2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.51
|View full text |Cite
|
Sign up to set email alerts
|

The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

Abstract: Abstract-Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal 131-person field study to analyze the contextuality behind user privacy decisions to regulate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

6
96
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 108 publications
(102 citation statements)
references
References 32 publications
6
96
0
Order By: Relevance
“…Carrascal et al prompted study participants about the value that they placed on personal information that they had recently transmitted to various websites [11]. Others have used ESM prompts to gather participants' reactions to different types of location-sharing requests [6,16,35], as well as to examine participants' willingness to share information with smartphone apps [14,38,46], and users' decisions to use various security mechanisms on their mobile devices [26].…”
Section: Varying Methodsmentioning
confidence: 99%
“…Carrascal et al prompted study participants about the value that they placed on personal information that they had recently transmitted to various websites [11]. Others have used ESM prompts to gather participants' reactions to different types of location-sharing requests [6,16,35], as well as to examine participants' willingness to share information with smartphone apps [14,38,46], and users' decisions to use various security mechanisms on their mobile devices [26].…”
Section: Varying Methodsmentioning
confidence: 99%
“…We argue that sensitive services should not exist unless they provide sufficient foreground clues to indicate their purposes. Users tend to reject requests without foreground as suggested by three recent user studies [25], [26], [18]. Indeed, the recent updates of Android further restrict background services [12].…”
Section: A Mediation and Data Extractionmentioning
confidence: 99%
“…For instance, one user allowed a request from a product rating page but rejected another with a closely related context. One possible explanation is that sometimes users are less cautious and make random decisions as suggested in [26]. Fortunately, our system can greatly help protect users from malicious behaviors caused by malware even if users make random decisions, since our generic model has already learned many misbehaviors in offline training.…”
Section: B Rq2: Effectiveness Of Capturing Personal Preferencesmentioning
confidence: 99%
See 2 more Smart Citations