACM, 2015, pp. 15\u201320.10.1145\/2787394.2787396","DOI":"10.1145\/2787394.2787396"},{"key":"2022050203061728923_j_popets-2020-0034_ref_040_w2aab3b7c42b1b6b1ab1ac40Aa","doi-asserted-by":"crossref","unstructured":"[40] A. Le, J. Varmarken, S. Langhoff, A. Shuba, M. Gjoka, and A. Markopoulou, \u201cAntmonitor: A system for monitoring from mobile devices,\u201d in Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data. ACM, 2015, pp. 15\u201320.10.1145\/2787394.2787396","DOI":"10.1145\/2787394.2787396"},{"key":"2022050203061728923_j_popets-2020-0034_ref_041_w2aab3b7c42b1b6b1ab1ac41Aa","doi-asserted-by":"crossref","unstructured":"[41] J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang, \u201cExpectation and Purpose: Understanding Users\u2019 Mental Models of Mobile App Privacy Through Crowd-sourcing,\u201d in Proceedings of the 2012 ACM Conference on Ubiquitous Computing, ser. UbiComp \u201912. New York, NY, USA: ACM, 2012, pp. 501\u2013510. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2370216.237029010.1145\/2370216.2370290","DOI":"10.1145\/2370216.2370290"},{"key":"2022050203061728923_j_popets-2020-0034_ref_042_w2aab3b7c42b1b6b1ab1ac42Aa","doi-asserted-by":"crossref","unstructured":"[42] Y.-H. Lin, C.-H. Fang, and C.-L. Hsu, \u201cDetermining Uses and Gratifications for Mobile Phone Apps,\u201d in Future Information Technology, ser. Lecture Notes in Electrical Engineering, J. J. J. H. Park, Y. Pan, C.-S. Kim, and Y. Yang, Eds. Springer Berlin Heidelberg, 2014, pp. 661\u2013668.10.1007\/978-3-642-55038-6_103","DOI":"10.1007\/978-3-642-55038-6_103"},{"key":"2022050203061728923_j_popets-2020-0034_ref_043_w2aab3b7c42b1b6b1ab1ac43Aa","unstructured":"[43] H. R. Lipford, A. Besmer, and J. Watson, \u201cUnderstanding Privacy Settings in Facebook with an Audience View,\u201d in Proceedings of the 1st Conference on Usability, Psychology, and Security, ser. UPSEC\u201908. Berkeley, CA, USA: USENIX Association, 2008, pp. 2:1\u20132:8. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=1387649.1387651"},{"key":"2022050203061728923_j_popets-2020-0034_ref_044_w2aab3b7c42b1b6b1ab1ac44Aa","unstructured":"[44] B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. A. Zhang, N. Sadeh, Y. Agarwal, and A. Acquisti, \u201cFollow my recommendations: A personalized privacy assistant for mobile app permissions,\u201d in Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016, pp. 27\u201341."},{"key":"2022050203061728923_j_popets-2020-0034_ref_045_w2aab3b7c42b1b6b1ab1ac45Aa","doi-asserted-by":"crossref","unstructured":"[45] B. Liu, J. Lin, and N. Sadeh, \u201cReconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help?\u201d in Proceedings of the 23rd International Conference on World Wide Web, ser. WWW \u201914. New York, NY, USA: ACM, 2014, pp. 201\u2013212. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2566486.256803510.1145\/2566486.2568035","DOI":"10.1145\/2566486.2568035"},{"key":"2022050203061728923_j_popets-2020-0034_ref_046_w2aab3b7c42b1b6b1ab1ac46Aa","unstructured":"[46] T. Matthews, D. Blais, A. Shick, J. Mankoff, J. Forlizzi, S. Rohrbach, and R. Klatzky, \u201cEvaluating glanceable visuals for multitasking,\u201d Technical Report EECS-2006-173. UC Berkeley, Tech. Rep., 2006."