Y. Bachrach, M. Kosinski, T. Graepel, P. Kohli, and D. Stillwell, Personality and patterns of Facebook usage, Proceedings of the 3rd Annual ACM Web Science Conference on, WebSci '12, pp.24-322380722, 2012.
DOI : 10.1145/2380718.2380722

J. Block, A contrarian view of the five-factor approach to personality description., Psychological Bulletin, vol.117, issue.2, pp.187-215, 1995.
DOI : 10.1037/0033-2909.117.2.187

T. Buchanan, C. Paine, A. N. Joinson, and U. D. Reips, Development of measures of online privacy concern and protection for use on the Internet, Journal of the American Society for Information Science and Technology, vol.4, issue.2, pp.157-165, 2007.
DOI : 10.1027///1618-3169.49.4.241

M. Buhrmester, T. Kwang, and S. Gosling, Amazon's Mechanical Turk, Perspectives on Psychological Science, vol.11, issue.2, pp.3-5, 2011.
DOI : 10.1037/0022-3514.51.3.515

J. Chen, E. Haber, R. Kang, G. Hsieh, and J. Mahmud, Making use of derived personality: The case of social media ad targeting, International AAAI Conference on Web and Social Media, 2015.

P. H. Chia, Y. Yamamoto, and N. Asokan, Is this app safe?, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.311-320, 2012.
DOI : 10.1145/2187836.2187879

P. Costa and R. Mccrae, Psychological Assessment Resources, I.: Revised NEO Personality Inventory (NEO PI-R) and NEO Five-Factor Inventory (NEO-FFI), Psychological Assessment Resources, 1992.

L. Fang and K. Lefevre, Privacy wizards for social networking sites, Proceedings of the 19th international conference on World wide web, WWW '10, pp.351-360, 2010.
DOI : 10.1145/1772690.1772727

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.627-638, 2011.
DOI : 10.1145/2046707.2046779

A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of application permissions, Proceedings of the 2nd USENIX Conference on Web Application Development . pp. 7?7. WebApps'11, USENIX Association, 2011.

A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, pp.1-3, 2012.
DOI : 10.1145/2335356.2335360

S. D. Gosling, P. J. Rentfrow, and W. B. Swann, A very brief measure of the Big-Five personality domains, Journal of Research in Personality, vol.37, issue.6, pp.504-528, 2003.
DOI : 10.1016/S0092-6566(03)00046-1

M. Harbach, M. Hettig, S. Weber, and M. Smith, Using personal examples to improve risk communication for security & privacy decisions, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, CHI '14, pp.2647-2656, 2014.
DOI : 10.1145/2556288.2556978

Q. Ismail, T. Ahmed, A. Kapadia, and M. K. Reiter, Crowdsourced Exploration of Security Configurations, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, 2015.
DOI : 10.1145/2702123.2702370

O. P. John and S. Srivastava, The Big Five Trait Taxonomy: History, Measurement, and Theoretical Perspectives Handbook of Personality: Theory and Research, pp.102-138, 1999.

J. Jung, S. Han, and D. Wetherall, Short paper, Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '12, pp.45-50, 2012.
DOI : 10.1145/2381934.2381944

P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh et al., A Conundrum of Permissions: Installing Applications on an Android Smartphone, Proceedings of the 16th International Conference on Financial Cryptography and Data Security, pp.68-79978, 2012.
DOI : 10.1007/978-3-642-34638-5_6

P. G. Kelley, L. F. Cranor, and N. Sadeh, Privacy as part of the app decision-making process, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, 2013.
DOI : 10.1145/2470654.2466466

P. Kumaraguru and L. F. Cranor, Privacy indexes: A survey of westin's studies, ISRI Technical Report, 2005.

J. Lin, B. Liu, N. Sadeh, and J. I. Hong, Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings, Symposium On Usable Privacy and Security (SOUPS 2014, pp.199-212, 2014.

B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. A. Zhang et al., Follow my recommendations: A personalized privacy assistant for mobile app permissions, Twelfth Symposium on Usable Privacy and Security, pp.27-41, 2016.

B. Liu, J. Lin, and N. Sadeh, Reconciling mobile app privacy and usability on smartphones, Proceedings of the 23rd international conference on World wide web, WWW '14, pp.201-212, 2014.
DOI : 10.1145/2566486.2568035

URL : http://reports-archive.adm.cs.cmu.edu/anon/2013/CMU-CS-13-128.pdf

G. Lugano and P. Saariluoma, To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications, pp.440-444, 2007.
DOI : 10.1007/978-3-540-73078-1_61

N. K. Malhotra, S. S. Kim, and J. Agarwal, Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model, Information Systems Research, vol.15, issue.4, pp.336-355, 2004.
DOI : 10.1287/isre.1040.0032

K. Olmstead and M. Atkinson, The next web. android users have an average of 95 apps installed on their phones, according to yahoo aviate data, pp.2016-2018, 2015.

K. Olmstead and M. Atkinson, Pew research center. an analysis of an- droid app permissions an-analysis-of-android-app-permissions, pp.2016-2018, 2015.

S. Patil, L. Gall, Y. Lee, A. J. Kapadia, and A. , My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules, pp.86-97
DOI : 10.1007/978-3-642-34638-5_8

R. Ravichandran, M. Benisch, P. G. Kelley, and N. Sadeh, Capturing social networking privacy preferences, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, pp.1-47, 2009.
DOI : 10.1145/1572532.1572587

H. J. Smith and S. J. Milberg, Information Privacy: Measuring Individuals' Concerns about Organizational Practices, MIS Quarterly, vol.20, issue.2, pp.167-196, 1996.
DOI : 10.2307/249477

A. Woodruff, V. Pihur, A. Acquisti, S. Consolvo, L. Schmidt et al., Would a privacy fundamentalist sell their dna for $1000... if nothing bad happened thereafter? a study of the westin categories, behavior intentions, and consequences, Proceedings of the Tenth Symposium on Usable Privacy and Security (SOUPS)

R. Xu, R. M. Frey, D. Vuckovac, and A. Ilic, Towards understanding the impact of personality traits on mobile app adoption -a scalable approach, ECIS (2015)