1. bookVolume 2020 (2020): Issue 2 (April 2020)
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year
access type Open Access

Privacy at a Glance: The User-Centric Design of Glanceable Data Exposure Visualizations

Published Online: 08 May 2020
Page range: 416 - 435
Received: 31 Aug 2019
Accepted: 16 Dec 2019
Journal Details
First Published
16 Apr 2015
Publication timeframe
4 times per year

Smartphone users are often unaware of mobile applications’ (“apps”) third-party data collection and sharing practices, which put them at higher risk of privacy breaches. One way to raise awareness of these practices is by providing unobtrusive but pervasive visualizations that can be presented in a glanceable manner. In this paper, we applied Wogalter et al.’s Communication-Human Information Processing model (C-HIP) to design and prototype eight different visualizations that depict smartphone apps’ data sharing activities. We varied the granularity and type (i.e., data-centric or app-centric) of information shown to users and used the screensaver/lock screen as a design probe. Through interview-based design probes with Android users (n=15), we investigated the aspects of the data exposure visualizations that influenced users’ comprehension and privacy awareness. Our results shed light on how users’ perceptions of privacy boundaries influence their preference regarding the information structure of these visualizations, and the tensions that exist in these visualizations between glanceability and granularity. We discuss how a pervasive, soft paternalistic approach to privacy-related visualization may raise awareness by enhancing the transparency of information flow, thereby, unobtrusively increasing users’ understanding of data sharing practices of mobile apps. We also discuss implications for privacy research and glanceable security.


[1] “Mozilla: Lightbeam.” [Online]. Available: https://addons.mozilla.org/en-US/firefox/addon/lightbeam/Search in Google Scholar

[2] A. Acquisti, “Nudging privacy: The behavioral economics of personal information,” IEEE security & privacy, vol. 7, no. 6, pp. 82–85, 2009.Search in Google Scholar

[3] A. Adams and M. A. Sasse, “Users are not the enemy,” Communications of the ACM, vol. 42, no. 12, pp. 40–46, 1999. [Online]. Available: http://dl.acm.org/citation.cfm?id=322806Search in Google Scholar

[4] Y. Agarwal and M. Hall, “Protectmyprivacy: detecting and mitigating privacy leaks on ios devices using crowdsourcing,” in Proceeding of the 11th annual international conference on Mobile systems, applications, and services. ACM, 2013, pp. 97–110.Search in Google Scholar

[5] J. Angulo, S. Fischer-Hübner, T. Pulls, and E. Wästlund, “Usable transparency with the data track: a tool for visualizing data disclosures,” in Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2015, pp. 1803–1808.Search in Google Scholar

[6] A. Azfar, K.-K. R. Choo, and L. Liu, “Forensic taxonomy of android productivity apps,” Multimedia Tools and Applications, vol. 76, no. 3, pp. 3313–3341, 2017.Search in Google Scholar

[7] M. Backes, S. Bugiel, and E. Derr, “Reliable third-party library detection in android and its security applications,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016, pp. 356–367.Search in Google Scholar

[8] P. Bahirat, Y. He, A. Menon, and B. Knijnenburg, “A Data-Driven Approach to Developing IoT Privacy-Setting Interfaces,” in 23rd International Conference on Intelligent User Interfaces. ACM, 2018, pp. 165–176.Search in Google Scholar

[9] K. Benton, L. J. Camp, and C. Small, “OpenFlow vulnerability assessment,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 151–152.Search in Google Scholar

[10] R. Böhme and J. Grossklags, “The security cost of cheap user interaction,” in Proceedings of the 2011 workshop on New security paradigms workshop. ACM, 2011, pp. 67–82. [Online]. Available: http://dl.acm.org/citation.cfm?id=2073284Search in Google Scholar

[11] R. Binns, U. Lyngs, M. Van Kleek, J. Zhao, T. Libert, and N. Shadbolt, “Third Party Tracking in the Mobile Ecosystem,” arXiv preprint arXiv:1804.03603, 2018.Search in Google Scholar

[12] D. M. Boyd and N. B. Ellison, “Social network sites: Definition, history, and scholarship,” Journal of computer-mediated Communication, vol. 13, no. 1, pp. 210–230, 2007.Search in Google Scholar

[13] K. Caine, “Local Standards for Sample Size at CHI,” in Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ser. CHI ’16. New York, NY, USA: ACM, 2016, pp. 981–992, event-place: San Jose, California, USA. [Online]. Available: http://doi.acm.org/10.1145/2858036.2858498Search in Google Scholar