},{"key":"2022050203061728923_j_popets-2020-0034_ref_047_w2aab3b7c42b1b6b1ab1ac47Aa","doi-asserted-by":"crossref","unstructured":"[47] W. Nayam, A. Laolee, L. Charoenwatana, and K. Sripanidkulchai, \u201cAn Analysis of Mobile Application Network Behavior,\u201d in Proceedings of the 12th Asian Internet Engineering Conference, ser. AINTEC \u201916. New York, NY, USA: ACM, 2016, pp. 9\u201316. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/3012695.301269710.1145\/3012695.3012697","DOI":"10.1145\/3012695.3012697"},{"key":"2022050203061728923_j_popets-2020-0034_ref_048_w2aab3b7c42b1b6b1ab1ac48Aa","doi-asserted-by":"crossref","unstructured":"[48] H. Nissenbaum, \u201cA contextual approach to privacy online,\u201d Daedalus, vol. 140, no. 4, pp. 32\u201348, 2011.10.1162\/DAED_a_00113","DOI":"10.1162\/DAED_a_00113"},{"key":"2022050203061728923_j_popets-2020-0034_ref_049_w2aab3b7c42b1b6b1ab1ac49Aa","doi-asserted-by":"crossref","unstructured":"[49] P. A. Norberg, D. R. Horne, and D. A. Horne, \u201cThe Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors,\u201d Journal of Consumer Affairs, vol. 41, no. 1, pp. 100\u2013126, Jun. 2007. [Online]. Available: http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1745-6606.2006.00070.x\/abstract10.1111\/j.1745-6606.2006.00070.x","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"2022050203061728923_j_popets-2020-0034_ref_050_w2aab3b7c42b1b6b1ab1ac50Aa","doi-asserted-by":"crossref","unstructured":"[50] A. Oglaza, R. Laborde, A. Benzekri, and F. Barr\u00e8re, \u201cA Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions,\u201d in 2016 11th International Conference on Availability, Reliability and Security (ARES), Aug. 2016, pp. 1\u20139.10.1109\/ARES.2016.54","DOI":"10.1109\/ARES.2016.54"},{"key":"2022050203061728923_j_popets-2020-0034_ref_051_w2aab3b7c42b1b6b1ab1ac51Aa","doi-asserted-by":"crossref","unstructured":"[51] A. Oulasvirta, T. Rattenbury, L. Ma, and E. Raita, \u201cHabits make smartphone use more pervasive,\u201d Personal and Ubiquitous Computing, vol. 16, no. 1, pp. 105\u2013114, 2012.10.1007\/s00779-011-0412-2","DOI":"10.1007\/s00779-011-0412-2"},{"key":"2022050203061728923_j_popets-2020-0034_ref_052_w2aab3b7c42b1b6b1ab1ac52Aa","unstructured":"[52] X. W. Page, Factors that Influence Adoption and Use of Location-Sharing Social Media. University of California, Irvine, 2014. [Online]. Available: http:\/\/search.proquest.com\/openview\/6b7ed26f5c311b4d1691b2d966cf3873\/1?pqorigsite=gscholar&cbl=18750&diss=y"},{"key":"2022050203061728923_j_popets-2020-0034_ref_053_w2aab3b7c42b1b6b1ab1ac53Aa","unstructured":"[53] S. Petronio, Boundaries of Privacy: Dialectics of Disclosure. SUNY Press, Feb. 2012, google-Books-ID: 8v89W_oJQ0wC."},{"key":"2022050203061728923_j_popets-2020-0034_ref_054_w2aab3b7c42b1b6b1ab1ac54Aa","doi-asserted-by":"crossref","unstructured":"[54] M. Pielot, A. Vradi, and S. Park, \u201cDismissed!: a detailed exploration of how mobile phone users handle push notifications,\u201d in Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, 2018, p. 3.10.1145\/3229434.3229445","DOI":"10.1145\/3229434.3229445"},{"key":"2022050203061728923_j_popets-2020-0034_ref_055_w2aab3b7c42b1b6b1ab1ac55Aa","unstructured":"[55] P. Rajivan and J. Camp, \u201cInfluence of Privacy Attitude and Privacy Cue Framing on Android App Choices,\u201d in Symposium on Usable Privacy and Security (SOUPS), 2016. [Online]. Available: https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/wpi16_paper-rajivan.pdf"},{"key":"2022050203061728923_j_popets-2020-0034_ref_056_w2aab3b7c42b1b6b1ab1ac56Aa","unstructured":"[56] A. Rao, F. Schaub, N. Sadeh, A. Acquisti, and R. Kang, \u201cExpecting the unexpected: Understanding mismatched privacy expectations online,\u201d in Symposium on Usable Privacy and Security (SOUPS), vol. 4, 2016, p. 2."