Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3167996.3167999acmotherconferencesArticle/Chapter ViewAbstractPublication PagesstastConference Proceedingsconference-collections
research-article

FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness

Published: 05 December 2018 Publication History

Abstract

Albeit offering many benefits, smartphones can pose a severe privacy threat to users. While some users might simply be not aware of privacy issues, others are highly motivated to protect their data, but lack the ability and knowledge to do so. We developed an Android-based application called "FoxIT", which provides users with several education modules as well as a static smartphone and app permission analysis to increase both, privacy awareness and knowledge of mobile users. We conducted a first evaluation of FoxIT in a two-week field study with 31 users and were able to show that use of FoxIT not only leads to increased privacy awareness, but also improves knowledge about privacy related topics. Participants also reported to have improved the privacy conditions on their smartphone, actively informed themselves about privacy related topics, and prompted others to protect their data after using FoxIT. Our results indicate that it might be a promising approach to improve mobile users' privacy behavior by raising awareness and providing background information about privacy related topics.

References

[1]
{n. d.}. Badgeville: Game mechanics (http://badgeville.com/wiki/Game_Mechanics). ({n. d.}).
[2]
2010. What they know- Mobile (http://blogs.wsj.com/wtk-mobile/). (2010).
[3]
Mark S Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the 1st ACM conference on Electronic commerce. ACM, 1--8.
[4]
Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International Workshop on Privacy Enhancing Technologies. Springer, 36--58.
[5]
Paarijaat Aditya, Bobby Bhattacharjee, Peter Druschel, Viktor Erdélyi, and Matthew Lentz. 2014. Brave New World : Privacy Risks for Mobile Users. SPME '14 Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments (2014), 7--12. http://dl.acm.org/citation.cfm?id=2646585
[6]
Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, 97--110.
[7]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15. ACM Press, New York, New York, USA, 787--796.
[8]
Don Alsafi, Julia Bernd, Serge Egelman, Gerald Friedland, Dan Garcia, Lara McConnaughey, Irwin Reyes, and Ketrina Yim. {n. d.}. Teaching Privacy (https://dhttp://www.teachingprivacy.org). ({n. d.}).
[9]
Young Min Baek. 2014. Solving the privacy paradox: A counter-argument experimental approach. Computers in Human Behavior 38 (2014), 33--42.
[10]
R Balebako and L Cranor. 2014. Improving App Privacy: Nudging App Developers to Protect User Privacy. IEEE Security Privacy 12, 4 (2014), 55--58.
[11]
Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, and Carolyn Nguyen. 2013. "Little Brothers Watching You": Raising Awareness of Data Leaks on Smartphones. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, 12:1.
[12]
Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason I Hong, and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. In Proceedings of Workshop on Usable Security (USEC).
[13]
Rebecca Balebako, Florian Schaub, Idris Adjerid, Alessandro Acquisti, and Lorrie Cranor. 2015. The Impact of Timing on the Salience of Smartphone App Privacy Notices. Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '15 (2015), 63--74.
[14]
David Barrera, H Güne \ cs Kayacik, Paul C van Oorschot, and Anil Somayaji. 2010. A Methodology for Empirical Analysis of Permission-based Security Models and Its Application to Android. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10). ACM, New York, NY, USA, 73--84.
[15]
BreakAwayGames. 2013. Vital Signs. (2013). http://www.breakawaygames.com/vitalsigns/
[16]
BreakAwayGames. 2015. Virtual Dental Implant Trainer. (2015). http://www.breakawaygames.com/
[17]
Eun Kyoung Choe, Jaeyeon Jung, Bongshin Lee, and Kristie Fisher. 2013. Nudging people away from privacy-invasive mobile apps through visual framing. In IFIP Conference on Human-Computer Interaction. Springer, 74--91.
[18]
ChronicLogic. 2006. Bridge Builder. (2006). http://www.bridgebuilder-game.com/
[19]
Drew Davidson, Matt Fredrikson, and Benjamin Livshits. 2014. MoRePriv: mobile OS support for application personalization and privacy. ACSAC '14 Proceedings of the 30th Annual Computer Security Applications Conference (2014), 236--245. http://dl.acm.org/citation.cfm?id=2664243.2664266
[20]
André Deuker. 2010. Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services. In Privacy and Identity Management for Life, Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Ge Zhang, and Marit Hansen (Eds.). Springer, 275--283.
[21]
Android Developers. 2017. Requesting Permissions. (2017). https://developer.android.com/guide/topics/permissions/requesting.html#normal-dangerous
[22]
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI'10). USENIX Association, Berkeley, CA, USA, 393--407. http://dl.acm.org/citation.cfm?id=1924943.1924971
[23]