[14] P. R. Center, “Mobile Fact Sheet,” Pew Research Center: Internet, Science & Tech, Feb. 2018. [Online]. Available: http://www.pewinternet.org/fact-sheet/mobile/Search in Google Scholar

[15] L. Cerejo, “Glanceability & The Glanceable User Experience,” Jul. 2013. [Online]. Available: https://www.capgemini.com/2013/07/glanceability-the-glanceable-user-experience/Search in Google Scholar

[16] T. Chen, I. Ullah, M. A. Kaafar, and R. Boreli, “Information Leakage Through Mobile Analytics Services,” in Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, ser. HotMobile ’14. New York, NY, USA: ACM, 2014, pp. 15:1–15:6. [Online]. Available: http://doi.acm.org/10.1145/2565585.2565593Search in Google Scholar

[17] P. H. Chia, Y. Yamamoto, and N. Asokan, “Is this app safe?: a large scale study on application permissions and risk signals,” in Proceedings of the 21st international conference on World Wide Web. ACM, 2012, pp. 311–320. [Online]. Available: http://dl.acm.org/citation.cfm?id=2187879Search in Google Scholar

[18] R. Compañó and W. Lusoli, “The policy maker’s anguish: Regulating personal data behavior between paradoxes and dilemmas,” in Economics of Information Security and Privacy. Springer, 2010, pp. 169–185.Search in Google Scholar

[19] I. Dey, Qualitative data analysis: A user friendly guide for social scientists. Routledge, 2003.Search in Google Scholar

[20] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones,” ACM Transactions on Computer Systems (TOCS), vol. 32, no. 2, p. 5, 2014.Search in Google Scholar

[21] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, “Android permissions: User attention, comprehension, and behavior,” in Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012, p. 3. [Online]. Available: http://dl.acm.org/citation.cfm?id=2335360Search in Google Scholar

[22] S. Fischer-Hübner, J. Angulo, F. Karegar, and T. Pulls, “Transparency, Privacy and Trust–Technology for Tracking and Controlling My Data Disclosures: Does This Work?” in IFIP International Conference on Trust Management. Springer, 2016, pp. 3–14.Search in Google Scholar

[23] H. Fu, Y. Yang, N. Shingte, J. Lindqvist, and M. Gruteser, “A field study of run-time location access disclosures on android smartphones,” Proc. USEC, vol. 14, 2014.Search in Google Scholar

[24] R. Gouveia, E. Karapanos, and M. Hassenzahl, “How do we engage with activity trackers?: a longitudinal study of habito,” in Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2015, pp. 1305–1316.Search in Google Scholar

[25] R. Gouveia, F. Pereira, A. Caraban, S. A. Munson, and E. Karapanos, “You have 5 seconds: designing glanceable feedback for physical activity trackers,” in Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM, 2015, pp. 643–647.Search in Google Scholar

[26] R. Gouveia, F. Pereira, E. Karapanos, S. A. Munson, and M. Hassenzahl, “Exploring the design space of glanceable feedback for physical activity trackers,” in Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 2016, pp. 144–155.Search in Google Scholar

[27] G. Gronier, “Measuring the First Impression: Testing the Validity of the 5 Second Test,” J. Usability Studies, vol. 12, no. 1, pp. 8–25, Nov. 2016. [Online]. Available: http://dl.acm.org/citation.cfm?id=3040226.3040228Search in Google Scholar

[28] G. Guest, K. MacQueen, and E. Namey, Applied Thematic Analysis. SAGE Publications, Inc., 2012. [Online]. Available: http://methods.sagepub.com/book/applied-thematic-analysisSearch in Google Scholar

[29] R. Herbster, S. DellaTorre, P. Druschel, and B. Bhattacharjee, “Privacy Capsules: Preventing Information Leaks by Mobile Apps,” in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ’16. New York, NY, USA: ACM, 2016, pp. 399–411. [Online]. Available: http://doi.acm.org/10.1145/2906388.2906409Search in Google Scholar

[30] Q. Ismail, T. Ahmed, K. Caine, A. Kapadia, and M. Reiter, “To permit or not to permit, that is the usability question: Crowdsourcing mobile apps’ privacy permission settings,” Proceedings on Privacy Enhancing Technologies, vol. 2017, no. 4, pp. 119–137, 2017.Search in Google Scholar

[31] P. Karr-Wisniewski, D. Wilson, and H. Richter-Lipford, “A new social order: Mechanisms for social network site boundary regulation,” in Americas Conference on Information Systems, AMCIS, 2011. [Online]. Available: http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1141&context=amcis2011_submissionsSearch in Google Scholar

