Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

CO-oPS: A Mobile App for Community Oversight of Privacy and Security (2404.10258v1)

Published 16 Apr 2024 in cs.HC

Abstract: Smartphone users install numerous mobile apps that require access to different information from their devices. Much of this information is very sensitive, and users often struggle to manage these accesses due to their lack of tech expertise and knowledge regarding mobile privacy. Thus, they often seek help from others to make decisions regarding their mobile privacy and security. We embedded these social processes in a mobile app titled "CO-oPS'' ("Community Oversight for Privacy and Security"). CO-oPS allows trusted community members to review one another's apps installed and permissions granted to those apps. Community members can provide feedback to one another regarding their privacy behaviors. Users are also allowed to hide some of their mobile apps that they do not like others to see, ensuring their personal privacy.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (22)
  1. 2015. Mobile apps, privacy and permissions: 5 key takeaways. https://www.pewresearch.org/fact-tank/2015/11/10/key-takeaways-mobile-apps/
  2. ‘Just-in-Time’ Parenting: A Two-Month Examination of the Bi-directional Influences Between Parental Mediation and Adolescent Online Risk Exposure. In HCI for Cybersecurity, Privacy and Trust, Abbas Moallem (Ed.). Springer International Publishing, Cham, 261–280.
  3. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals? Proc. ACM Hum.-Comput. Interact. 6, CSCW1, Article 57 (apr 2022), 28 pages. https://doi.org/10.1145/3512904
  4. Designing a Mobile Application to Support Social Processes for Privacy (Journal Article) | DOE PAGES. https://par.nsf.gov/biblio/10097722
  5. Permission vs. App Limiters: Profiling Smartphone Users to Understand Differing Strategies for Mobile Privacy Management. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 406, 18 pages. https://doi.org/10.1145/3491102.3517652
  6. Michelle Atkinson. 2015. Majority of U.S. Smartphone Owners Download Apps. https://www.pewresearch.org/internet/2015/11/10/the-majority-of-smartphone-owners-download-apps/
  7. Towards Assets-based Approaches for Adolescent Online Safety. In Badillo-Urquiola, Agha, Z., Akter, K., Wisniewski, P.,(2020)“Towards Assets-Based Approaches for Adolescent Online Safety” Extended Abstract presented at the ACM Conference on Computer-Supported Cooperative Work Workshop on Operationalizing an Assets-Based Design of Technology,(CSCW 2020).
  8. Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy. In Proceedings of the 17th International Conference on Mining Software Repositories (MSR ’20). Association for Computing Machinery, New York, NY, USA, 114–124. https://doi.org/10.1145/3379597.3387469
  9. Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (Nov. 2019), 1–31. https://doi.org/10.1145/3359248
  10. The effect of social influence on security sensitivity. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS ’14). USENIX Association, Menlo Park, CA, 143–157.
  11. Fred Davis and Fred Davis. 1989. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. ” ” 13 (1989), 319. https://doi.org/10.2307/249008
  12. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (Nov. 2004), 391–401. https://doi.org/10.1007/s00779-004-0308-5
  13. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ’12). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/2335356.2335360
  14. Securacy: an empirical investigation of Android applications’ network usage, privacy and security. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec ’15). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10.1145/2766498.2766506
  15. To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 686, 14 pages. https://doi.org/10.1145/3411764.3445204
  16. Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving. Proc. ACM Hum.-Comput. Interact. 5, CSCW2, Article 396 (oct 2021), 23 pages. https://doi.org/10.1145/3479540
  17. Tamir Mendel and Eran Toch. 2017. Susceptibility to Social Influence of Privacy Behaviors | Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. https://dl.acm.org/doi/10.1145/2998181.2998323
  18. Demographics of Mobile Device Ownership and Adoption in the United States. https://www.pewresearch.org/internet/fact-sheet/mobile/
  19. Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1 (Sept. 2015), 121–144. https://doi.org/10.1093/cybsec/tyv008 Publisher: Oxford Academic.
  20. 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. In WINTER 2019, VOL. 44, NO. 4 (2019). USENIX, Boston, MA, United States, 603–620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
  21. Stuart Schechter and Joseph Bonneau. 2015. Learning Assigned Secrets for Unlocking Mobile Devices. In ” ” (2015). USENIX, ” ”, 277–295. https://www.usenix.org/conference/soups2015/proceedings/presentation/schechter
  22. Sarina Till and Melissa Densmore. 2019. A Characterization of Digital Native Approaches To Mobile Privacy and Security. In Proceedings of the South African Institute of Computer Scientists and Information Technologists 2019 (SAICSIT ’19). Association for Computing Machinery, New York, NY, USA, 1–9. https://doi.org/10.1145/3351108.3351131
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Mamtaj Akter (16 papers)
  2. Leena Alghamdi (5 papers)
  3. Dylan Gillespie (1 paper)
  4. Nazmus Miazi (1 paper)
  5. Jess Kropczynski (10 papers)
  6. Heather Lipford (6 papers)
  7. Pamela Wisniewski (25 papers)
Citations (5)

Summary

We haven't generated a summary for this paper yet.