What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors

作者: Stuart Schechter , Jon Howell

DOI:

关键词:

摘要: Sensors such as cameras and microphones collect privacy-sensitive data streams without the user’s explicit action. Conventional sensor access policies either hassle users to grant applications sensors or with no approval at all. Once is granted, an application may even after application’s interface suggests that longer being accessed. We introduce sensor-access widget, a graphical user element resides within display. The widget provides animated representation of personal collected by its corresponding sensor, calling attention attempt data. indicates whether currently allowed flow application. also acts control point through which can configure deny access. By building perpetual disclosure collection into platform, widgets enable new access-control relax tension between privacy needs applications’ ease

参考文章(5)
Niels Provos, Improving host security with system call policies usenix security symposium. pp. 18- 18 ,(2003)
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong, Expandable grids for visualizing and authoring computer security policies Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08. pp. 1473- 1482 ,(2008) , 10.1145/1357054.1357285
Serge Egelman, Lorrie Faith Cranor, Jason Hong, You've been warned Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08. pp. 1065- 1074 ,(2008) , 10.1145/1357054.1357219
Rachna Dhamija, J. D. Tygar, Marti Hearst, Why phishing works human factors in computing systems. pp. 581- 590 ,(2006) , 10.1145/1124772.1124861