[32] P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder, “A “Nutrition Label” for Privacy,” in Proceedings of the 5th Symposium on Usable Privacy and Security, ser. SOUPS ’09. New York, NY, USA: ACM, 2009, pp. 4:1–4:12. [Online]. Available: http://doi.acm.org/10.1145/1572532.1572538Search in Google Scholar

[33] P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall, “A Conundrum of Permissions: Installing Applications on an Android Smartphone,” in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, J. Blyth, S. Dietrich, and L. J. Camp, Eds., vol. 7398. Springer Berlin Heidelberg, 2012, pp. 68–79.Search in Google Scholar

[34] P. G. Kelley, L. F. Cranor, and N. Sadeh, “Privacy As Part of the App Decision-making Process,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’13. New York, NY, USA: ACM, 2013, pp. 3393–3402. [Online]. Available: http://doi.acm.org/10.1145/2470654.2466466Search in Google Scholar

[35] P. Klasnja, S. Consolvo, D. W. McDonald, J. A. Landay, and W. Pratt, “Using mobile & personal sensing technologies to support health behavior change in everyday life: lessons learned,” in AMIA Annual Symposium Proceedings, vol. 2009. American Medical Informatics Association, 2009, p. 338.Search in Google Scholar

[36] B. P. Knijnenburg, “Privacy? I Can’t Even! Making a Case for User-Tailored Privacy,” IEEE Security & Privacy, vol. 15, no. 4, pp. 62–67, 2017.Search in Google Scholar

[37] B. P. Knijnenburg and A. Kobsa, “Making decisions about privacy: information disclosure in context-aware recommender systems,” ACM Transactions on Interactive Intelligent Systems (TiiS), vol. 3, no. 3, p. 20, 2013.Search in Google Scholar

[38] H. D. Laswell, “The structure and function of communication in society,” The communication of ideas, 1948.Search in Google Scholar

[39] A. Le, J. Varmarken, S. Langhoff, A. Shuba, M. Gjoka, and A. Markopoulou, “AntMonitor: A system for monitoring from mobile devices,” in Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data. ACM, 2015, pp. 15–20.Search in Google Scholar

[40] A. Le, J. Varmarken, S. Langhoff, A. Shuba, M. Gjoka, and A. Markopoulou, “Antmonitor: A system for monitoring from mobile devices,” in Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data. ACM, 2015, pp. 15–20.Search in Google Scholar

[41] J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist, and J. Zhang, “Expectation and Purpose: Understanding Users’ Mental Models of Mobile App Privacy Through Crowd-sourcing,” in Proceedings of the 2012 ACM Conference on Ubiquitous Computing, ser. UbiComp ’12. New York, NY, USA: ACM, 2012, pp. 501–510. [Online]. Available: http://doi.acm.org/10.1145/2370216.2370290Search in Google Scholar

[42] Y.-H. Lin, C.-H. Fang, and C.-L. Hsu, “Determining Uses and Gratifications for Mobile Phone Apps,” in Future Information Technology, ser. Lecture Notes in Electrical Engineering, J. J. J. H. Park, Y. Pan, C.-S. Kim, and Y. Yang, Eds. Springer Berlin Heidelberg, 2014, pp. 661–668.Search in Google Scholar

[43] H. R. Lipford, A. Besmer, and J. Watson, “Understanding Privacy Settings in Facebook with an Audience View,” in Proceedings of the 1st Conference on Usability, Psychology, and Security, ser. UPSEC’08. Berkeley, CA, USA: USENIX Association, 2008, pp. 2:1–2:8. [Online]. Available: http://dl.acm.org/citation.cfm?id=1387649.1387651Search in Google Scholar

[44] B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. A. Zhang, N. Sadeh, Y. Agarwal, and A. Acquisti, “Follow my recommendations: A personalized privacy assistant for mobile app permissions,” in Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016, pp. 27–41.Search in Google Scholar

[45] B. Liu, J. Lin, and N. Sadeh, “Reconciling Mobile App Privacy and Usability on Smartphones: Could User Privacy Profiles Help?” in Proceedings of the 23rd International Conference on World Wide Web, ser. WWW ’14. New York, NY, USA: ACM, 2014, pp. 201–212. [Online]. Available: http://doi.acm.org/10.1145/2566486.2568035Search in Google Scholar

[46] T. Matthews, D. Blais, A. Shick, J. Mankoff, J. Forlizzi, S. Rohrbach, and R. Klatzky, “Evaluating glanceable visuals for multitasking,” Technical Report EECS-2006-173. UC Berkeley, Tech. Rep., 2006.Search in Google Scholar

