[ Publications about 'Mobile Privacy' ]

Articles in journals or book chapters (2)
  1. Shakthidhar Reddy Gopavaram, Omkar Bhide, and L. Jean Camp. Can You Hear Me Now? Audio and Visual Interactions That Change App Choices. Frontiers in Psychology, 11:2227, 2020.
    Keywords: Mobile Privacy, Marketplace. [bibtex-entry]

  2. Shakthidhar Reddy Gopavaram, Jayati Dev, Sanchari Das, and Jean Camp. IoTMarketplace: Informing Purchase Decisions with Risk Communication. 2019.
    Keywords: IoT, Mental Models, Mobile Privacy. [bibtex-entry]

Conference publications (4)
  1. Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, and L Jean Camp. Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. In International Symposium on Human Aspects of Information Security and Assurance, pages 211--223, 2020. Springer.
    Keywords: Mobile Privacy, Usable Privacy, Usability. [bibtex-entry]

  2. Jonathan Schubauer, Anjanette Raymond, and Dhruv Madappa. Over-Priviliged Permission: Using Technology and Design to Create Privacy Compliance. In , June 2019. IACL.
    Keywords: Mobile Privacy, Governance, Privacy. [bibtex-entry]

  3. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016.
    Keywords: Mobile Privacy. [bibtex-entry]

  4. Kevin Benton, L. Jean Camp, and Vaibhav Garg. Studying the effectiveness of android application permissions requests. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 291--296, March 2013. IEEE.
    Keywords: Mental Models, Mobile Privacy. [bibtex-entry]

Posters and Presentations (1)
  1. Jonathan Schubauer, David Argast, and L. Jean Camp. Lessig was Right: Influences on Android Permissions. United States Federal Trade Commission PrivacyCon Conference, February 2018.
    Keywords: Mobile Privacy, Governance. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House