Understanding and capturing people’s privacy policies in a mobile social networking application
@article{Sadeh2008UnderstandingAC, title={Understanding and capturing people’s privacy policies in a mobile social networking application}, author={N. Sadeh and J. Hong and L. Cranor and I. Fette and P. Kelley and Madhu K. Prabaker and J. Rao}, journal={Personal and Ubiquitous Computing}, year={2008}, volume={13}, pages={401-412} }
A number of mobile applications have emerged that allow users to locate one another. [...] Key Method These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.Expand Abstract
Figures and Topics from this paper
324 Citations
Understandable Learning of Privacy Preferences Through Default Personas and Suggestions
- Computer Science
- 2011
- 28
- PDF
Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings
- Computer Science
- SOUPS
- 2014
- 197
- PDF
Phones, privacy, and predictions: A study of phone logged data to predict privacy attitudes of individuals
- Computer Science
- Online Inf. Rev.
- 2020
- 1
- PDF
Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden?
- Computer Science
- Privacy Enhancing Technologies
- 2009
- 26
Privacy and Social Effects in Location Sharing Services
- Business
- 2012 IEEE First International Conference on Services Economics
- 2012
- 4
Helping Jonny Manage Privacy Exploring Filters as Interfaces for Privacy Preference Specification
- 2014
- PDF
Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments
- Computer Science
- 2015 IEEE Trustcom/BigDataSE/ISPA
- 2015
- 4
References
SHOWING 1-10 OF 38 REFERENCES
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications
- Computer Science
- CHI
- 2006
- 94
- PDF
Who gets to know what when: configuring privacy permissions in an awareness application
- Computer Science
- CHI
- 2005
- 168
- PDF
Location disclosure to social relations: why, when, & what people want to share
- Computer Science
- CHI
- 2005
- 561
- PDF
User needs for location-aware mobile services
- Computer Science
- Personal and Ubiquitous Computing
- 2003
- 583
- PDF
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
- Computer Science
- MobiSys '03
- 2003
- 2,293
- PDF
Who wants to know what when? privacy preference determinants in ubiquitous computing
- Computer Science
- CHI Extended Abstracts
- 2003
- 323
- PDF
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
- Computer Science, Engineering
- Privacy Enhancing Technologies
- 2004
- 39
- PDF