},{"key":"2022050203061728923_j_popets-2020-0034_ref_057_w2aab3b7c42b1b6b1ab1ac57Aa","unstructured":"[57] A. Razaghpanah, N. Vallina-Rodriguez, S. Sundaresan, C. Kreibich, P. Gill, M. Allman, and V. Paxson, \u201cHaystack: In situ mobile traffic analysis in user space,\u201d ArXiv e-prints, 2015."},{"key":"2022050203061728923_j_popets-2020-0034_ref_058_w2aab3b7c42b1b6b1ab1ac58Aa","unstructured":"[58] J. Ren, M. Lindorfer, D. J. Dubois, A. Rao, D. Choffnes, and N. Vallina-Rodriguez, \u201cBug Fixes, Improvements,... and Privacy Leaks,\u201d 2018."},{"key":"2022050203061728923_j_popets-2020-0034_ref_059_w2aab3b7c42b1b6b1ab1ac59Aa","unstructured":"[59] J. Ren, A. Rao, M. Lindorfer, A. Legout, and D. Choffnes, \u201cReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic,\u201d in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys \u201916. New York, NY, USA: ACM, 2016, pp. 361\u2013374. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2906388.2906392"},{"key":"2022050203061728923_j_popets-2020-0034_ref_060_w2aab3b7c42b1b6b1ab1ac60Aa","doi-asserted-by":"crossref","unstructured":"[60] Y. Rogers, W. R. Hazlewood, P. Marshall, N. Dalton, and S. Hertrich, \u201cAmbient influence: Can twinkly lights lure and abstract representations trigger behavioral change?\u201d in Proceedings of the 12th ACM international conference on Ubiquitous computing. ACM, 2010, pp. 261\u2013270.10.1145\/1864349.1864372","DOI":"10.1145\/1864349.1864372"},{"key":"2022050203061728923_j_popets-2020-0034_ref_061_w2aab3b7c42b1b6b1ab1ac61Aa","unstructured":"[61] R. Roshandel and R. Tyler, \u201cUser-centric Monitoring of Sensitive Information Access in Android Applications,\u201d in Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems, ser. MOBILESoft \u201915. Piscataway, NJ, USA: IEEE Press, 2015, pp. 144\u2013145. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=2825041.2825076"},{"key":"2022050203061728923_j_popets-2020-0034_ref_062_w2aab3b7c42b1b6b1ab1ac62Aa","doi-asserted-by":"crossref","unstructured":"[62] G. L. Scoccia, I. Malavolta, M. Autili, A. Di Salle, and P. Inverardi, \u201cUser-centric Android Flexible Permissions,\u201d in Proceedings of the 39th International Conference on Software Engineering Companion, ser. ICSE-C \u201917. Piscataway, NJ, USA: IEEE Press, 2017, pp. 365\u2013367. [Online]. Available: https:\/\/doi.org\/10.1109\/ICSE-C.2017.8410.1109\/ICSE-C.2017.84","DOI":"10.1109\/ICSE-C.2017.84"},{"key":"2022050203061728923_j_popets-2020-0034_ref_063_w2aab3b7c42b1b6b1ab1ac63Aa","doi-asserted-by":"crossref","unstructured":"[63] C. E. Shannon, \u201cA mathematical theory of communication,\u201d ACM SIGMOBILE mobile computing and communications review, vol. 5, no. 1, pp. 3\u201355, 2001.10.1145\/584091.584093","DOI":"10.1145\/584091.584093"},{"key":"2022050203061728923_j_popets-2020-0034_ref_064_w2aab3b7c42b1b6b1ab1ac64Aa","doi-asserted-by":"crossref","unstructured":"[64] I. Shklovski, S. D. Mainwaring, H. H. Sk\u00falad\u00f3ttir, and H. Borgthorsson, \u201cLeakiness and creepiness in app space: Perceptions of privacy and mobile app use,\u201d in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2014, pp. 