P. Gilbert, B. G. Chun, L. Cox, and J. Jung, Automating privacy testing of smartphone applications, 2011.

E. Raad and R. Chbeir, Security and Privacy Preserving in Social Networks, pp.3-45, 2013.

B. Razeghi and S. Voloshynovskiy, Privacy-Preserving outsourced media search using secure sparse ternary codes, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1-5, 2018.

B. Razeghi, S. Voloshynovskiy, D. Kostadinov, and O. Taran, Privacy preserving identification using sparse approximation with ambiguization, Proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), pp.1-6, 2017.

, Number of apps available in leading app stores, 2018.

, Number of mobile app downloads worldwide in 2016, 2017.

, eMarketer unveils new estimates for mobile app usage, 2018.

, Report: Smartphone owners are using 9 apps per day, 30 per month, 2018.

, More time on Internet through smartphones than PCs, 2018.

J. Lin, S. Amini, J. I. Hong, N. Sadeh, J. Lindqvist et al., Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing, Proceedings of ACM Conference on Ubiquitous Computing (UbiComp'12), pp.501-510, 2012.

A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions: User attention, comprehension, and behavior, Proceedings of the 8th ACM Symposium on Usable Privacy and Security (SOUPS'12), pp.1-3, 2012.

A. P. Felt, S. Egelman, and D. Wagner, I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns, Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'12), pp.33-44, 2012.

D. J. Solove, Nothing to Hide: The False Tradeoff between Privacy and Security, 2011.

, Your apps are watching you, 2018.

, Appthority exposes security and privacy risk behind top 400 mobile apps, 2018.

P. H. Chia, Y. Yamamoto, and N. Asokan, Is this app safe?: a large scale study on application permissions and risk signals, Proceedings of the 21st International Conference on World Wide Web, pp.311-320, 2012.

P. G. Kelley, M. Benisch, L. F. Cranor, and N. Sadeh, When are users comfortable sharing locations with advertisers?, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2449-2452, 2011.
DOI : 10.1145/1978942.1979299

E. Chin, A. P. Felt, V. Sekar, and D. Wagner, Measuring user confidence in smartphone security and privacy, Proceedings of the 8th Symposium on Usable Privacy and Security, 2012.

A. P. Felt, S. Egelman, and D. Wagner, I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns, Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp.33-44, 2012.

S. Amini, Analyzing mobile app privacy using computation and crowdsourcing, Proceedings of the ACM Conference on Ubiquitous Computing, 2014.

S. Amini, J. Lin, J. I. Hong, J. Lindqvist, and J. Zhang, Mobile application evaluation using automation and crowdsourcing, Proceedings of the Workshop on Privacy Enhancing Tools, 2013.

P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner et al., Android permissions remystified: A field study on contextual integrity, Proceedings of the 24th USENIX Security Symposium, pp.499-514, 2015.

K. Crager, A. Maiti, M. Jadliwala, and J. He, Information leakage through mobile motion sensors: User awareness and concerns, Proceedings of the 2nd European Workshop on Usable Security, pp.1-15, 2017.
DOI : 10.14722/eurousec.2017.23013

URL : https://doi.org/10.14722/eurousec.2017.23013

B. Brown, Studying the Internet experience, HP Laboratories Technical Report HPL, 2001.

P. A. Norberg, D. R. Horne, and D. A. Horne, The privacy paradox : Personal information disclosure intentions versus behaviors, The Journal of Consumer Affairs, vol.41, issue.1, pp.100-126, 2007.

A. Acquisti, C. R. Taylor, and L. Wagman, The economics of privacy, Journal of Economic Literature, vol.54, issue.2, pp.442-492, 2016.

, Google removes vital privacy feature from Android, claiming its release was accidental, 2016.

M. Hatamian and J. Serna-olvera, Beacon alarming: Informed decision-making supporter and privacy risk analyser in Smartphone applications, Proceedings of the IEEE International Conference on Consumer Electronics (ICCE), pp.468-471, 2017.

M. Hatamian, J. Serna, K. Rannenberg, and B. Igler, FAIR: Fuzzy alarming index rule for privacy analysis in smartphone apps, Proceedings of the 14th International Conference on Trust, Privacy & Security in Digital Business, pp.3-18, 2017.

, /679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), Official Journal of the European Union, vol.59, 2016.

N. Aldhafferi, C. Watson, and A. S. Sajeev, Personal information privacy settings of online social networks and their suitability for mobile internet devices, International Journal of Security, Privacy and Trust Management, vol.2, issue.2, pp.1-17, 2013.

A. Rao, F. Schaub, N. Sadeh, A. Acquisti, and R. Kang, Expecting the unexpected: Understanding mismatched privacy expectations online, Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS), pp.77-96, 2016.

R. Likert, A technique for the measurement of attitudes, Archives of Psychology, vol.22, pp.5-55, 1932.

J. A. Gliem and R. R. Gliem, Calculating, interpreting, and reporting Cronbach's alpha reliability coefficient for likert-type scales, Proceedings of Midwest Research to Practice Conference in Adult, Continuing, and Community Education, pp.82-88, 2003.

A. Field, J. Miles, and Z. Field, Discovering statistics using SPSS, 2013.

J. Greene, M. , and D. Oliveira, Learning to use statistical tests in psychology, 2005.