Understanding and capturing people’s privacy policies in a mobile social networking application

  title={Understanding and capturing people’s privacy policies in a mobile social networking application},
  author={N. Sadeh and J. Hong and L. Cranor and I. Fette and P. Kelley and Madhu K. Prabaker and J. Rao},
  journal={Personal and Ubiquitous Computing},
  • N. Sadeh, J. Hong, +4 authors J. Rao
  • Published 2008
  • Computer Science
  • Personal and Ubiquitous Computing
  • A number of mobile applications have emerged that allow users to locate one another. [...] Key Method These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.Expand Abstract
    324 Citations
    Understandable Learning of Privacy Preferences Through Default Personas and Suggestions
    • 28
    • PDF
    Understanding and capturing people's mobile app privacy preferences
    • 19
    • PDF
    Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings
    • 197
    • PDF
    Phones, privacy, and predictions: A study of phone logged data to predict privacy attitudes of individuals
    • 1
    • PDF
    Privacy and Social Effects in Location Sharing Services
    • 4
    Recommending privacy preferences in location-sharing services
    The Effect of Privacy Concerns on Privacy Recommenders
    • 8
    • Highly Influenced
    • PDF
    Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments
    • 4


    Who gets to know what when: configuring privacy permissions in an awareness application
    • 168
    • PDF
    Location disclosure to social relations: why, when, & what people want to share
    • 561
    • PDF
    Context-aware telephony: privacy preferences and sharing patterns
    • 140
    • PDF
    User needs for location-aware mobile services
    • E. Kaasinen
    • Computer Science
    • Personal and Ubiquitous Computing
    • 2003
    • 583
    • PDF
    Privacy in Location-Based Services , Concern vs . Coolness
    • 53
    • PDF
    Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
    • 2,293
    • PDF
    An architecture for privacy-sensitive ubiquitous computing
    • 656
    • PDF
    Who wants to know what when? privacy preference determinants in ubiquitous computing
    • 323
    • PDF
    Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
    • 39
    • PDF