2347\u20132356.10.1145\/2556288.2557421","DOI":"10.1145\/2556288.2557421"},{"key":"2022050203061728923_j_popets-2020-0034_ref_065_w2aab3b7c42b1b6b1ab1ac65Aa","doi-asserted-by":"crossref","unstructured":"[65] H. J. Smith, S. J. Milberg, and S. J. Burke, \u201cInformation privacy: measuring individuals\u2019 concerns about organizational practices,\u201d MIS quarterly, pp. 167\u2013196, 1996. [Online]. Available: http:\/\/www.jstor.org\/stable\/24947710.2307\/249477","DOI":"10.2307\/249477"},{"key":"2022050203061728923_j_popets-2020-0034_ref_066_w2aab3b7c42b1b6b1ab1ac66Aa","unstructured":"[66] G. Srivastava, S. Chitkara, K. Ku, S. K. Sahoo, M. Fredrikson, J. Hong, and Y. Agarwal, \u201cPrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage,\u201d arXiv preprint arXiv:1708.06384, 2017."},{"key":"2022050203061728923_j_popets-2020-0034_ref_067_w2aab3b7c42b1b6b1ab1ac67Aa","unstructured":"[67] G. Srivastava, S. Chitkara, K. Ku, S. K. Sahoo, M. Fredrikson, J. I. Hong, and Y. Agarwal, \u201cPrivacyproxy: Leveraging crowdsourcing and in situ traffic analysis to detect and mitigate information leakage,\u201d ArXiv, vol. abs\/1708.06384, 2017."},{"key":"2022050203061728923_j_popets-2020-0034_ref_068_w2aab3b7c42b1b6b1ab1ac68Aa","unstructured":"[68] A. Strauss and J. Corbin, Basics of qualitative research: Procedures and techniques for developing grounded theory. Thousand Oaks, CA: Sage, 1998."},{"key":"2022050203061728923_j_popets-2020-0034_ref_069_w2aab3b7c42b1b6b1ab1ac69Aa","doi-asserted-by":"crossref","unstructured":"[69] J. A. Tran, K. S. Yang, K. Davis, and A. Hiniker, \u201cModeling the engagement-disengagement cycle of compulsive phone use,\u201d in Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 2019, p. 312.10.1145\/3290605.3300542","DOI":"10.1145\/3290605.3300542"},{"key":"2022050203061728923_j_popets-2020-0034_ref_070_w2aab3b7c42b1b6b1ab1ac70Aa","doi-asserted-by":"crossref","unstructured":"[70] M. Van Kleek, R. Binns, J. Zhao, A. Slack, S. Lee, D. Ottewell, and N. Shadbolt, \u201cX-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps,\u201d in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ser. CHI \u201918. New York, NY, USA: ACM, 2018, pp. 393:1\u2013393:13. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/3173574.317396710.1145\/3173574.3173967","DOI":"10.1145\/3173574.3173967"},{"key":"2022050203061728923_j_popets-2020-0034_ref_071_w2aab3b7c42b1b6b1ab1ac71Aa","unstructured":"[71] J. Vitak, S. Blasiola, S. Patil, and E. Litt, \u201cBalancing audience and privacy tensions on social network sites: Strategies of highly engaged users,\u201d International Journal of Communication, vol. 9, p. 20, 2015."},{"key":"2022050203061728923_j_popets-2020-0034_ref_072_w2aab3b7c42b1b6b1ab1ac72Aa","doi-asserted-by":"crossref","unstructured":"[72] Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, and L. F. Cranor, \u201cPrivacy Nudges for Social Media: An Exploratory Facebook Study,\u201d in Proceedings of the 22Nd International Conference on World Wide Web, ser. WWW \u201913 Companion. New York, NY, USA: ACM, 2013, pp. 763\u2013770. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/2487788.248803810.1145\/2487788.2488038","DOI":"10.1145\/2487788.2488038"},{"key":"2022050203061728923_j_popets-2020-0034_ref_073_w2aab3b7c42b1b6b1ab1ac73Aa","unstructured":"[73] D. Wetherall, D. R. Choffnes, B. Greenstein, S. Han, P. Hornyack, J. Jung, S. E. Schechter, and X. S. Wang, \u201cPrivacy Revelations for Web and Mobile Apps.