[47] W. Nayam, A. Laolee, L. Charoenwatana, and K. Sripanidkulchai, “An Analysis of Mobile Application Network Behavior,” in Proceedings of the 12th Asian Internet Engineering Conference, ser. AINTEC ’16. New York, NY, USA: ACM, 2016, pp. 9–16. [Online]. Available: http://doi.acm.org/10.1145/3012695.3012697Search in Google Scholar

[48] H. Nissenbaum, “A contextual approach to privacy online,” Daedalus, vol. 140, no. 4, pp. 32–48, 2011.Search in Google Scholar

[49] P. A. Norberg, D. R. Horne, and D. A. Horne, “The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors,” Journal of Consumer Affairs, vol. 41, no. 1, pp. 100–126, Jun. 2007. [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1111/j.1745-6606.2006.00070.x/abstractSearch in Google Scholar

[50] A. Oglaza, R. Laborde, A. Benzekri, and F. Barrère, “A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions,” in 2016 11th International Conference on Availability, Reliability and Security (ARES), Aug. 2016, pp. 1–9.Search in Google Scholar

[51] A. Oulasvirta, T. Rattenbury, L. Ma, and E. Raita, “Habits make smartphone use more pervasive,” Personal and Ubiquitous Computing, vol. 16, no. 1, pp. 105–114, 2012.Search in Google Scholar

[52] X. W. Page, Factors that Influence Adoption and Use of Location-Sharing Social Media. University of California, Irvine, 2014. [Online]. Available: http://search.proquest.com/openview/6b7ed26f5c311b4d1691b2d966cf3873/1?pqorigsite=gscholar&cbl=18750&diss=ySearch in Google Scholar

[53] S. Petronio, Boundaries of Privacy: Dialectics of Disclosure. SUNY Press, Feb. 2012, google-Books-ID: 8v89W_oJQ0wC.Search in Google Scholar

[54] M. Pielot, A. Vradi, and S. Park, “Dismissed!: a detailed exploration of how mobile phone users handle push notifications,” in Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, 2018, p. 3.Search in Google Scholar

[55] P. Rajivan and J. Camp, “Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices,” in Symposium on Usable Privacy and Security (SOUPS), 2016. [Online]. Available: https://www.usenix.org/system/files/conference/soups2016/wpi16_paper-rajivan.pdfSearch in Google Scholar

[56] A. Rao, F. Schaub, N. Sadeh, A. Acquisti, and R. Kang, “Expecting the unexpected: Understanding mismatched privacy expectations online,” in Symposium on Usable Privacy and Security (SOUPS), vol. 4, 2016, p. 2.Search in Google Scholar

[57] A. Razaghpanah, N. Vallina-Rodriguez, S. Sundaresan, C. Kreibich, P. Gill, M. Allman, and V. Paxson, “Haystack: In situ mobile traffic analysis in user space,” ArXiv e-prints, 2015.Search in Google Scholar

[58] J. Ren, M. Lindorfer, D. J. Dubois, A. Rao, D. Choffnes, and N. Vallina-Rodriguez, “Bug Fixes, Improvements,... and Privacy Leaks,” 2018.Search in Google Scholar

[59] J. Ren, A. Rao, M. Lindorfer, A. Legout, and D. Choffnes, “ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic,” in Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, ser. MobiSys ’16. New York, NY, USA: ACM, 2016, pp. 361–374. [Online]. Available: http://doi.acm.org/10.1145/2906388.2906392Search in Google Scholar

[60] Y. Rogers, W. R. Hazlewood, P. Marshall, N. Dalton, and S. Hertrich, “Ambient influence: Can twinkly lights lure and abstract representations trigger behavioral change?” in Proceedings of the 12th ACM international conference on Ubiquitous computing. ACM, 2010, pp. 261–270.Search in Google Scholar

[61] R. Roshandel and R. Tyler, “User-centric Monitoring of Sensitive Information Access in Android Applications,” in Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems, ser. MOBILESoft ’15. Piscataway, NJ, USA: IEEE Press, 2015, pp. 144–145. [Online]. Available: http://dl.acm.org/citation.cfm?id=2825041.2825076Search in Google Scholar

[62] G. L. Scoccia, I. Malavolta, M. Autili, A. Di Salle, and P. Inverardi, “User-centric Android Flexible Permissions,” in Proceedings of the 39th International Conference on Software Engineering Companion, ser. ICSE-C ’17. Piscataway, NJ, USA: IEEE Press, 2017, pp. 365–367. [Online]. Available: https://doi.org/10.1109/ICSE-C.2017.84Search in Google Scholar

[63] C. E. Shannon, “A mathematical theory of communication,” ACM SIGMOBILE mobile computing and communications review, vol. 5, no. 1, pp. 3–55, 2001.Search in Google Scholar

