Personality and patterns of Facebook usage, Proceedings of the 3rd Annual ACM Web Science Conference on, WebSci '12, pp.24-322380722, 2012. ,
DOI : 10.1145/2380718.2380722
A contrarian view of the five-factor approach to personality description., Psychological Bulletin, vol.117, issue.2, pp.187-215, 1995. ,
DOI : 10.1037/0033-2909.117.2.187
Development of measures of online privacy concern and protection for use on the Internet, Journal of the American Society for Information Science and Technology, vol.4, issue.2, pp.157-165, 2007. ,
DOI : 10.1027///1618-3169.49.4.241
Amazon's Mechanical Turk, Perspectives on Psychological Science, vol.11, issue.2, pp.3-5, 2011. ,
DOI : 10.1037/0022-3514.51.3.515
Making use of derived personality: The case of social media ad targeting, International AAAI Conference on Web and Social Media, 2015. ,
Is this app safe?, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.311-320, 2012. ,
DOI : 10.1145/2187836.2187879
Psychological Assessment Resources, I.: Revised NEO Personality Inventory (NEO PI-R) and NEO Five-Factor Inventory (NEO-FFI), Psychological Assessment Resources, 1992. ,
Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010. ,
DOI : 10.1145/1772690.1772727
Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011. ,
DOI : 10.1145/2046707.2046779
The effectiveness of application permissions, Proceedings of the 2nd USENIX Conference on Web Application Development . pp. 7?7. WebApps'11, USENIX Association, 2011. ,
Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-3, 2012. ,
DOI : 10.1145/2335356.2335360
A very brief measure of the Big-Five personality domains, Journal of Research in Personality, vol.37, issue.6, pp.504-528, 2003. ,
DOI : 10.1016/S0092-6566(03)00046-1
Using personal examples to improve risk communication for security & privacy decisions, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, pp.2647-2656, 2014. ,
DOI : 10.1145/2556288.2556978
Crowdsourced Exploration of Security Configurations, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, 2015. ,
DOI : 10.1145/2702123.2702370
The Big Five Trait Taxonomy: History, Measurement, and Theoretical Perspectives Handbook of Personality: Theory and Research, pp.102-138, 1999. ,
Short paper, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.45-50, 2012. ,
DOI : 10.1145/2381934.2381944
A Conundrum of Permissions: Installing Applications on an Android Smartphone, Proceedings of the 16th International Conference on Financial Cryptography and Data Security, pp.68-79978, 2012. ,
DOI : 10.1007/978-3-642-34638-5_6
Privacy as part of the app decision-making process, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, 2013. ,
DOI : 10.1145/2470654.2466466
Privacy indexes: A survey of westin's studies, ISRI Technical Report, 2005. ,
Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings, Symposium On Usable Privacy and Security (SOUPS 2014, pp.199-212, 2014. ,
Follow my recommendations: A personalized privacy assistant for mobile app permissions, Twelfth Symposium on Usable Privacy and Security, pp.27-41, 2016. ,
Reconciling mobile app privacy and usability on smartphones, Proceedings of the 23rd international conference on World wide web, WWW '14, pp.201-212, 2014. ,
DOI : 10.1145/2566486.2568035
URL : http://reports-archive.adm.cs.cmu.edu/anon/2013/CMU-CS-13-128.pdf
To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications, pp.440-444, 2007. ,
DOI : 10.1007/978-3-540-73078-1_61
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research, vol.15, issue.4, pp.336-355, 2004. ,
DOI : 10.1287/isre.1040.0032
The next web. android users have an average of 95 apps installed on their phones, according to yahoo aviate data, pp.2016-2018, 2015. ,
Pew research center. an analysis of an- droid app permissions an-analysis-of-android-app-permissions, pp.2016-2018, 2015. ,
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules, pp.86-97 ,
DOI : 10.1007/978-3-642-34638-5_8
Capturing social networking privacy preferences, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, pp.1-47, 2009. ,
DOI : 10.1145/1572532.1572587
Information Privacy: Measuring Individuals' Concerns about Organizational Practices, MIS Quarterly, vol.20, issue.2, pp.167-196, 1996. ,
DOI : 10.2307/249477
Would a privacy fundamentalist sell their dna for $1000... if nothing bad happened thereafter? a study of the westin categories, behavior intentions, and consequences, Proceedings of the Tenth Symposium on Usable Privacy and Security (SOUPS) ,
Towards understanding the impact of personality traits on mobile app adoption -a scalable approach, ECIS (2015) ,