\u201d in HotOS, 2011. [Online]. Available: http:\/\/static.usenix.org\/event\/hotos\/tech\/final_files\/Wetherall.pdf"},{"key":"2022050203061728923_j_popets-2020-0034_ref_074_w2aab3b7c42b1b6b1ab1ac74Aa","unstructured":"[74] P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov, \u201cAndroid permissions remystified: A field study on contextual integrity,\u201d in 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 499\u2013514."},{"key":"2022050203061728923_j_popets-2020-0034_ref_075_w2aab3b7c42b1b6b1ab1ac75Aa","doi-asserted-by":"crossref","unstructured":"[75] P. J. Wisniewski, B. P. Knijnenburg, and H. R. Lipford, \u201cMaking privacy personal: Profiling social network users to inform privacy education and nudging,\u201d International Journal of Human-Computer Studies, vol. 98, pp. 95\u2013108, Feb. 2017. [Online]. Available: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S107158191630118510.1016\/j.ijhcs.2016.09.006","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"2022050203061728923_j_popets-2020-0034_ref_076_w2aab3b7c42b1b6b1ab1ac76Aa","unstructured":"[76] M. S. Wogalter, D. M. DeJoy, and K. R. Laughery, \u201cOrganizing theoretical framework: a consolidated communication-human information processing (C-HIP) model,\u201d Warnings and risk communication, pp. 15\u201323, 1999. [Online]. Available: https:\/\/books.google.com\/books?hl=en&lr=&id=6SuktVZ5UoAC&oi=fnd&pg=PA13&dq=Wogatler+C+hip&ots=LBRr4ZDRiE&sig=aUlatUT9dtRK09tGa16g-M0U8t8"},{"key":"2022050203061728923_j_popets-2020-0034_ref_077_w2aab3b7c42b1b6b1ab1ac77Aa","doi-asserted-by":"crossref","unstructured":"[77] H. Xu, H.-H. Teo, B. C. Tan, and R. Agarwal, \u201cResearch noteeffects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services,\u201d Information Systems Research, vol. 23, no. 4, pp. 1342\u20131363, 2012. [Online]. Available: http:\/\/pubsonline.informs.org\/doi\/abs\/10.1287\/isre.1120.041610.1287\/isre.1120.0416","DOI":"10.1287\/isre.1120.0416"},{"key":"2022050203061728923_j_popets-2020-0034_ref_078_w2aab3b7c42b1b6b1ab1ac78Aa","unstructured":"[78] J. Zang, K. Dummit, J. Graves, P. Lisker, and L. Sweeney, \u201cWho knows what about me? A survey of behind the scenes personal data sharing to third parties by mobile apps,\u201d Proceeding of Technology Science, 2015."},{"key":"2022050203061728923_j_popets-2020-0034_ref_079_w2aab3b7c42b1b6b1ab1ac79Aa","doi-asserted-by":"crossref","unstructured":"[79] A. Zavou, V. Pappas, V. P. Kemerlis, M. Polychronakis, G. Portokalidis, and A. D. Keromytis, \u201cCloudopsy: An autopsy of data flows in the cloud,\u201d in International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 2013, pp. 366\u2013375.10.1007\/978-3-642-39345-7_39","DOI":"10.1007\/978-3-642-39345-7_39"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/popets\/2020\/2\/article-p416.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2020-0034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:30:55Z","timestamp":1658334655000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2020\/popets-2020-0034.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":79,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,5,8]]},"published-print":{"date-parts":[[2020,4,1]]}},"alternative-id":["10.2478\/popets-2020-0034"],"URL":"https:\/\/doi.org\/10.2478\/popets-2020-0034","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}