[64] I. Shklovski, S. D. Mainwaring, H. H. Skúladóttir, and H. Borgthorsson, “Leakiness and creepiness in app space: Perceptions of privacy and mobile app use,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2014, pp. 2347–2356.Search in Google Scholar

[65] H. J. Smith, S. J. Milberg, and S. J. Burke, “Information privacy: measuring individuals’ concerns about organizational practices,” MIS quarterly, pp. 167–196, 1996. [Online]. Available: http://www.jstor.org/stable/249477Search in Google Scholar

[66] G. Srivastava, S. Chitkara, K. Ku, S. K. Sahoo, M. Fredrikson, J. Hong, and Y. Agarwal, “PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage,” arXiv preprint arXiv:1708.06384, 2017.Search in Google Scholar

[67] G. Srivastava, S. Chitkara, K. Ku, S. K. Sahoo, M. Fredrikson, J. I. Hong, and Y. Agarwal, “Privacyproxy: Leveraging crowdsourcing and in situ traffic analysis to detect and mitigate information leakage,” ArXiv, vol. abs/1708.06384, 2017.Search in Google Scholar

[68] A. Strauss and J. Corbin, Basics of qualitative research: Procedures and techniques for developing grounded theory. Thousand Oaks, CA: Sage, 1998.Search in Google Scholar

[69] J. A. Tran, K. S. Yang, K. Davis, and A. Hiniker, “Modeling the engagement-disengagement cycle of compulsive phone use,” in Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, 2019, p. 312.Search in Google Scholar

[70] M. Van Kleek, R. Binns, J. Zhao, A. Slack, S. Lee, D. Ottewell, and N. Shadbolt, “X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps,” in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ser. CHI ’18. New York, NY, USA: ACM, 2018, pp. 393:1–393:13. [Online]. Available: http://doi.acm.org/10.1145/3173574.3173967Search in Google Scholar

[71] J. Vitak, S. Blasiola, S. Patil, and E. Litt, “Balancing audience and privacy tensions on social network sites: Strategies of highly engaged users,” International Journal of Communication, vol. 9, p. 20, 2015.Search in Google Scholar

[72] Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, and L. F. Cranor, “Privacy Nudges for Social Media: An Exploratory Facebook Study,” in Proceedings of the 22Nd International Conference on World Wide Web, ser. WWW ’13 Companion. New York, NY, USA: ACM, 2013, pp. 763–770. [Online]. Available: http://doi.acm.org/10.1145/2487788.2488038Search in Google Scholar

[73] D. Wetherall, D. R. Choffnes, B. Greenstein, S. Han, P. Hornyack, J. Jung, S. E. Schechter, and X. S. Wang, “Privacy Revelations for Web and Mobile Apps.” in HotOS, 2011. [Online]. Available: http://static.usenix.org/event/hotos/tech/final_files/Wetherall.pdfSearch in Google Scholar

[74] P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov, “Android permissions remystified: A field study on contextual integrity,” in 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 499–514.Search in Google Scholar

[75] P. J. Wisniewski, B. P. Knijnenburg, and H. R. Lipford, “Making privacy personal: Profiling social network users to inform privacy education and nudging,” International Journal of Human-Computer Studies, vol. 98, pp. 95–108, Feb. 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1071581916301185Search in Google Scholar

[76] M. S. Wogalter, D. M. DeJoy, and K. R. Laughery, “Organizing theoretical framework: a consolidated communication-human information processing (C-HIP) model,” Warnings and risk communication, pp. 15–23, 1999. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=6SuktVZ5UoAC&oi=fnd&pg=PA13&dq=Wogatler+C+hip&ots=LBRr4ZDRiE&sig=aUlatUT9dtRK09tGa16g-M0U8t8Search in Google Scholar

[77] H. Xu, H.-H. Teo, B. C. Tan, and R. Agarwal, “Research noteeffects of individual self-protection, industry self-regulation, and government regulation on privacy concerns: a study of location-based services,” Information Systems Research, vol. 23, no. 4, pp. 1342–1363, 2012. [Online]. Available: http://pubsonline.informs.org/doi/abs/10.1287/isre.1120.0416Search in Google Scholar

[78] J. Zang, K. Dummit, J. Graves, P. Lisker, and L. Sweeney, “Who knows what about me? A survey of behind the scenes personal data sharing to third parties by mobile apps,” Proceeding of Technology Science, 2015.Search in Google Scholar

[79] A. Zavou, V. Pappas, V. P. Kemerlis, M. Polychronakis, G. Portokalidis, and A. D. Keromytis, “Cloudopsy: An autopsy of data flows in the cloud,” in International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 2013, pp. 366–375.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo