How to ask for permission

作者: Devdatta Akhawe , Matthew Finifter , Adrienne Porter Felt , David Wagner , Serge Egelman

DOI:

关键词:

摘要: Application platforms provide applications with access to hardware (e.g., GPS and cameras) personal data. Modern use permission systems protect these resources. The nature of vary widely across platforms. Some obtain user consent as part installation, while others display runtime dialogs. We propose a set guidelines aid platform designers in determining the most appropriate permission-granting mechanism for given permission. apply our proposal smart-phone platform. A preliminary evaluation indicates that model will reduce number warnings presented users, thereby reducing habituation effects.

参考文章(13)
Lorrie Faith Cranor, Neha Atri, Joshua Sunshine, Hazim Almuhimedi, Serge Egelman, Crying wolf: an empirical study of SSL warning effectiveness usenix security symposium. pp. 399- 416 ,(2009)
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov, Do windows users follow the principle of least privilege?: investigating user account control practices symposium on usable privacy and security. pp. 1- ,(2010) , 10.1145/1837110.1837112
Rainer Böhme, Stefan Köpsell, Trained to accept? Proceedings of the 28th international conference on Human factors in computing systems - CHI '10. pp. 2403- 2406 ,(2010) , 10.1145/1753326.1753689
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, David Wagner, Android permissions: user attention, comprehension, and behavior symposium on usable privacy and security. pp. 3- ,(2012) , 10.1145/2335356.2335360
Serge Egelman, Lorrie Faith Cranor, Jason Hong, You've been warned Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08. pp. 1065- 1074 ,(2008) , 10.1145/1357054.1357219
Adrienne Porter Felt, Serge Egelman, David Wagner, I've got 99 problems, but vibration ain't one Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12. pp. 33- 44 ,(2012) , 10.1145/2381934.2381943
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan, User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems ieee symposium on security and privacy. pp. 224- 238 ,(2012) , 10.1109/SP.2012.24
Jon A. Krosnick, Duane F. Alwin, An Evaluation of a Cognitive Theory of Response-Order Effects in Survey Measurement Public Opinion Quarterly. ,vol. 51, pp. 201- 219 ,(1987) , 10.1086/269029
Rainer Böhme, Jens Grossklags, The security cost of cheap user interaction Proceedings of the 2011 workshop on New security paradigms workshop - NSPW '11. pp. 67- 82 ,(2011) , 10.1145/2073276.2073284