• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Understanding and capturing people’s mobile app privacy preferences (2013)

by J Lin
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

The Privacy and Security Behaviors of Smartphone App Developers

by Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, Lorrie Faith Cranor
"... Abstract—Smartphone app developers have to make many privacy-related decisions about what data to collect about end-users, and how that data is used. We explore how app developers make decisions about privacy and security. Additionally, we examine whether any privacy and security behaviors are relat ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—Smartphone app developers have to make many privacy-related decisions about what data to collect about end-users, and how that data is used. We explore how app developers make decisions about privacy and security. Additionally, we examine whether any privacy and security behaviors are related to characteristics of the app development companies. We conduct a series of interviews with 13 app developers to obtain rich qual-itative information about privacy and security decision-making. We use an online survey of 228 app developers to quantify behaviors and test our hypotheses about the relationship between privacy and security behaviors and company characteristics. We find that smaller companies are less likely to demonstrate positive privacy and security behaviors. Additionally, although third-party tools for ads and analytics are pervasive, developers aren’t aware of the data collected by these tools. We suggest tools and opportunities to reduce the barriers for app developers to implement privacy and security best practices. I.
(Show Context)

Citation Context

...Sense.2 Targeted advertising requires collecting information about users, and therefore the targeted advertising revenue model may require more permissions and therefore be more privacy-invasive [5], =-=[6]-=-. Apps may also include third-party code for analytics, whose primary goal is to collect information about the users’ interactions with the app. Some previous work has examined app developer security ...

A Survey of the Use of Crowdsourcing in Software Engineering

by Ke Mao, Licia Capra, Mark Harman, Yue Jia , 2015
"... Crowdsourcing can be used to support software engineering activities and research into these activities. In this paper we provide a comprehensive survey of the use of crowdsourcing to support software engineering activities (Crowdsourced Software Engineering), seeking to cover all literature on this ..."
Abstract - Add to MetaCart
Crowdsourcing can be used to support software engineering activities and research into these activities. In this paper we provide a comprehensive survey of the use of crowdsourcing to support software engineering activities (Crowdsourced Software Engineering), seeking to cover all literature on this topic. We describe the software engineering domains, tasks and applications for crowdsourcing and the platforms and stakehold-ers involved in realising Crowdsourced Software Engineering solutions. We also expose trends, issues and opportunities for Crowdsourced Software Engineering.
(Show Context)

Citation Context

...faces for Integrating Crowdsourced Code Snippets within Development Environments 2013 Xue [34] PhD University of Illinois at Urbana-Champaign Using Redundancy to Improve Security and Testing 2013 Lin =-=[35]-=- PhD Carnegie Mellon University Understanding and Capturing Peoples Mobile App Privacy Preferences 2014 Schiller [12] PhD University of Washington Reducing the Usability Barrier to Specification and V...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University