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. 2011. Android permissions demystified. In Proceedings of the 18th ACM conference on Computer and communications security. ACM, 627--638.
[24]
Adrienne Porter Felt, Serge Egelman, Matthew Finifter, Devdatta Akhawe, and David Wagner. 2012. How to Ask for Permission. In Presented as part of the 7th USENIX Workshop on Hot Topics in Security. USENIX, Bellevue, WA. https://www.usenix.org/conference/hotsec12/workshop-program/presentation/Felt
[25]
Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I've Got 99 Problems, but Vibration Ain't One: A Survey of Smartphone Users' Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12). ACM, New York, NY, USA, 33--44.
[26]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android Permissions: User Attention, Comprehension, and Behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, New York, NY, USA, 3:1--3:14.
[27]
Simone Fischer-Hübner and Hans Hedbom. 2008. Benefits of privacy-enhancing identity management. Asia Pacific Business Review 4, 4 (2008), 3--13.
[28]
Drew Fisher, Leah Dorner, and David Wagner. 2012. Short Paper: Location Privacy: User Behavior in the Field. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12). ACM, New York, NY, USA, 51--56.
[29]
Huiqing Fu, Yulong Yang, Nileema Shingte, Janne Lindqvist, and Marco Gruteser. 2014. A field study of run-time location access disclosures on android smartphones. Proc. USEC 14 (2014).
[30]
James Paul Gee. 2003. What video games have to teach us about learning and literacy. Computers in Entertainment (CIE) 1, 1 (2003), 20--20.
[31]
Paul Gerber, Melanie Volkamer, and Karen Renaud. 2016. The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions. Journal of Information Security and Applications (nov 2016).
[32]
Google. {n. d.}. System permissions (https://developer.android.com/guide/topics/permissions/requesting.html#normal-dangerous). ({n. d.}).
[33]
Marian Harbach, Markus Hettig, Susanne Weber, and Matthew Smith. 2014. Using personal examples to improve risk communication for security & privacy decisions. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2647--2656.
[34]
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall. 2011. These Aren'T the Droids You'Re Looking for: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS '11). ACM, New York, NY, USA, 639--652.
[35]
Shubham Jain and Janne Lindqvist. 2014. Should I protect you? Understanding developers' behavior to privacy-preserving APIs. In Workshop on Usable Security (USEC' 14).
[36]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My data just goes everywhere:" user mental models of the internet and implications for privacy and security. In Symposium on Usable Privacy and Security (SOUPS). 39--52.
[37]
M Kankaanranta and P Neittaanmäki. 2009. Design and Use of Serious Games, Intelligent Systems Control and Automation. Science and Engineering 37 (2009).
[38]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. In Proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC '12). Springer-Verlag, Berlin, Heidelberg, 68--79.
[39]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy As Part of the App Decision-making Process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). ACM, New York, NY, USA, 3393--3402.
[40]
Bart P Knijnenburg. 2017. Privacy? I Can't Even! Making a Case for User-Tailored Privacy. IEEE Security & Privacy 15, 4 (2017), 62--67.
[41]
Lydia Kraus, Ina Wechsung, and Sebastian Möller. 2014. Using statistical information to communicate android permission risks to users. In Socio-Technical Aspects in Security and Trust (STAST), 2014 Workshop on. IEEE, 48--55.
[42]
Hui Liang and Min Yong Shi. 2013. Design and Implement a Computer Network Security Education Game on iOS for University Students. Applied Mechanics and Materials 373--375 (2013), 1815--1820.
[43]
Ilaria Liccardi, Joseph Pato, and Daniel J Weitzner. 2014. Improving user choice through better mobile apps transparency and permissions analysis. Journal of Privacy and Confidentiality 5, 2 (2014), 1--55.
[44]
Ilaria Liccardi, Joseph Pato, Daniel J Weitzner, Hal Abelson, and David De Roure. 2014. No technical understanding required: Helping users make informed choices about access to their personal data. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 140--150.
[45]
Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy Through Crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12). ACM, New York, NY, USA, 501--510.
[46]
Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. 2014. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. In Symposium on Usable Privacy and Security (SOUPS), Vol. 40. 199--212.
[47]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, S A Zhang, Norman Sadeh, Y Agarwal, and A Acquisti. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Symposium on Usable Privacy and Security. 27--41.
[48]
Mary Madden, Lee Rainie, Kathryn Zickuhr, Maeve Duggan, and Aaron Smith. 2014. Public Perceptions of Privacy and Security in the Post-Snowden Era. Pew Research Center (2014), 3--57. https://doi.org/202.419.4372
[49]
Delfina Malandrino, Andrea Petta, Vittorio Scarano, Luigi Serra, Raffaele Spinelli, and Balachander Krishnamurthy. 2013. Privacy awareness about information leakage. Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society - WPES '13 (2013), 279--284.
[50]
Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336--355.
[51]
Microsoft. 2012. Visual Studio Achievements Program. (2012). https://blogs.technet.microsoft.com/microsoft
[52]
George R Milne, Andrew J Rohm, and Shalini Bahl. 2004. Consumers' protection of online privacy and identity. Journal of Consumer Affairs 38, 2 (2004), 217--232.
[53]
Curtiss Murphy. 2012. Why Games Work and the Science of Learning. In Selected Papers Presented at MODSIM World 2011 Conference and Expo. 383--392.
[54]
Nintendo. 2010. Fluidity. (2010). https://www.nintendo.com/games/detail/r1QM8ZnIi2Gku-gAVPoAq3Rc-iL0t4hM
[55]
P. A. Norberg, D. R. Horne, and D. A Horne. 2007. The Privacy Paradox : Personal Information Disclosure Intentions vers us Behaviors. The Journal of Consumer Affairs 41, 1 (2007), 100--126.
[56]
Yong Jin Park and S Mo Jang. 2014. Understanding Privacy Knowledge and Skill in Mobile Communication. Comput. Hum. Behav. 38 (sep 2014), 296--303.
[57]
Anand Paturi, Patrick Gage Kelley, and Subhasish Mazumdar. 2015. Introducing privacy threats from ad libraries to android users through privacy granules. Proc. USEC'15 (2015).
[58]
Maija E Poikela and Felix Kaiser. 2016. "It Is a Topic That Confuses Me"-Privacy Perceptions in Usage of Location-Based Applications. In European Workshop on Usable Security (EuroUSEC).
[59]
Stefanie Pötzsch. 2009. Privacy Awareness: A Means to Solve the Privacy Paradox? In The Future of Identity in the Information Society, V. Matyáš, S. Fischer-Hübner, D. Cvrček, and P. Švenda (Eds.). Vol. 298. Springer, Berlin, Heidelberg, 226--236.
[60]
Lee Rainie, Sara Kiesler, Ruogu Kang, and Mary Madden. 2013. Anonymity, Privacy, and Security Online. Pew Research Center (2013), 1--35. http://www.pewinternet.org/Reports/2013/Anonymity-online.aspx
[61]
Andreas Josef Rieb, Marko Hofmann, Alexander Laux, Steffi Rudel, and Ulrike Lechner. 2017. Wie IT-Security Matchplays als Awarenessmaßnahme die IT-Sicherheit verbessern können. (2017).
[62]
Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, 1--17.
[63]
Florian Schaub, Aditya Marella, Pranshu Kalvani, Blase Ur, Chao Pan, Emily Forney, and Lorrie Faith Cranor. 2016. Watching Them Watching Me: Browser Extensions' Impact on User Privacy Awareness and Concern. In Proc. USEC.
[64]
Fuming Shih, Ilaria Liccardi, and Daniel Weitzner. 2015. Privacy Tipping Points in Smartphones Privacy Preferences. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 807--816.
[65]
Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and creepiness in app space:Perceptions of privacy and mobile app use. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14. ACM Press, New York, New York, USA, 2347--2356.
[66]
Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, and Daniel Lehmann. 2016. Teaching Phishing-Security: Which Way is Best?. In 31st International Conference on ICT Systems Security and Privacy Protection - IFIP SEC 2016. Springer, 135--149.
[67]
Symantec. 2015. State of privacy report 2015. Technical Report. 25 pages. https://goo.gl/7IRmu4
[68]
Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, and David Wagner. 2014. The Effect of Developer-specified Explanations for Permission Requests on Smartphone User Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 91--100.
[69]
Zouheir Trabelsi, Mohammed Al Matrooshi, and Saeed Al Bairaq. 2016. A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation. In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE '16). ACM, New York, NY, USA, 48--53.
[70]
Timothy Vidas, Nicolas Christin, and Lorrie Cranor. 2011. Curbing android permission creep. In Proceedings of the Web, Vol. 2. 1--5.
[71]
Na Wang, Bo Zhang, Bin Liu, and Hongxia Jin. 2015. Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services - MobileHCI '15. ACM Press, New York, New York, USA, 373--382.
[72]
Takuya Watanabe, Mitsuaki Akiyama, Tetsuya Sakai, Hironori Washizaki, and Tatsuya Mori. 2015. Understanding the inconsistencies between text descriptions and the use of privacy-sensitive resources of mobile apps. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, 241--255.
[73]
Pamela J Wisniewski, Bart P Knijnenburg, and Heather R Lipford. 2017. Making privacy personal: Profiling social network users to inform privacy education and nudging. International Journal of Human-Computer Studies 98 (2017), 95--108.
[74]
Heng Xu, Robert E. Crossler, and France Bélanger. 2012. A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers. Decision Support Systems 54, 1 (dec 2012), 424--433.
[75]
Bo Zhang and Heng Xu. 2016. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16). ACM, New York, NY, USA, 1676--1690.
[76]
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, and Vincent W Freeh. 2011. Taming Information-stealing Smartphone Applications (on Android). In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST'11). Springer-Verlag, Berlin, Heidelberg, 93--107. http://dl.acm.org/citation.cfm?id=2022245.2022255
[77]
Michael Zyda. 2005. From visual simulation to virtual reality to games. Computer 38, 9 (2005), 25--32.

Cited By

View all
  • (2025)Information Privacy AwarenessEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1484(1228-1230)Online publication date: 8-Jan-2025
  • (2024)PEDRO: Privacy-Enhancing Decision suppoRt tOolApplied Sciences10.3390/app1420927514:20(9275)Online publication date: 11-Oct-2024
  • (2024)Unlocking User Privacy: A Systematic Survey of Factors and Methods in Predicting App Permission DecisionsArtificial Intelligence Applications and Innovations10.1007/978-3-031-63215-0_26(347-360)Online publication date: 19-Jun-2024
  • Show More Cited By

Index Terms

  1. FoxIT: enhancing mobile users' privacy behavior by increasing knowledge and awareness

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    STAST '17: Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust
    December 2018
    95 pages
    ISBN:9781450363570
    DOI:10.1145/3167996
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 December 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. app permissions
    2. mobile privacy
    3. privacy awareness
    4. privacy education
    5. privacy enhancing technologies (PETs)

    Qualifiers

    • Research-article

    Funding Sources

    • DFG

    Conference

    STAST2017

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)76
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 29 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Information Privacy AwarenessEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1484(1228-1230)Online publication date: 8-Jan-2025
    • (2024)PEDRO: Privacy-Enhancing Decision suppoRt tOolApplied Sciences10.3390/app1420927514:20(9275)Online publication date: 11-Oct-2024
    • (2024)Unlocking User Privacy: A Systematic Survey of Factors and Methods in Predicting App Permission DecisionsArtificial Intelligence Applications and Innovations10.1007/978-3-031-63215-0_26(347-360)Online publication date: 19-Jun-2024
    • (2023)Why Are Conversational Assistants Still Black Boxes? The Case For TransparencyProceedings of the 5th International Conference on Conversational User Interfaces10.1145/3571884.3604319(1-5)Online publication date: 19-Jul-2023
    • (2023)Investigating Tangible Privacy-Preserving Mechanisms for Future Smart HomesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581167(1-16)Online publication date: 19-Apr-2023
    • (2023)Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical WorldProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580909(1-16)Online publication date: 19-Apr-2023
    • (2023)Current topics of interdisciplinary cooperation between engineering and human sciencesAktuelle Themen der interdisziplinären Zusammenarbeit von Ingenieur- und HumanwissenschaftenZeitschrift für Arbeitswissenschaft10.1007/s41449-023-00352-y77:1(7-22)Online publication date: 1-Feb-2023
    • (2022)Online taxi users' optimistic bias: China youths' digital travel and information privacy protectionFrontiers in Psychology10.3389/fpsyg.2022.104992513Online publication date: 22-Nov-2022
    • (2022)A Study of User Concerns about Smartphone Privacy2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955623(1-8)Online publication date: 24-Oct-2022
    • (2022)A Constructive Approach for Raising Information Privacy Competences: The Case of Escape Room GamesTrust, Privacy and Security in Digital Business10.1007/978-3-031-17926-6_3(33-49)Online publication date: 6-Oct-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media