Andriotis, P., Oikonomou, G., Tryfonas, T.: Forensic analysis of wireless networking evidence of Android smartphones. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 109–114 (2012)
Google Scholar
Andriotis, P., Oikonomou, G., Tryfonas, T., Li, S.: Highlighting relationships of a smartphone’s social ecosystem in potentially large investigations. IEEE Transactions on Cybernetics (2016)
Google Scholar
Andriotis, P., Tryfonas, T., Oikonomou, G., King, I.: A framework for describing multimedia circulation in a smartphone ecosystem. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics XI. IFIP, vol. 462, pp. 251–267. Springer, Heidelberg (2015)
CrossRef
Google Scholar
Beede, R., Warbritton, D., MyShield, R.H.: Protecting Mobile Device Data via Security Circles, Technical Report CU-CS-1091-12, Department of Computer Science, University of Colorado Boulder, Boulder, Colorado (2012)
Google Scholar
Benisch, M., Kelley, P., Sadeh, N., Cranor, L.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15(7), 679–694 (2011)
CrossRef
Google Scholar
Beresford, A., Rice, A., Skehin, N., MockDroid, R.S.: Trading privacy for application functionality on smartphones. In: Proceedings of the Twelfth Workshop on Mobile Computing Systems and Applications, pp. 49–54 (2011)
Google Scholar
Bernheim Brush, A., Krumm, J., Scott, J.: Exploring end user preferences for location obfuscation, location-based services and the value of location. In: Proceedings of the Twelfth ACM International Conference on Ubiquitous Computing, pp. 95–104 (2010)
Google Scholar
Fisher, D., Dorner, L., Wagner, D.: Location privacy: user behavior in the field. Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 51–56 (2012)
Google Scholar
Harris, M., Patten, K.: Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management and Computer Security 22(1), 97–114 (2014)
CrossRef
Google Scholar
Henne, B., Kater, C., Smith, M.: Usable location privacy for Android with crowd recommendations. In: Proceedings of the Seventh International Conference on Trust and Trustworthy Computing, pp. 74–82 (2014)
Google Scholar
Henne, B., Kater, C., Smith, M., Brenner, M.: Selective cloaking: need-to-know for location-based apps. In: Proceedings of the Eleventh International Conference on Privacy, Security and Trust, pp. 19–26 (2013)
Google Scholar
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting Android to protect data from imperious applications. In: Proceedings of the Eighteenth ACM Conference on Computer and Communications Security, pp. 639–652 (2011)
Google Scholar
Kaiser, T.: Google removes “App. Ops” privacy control feature from Android 4.4.2, DailyTech, December 16, 2013
Google Scholar
Lin, J., Amini, S., Hong, J., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: understanding users’ mental models of mobile app. privacy through crowdsourcing. In: Proceedings of the ACM International Conference on Ubiquitous Computing, pp. 501–510 (2012)
Google Scholar
Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 391–394 (2012)
Google Scholar
Vidas, T., Christin, N.: Evading Android runtime analysis via sandbox detection. In: Proceedings of the Ninth ACM Symposium on Information, Computer and Communications Security, pp. 447–458 (2014)
Google Scholar