Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(privacy permissions). Showing records 1 – 6 of 6 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Illinois – Urbana-Champaign

1. Demetriou, Soteris. Analyzing & designing the security of shared resources on smartphone operating systems.

Degree: PhD, Computer Science, 2018, University of Illinois – Urbana-Champaign

 Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones became the de facto devices users leverage to manage… (more)

Subjects/Keywords: smartphone; mobile; system; Android; resources; access control; security; privacy; confidentiality; permissions; operating system; bluetooth; nfc; IoT; internet of things

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Demetriou, S. (2018). Analyzing & designing the security of shared resources on smartphone operating systems. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/100907

Chicago Manual of Style (16th Edition):

Demetriou, Soteris. “Analyzing & designing the security of shared resources on smartphone operating systems.” 2018. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed January 23, 2021. http://hdl.handle.net/2142/100907.

MLA Handbook (7th Edition):

Demetriou, Soteris. “Analyzing & designing the security of shared resources on smartphone operating systems.” 2018. Web. 23 Jan 2021.

Vancouver:

Demetriou S. Analyzing & designing the security of shared resources on smartphone operating systems. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2018. [cited 2021 Jan 23]. Available from: http://hdl.handle.net/2142/100907.

Council of Science Editors:

Demetriou S. Analyzing & designing the security of shared resources on smartphone operating systems. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2018. Available from: http://hdl.handle.net/2142/100907

2. Mohzary, Muhammad A. A PRIVACY-AWARE WEARABLE FRAMEWORK.

Degree: MS, College of Arts and Sciences / Department of Computer Science, 2018, Kent State University

 With the exceptional advances in wearable devices’ capabilities to monitor users' daily activities, privacy concerns increase for the smartwatch users who must disclose their sensitive… (more)

Subjects/Keywords: Computer Science; wearable devices privacy, application permissions, privacy awareness, authentication

…device’s privacy, wearable device’s application permissions, privacy awareness, and… …has requested permissions and included appropriate security (not privacy)… …the collected data, which negatively affects their privacy. For that reason, the… …preservation of individuals’ privacy is an increasing concern. It is important to provide solutions… …their sensitive information. As concern for preserving smartwatch users’ information privacy… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohzary, M. A. (2018). A PRIVACY-AWARE WEARABLE FRAMEWORK. (Masters Thesis). Kent State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=kent1543596297413637

Chicago Manual of Style (16th Edition):

Mohzary, Muhammad A. “A PRIVACY-AWARE WEARABLE FRAMEWORK.” 2018. Masters Thesis, Kent State University. Accessed January 23, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1543596297413637.

MLA Handbook (7th Edition):

Mohzary, Muhammad A. “A PRIVACY-AWARE WEARABLE FRAMEWORK.” 2018. Web. 23 Jan 2021.

Vancouver:

Mohzary MA. A PRIVACY-AWARE WEARABLE FRAMEWORK. [Internet] [Masters thesis]. Kent State University; 2018. [cited 2021 Jan 23]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1543596297413637.

Council of Science Editors:

Mohzary MA. A PRIVACY-AWARE WEARABLE FRAMEWORK. [Masters Thesis]. Kent State University; 2018. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1543596297413637


Ohio University

3. Hopkins, Ashley R. Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download.

Degree: PhD, Journalism (Communication), 2019, Ohio University

 This study worked to determine the amount of attention users of mobile application devices dedicate to opt-in privacy policies. As the average user is often… (more)

Subjects/Keywords: Journalism; mobile applications; apps; smartphone; social media; privacy; data; datamining; data mine; Android; Apple; privacy permissions; terms and conditions; motivation; opportunity; decision-making; gaming; photo-sharing; Facebook; MODE model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hopkins, A. R. (2019). Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download. (Doctoral Dissertation). Ohio University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244

Chicago Manual of Style (16th Edition):

Hopkins, Ashley R. “Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download.” 2019. Doctoral Dissertation, Ohio University. Accessed January 23, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.

MLA Handbook (7th Edition):

Hopkins, Ashley R. “Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download.” 2019. Web. 23 Jan 2021.

Vancouver:

Hopkins AR. Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download. [Internet] [Doctoral dissertation]. Ohio University; 2019. [cited 2021 Jan 23]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.

Council of Science Editors:

Hopkins AR. Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download. [Doctoral Dissertation]. Ohio University; 2019. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244

4. Felt, Adrienne Porter. Towards Comprehensible and Effective Permission Systems.

Degree: Computer Science, 2012, University of California – Berkeley

 How can we, as platform designers, protect computer users from the threats associated with malicious, privacy-invasive, and vulnerable applications? Modern platforms have turned away from… (more)

Subjects/Keywords: Computer science; browsers; permissions; privacy; security; smartphones; web

…to identity specific problems with the way permissions are presented. Smartphone Privacy… …application has a different set of permissions based on its requirements. These permissions control… …applications’ access to security- and privacy-relevant system resources, so that users can decide… …prompted to approve permissions as needed by applications at runtime. In others, developers are… …permissions can potentially provide two security benefits: • Defense in Depth: For systems with… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Felt, A. P. (2012). Towards Comprehensible and Effective Permission Systems. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/8h695639

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Felt, Adrienne Porter. “Towards Comprehensible and Effective Permission Systems.” 2012. Thesis, University of California – Berkeley. Accessed January 23, 2021. http://www.escholarship.org/uc/item/8h695639.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Felt, Adrienne Porter. “Towards Comprehensible and Effective Permission Systems.” 2012. Web. 23 Jan 2021.

Vancouver:

Felt AP. Towards Comprehensible and Effective Permission Systems. [Internet] [Thesis]. University of California – Berkeley; 2012. [cited 2021 Jan 23]. Available from: http://www.escholarship.org/uc/item/8h695639.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Felt AP. Towards Comprehensible and Effective Permission Systems. [Thesis]. University of California – Berkeley; 2012. Available from: http://www.escholarship.org/uc/item/8h695639

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Stelly, Christopher D. Dynamic User Defined Permissions for Android Devices.

Degree: MS, Computer Science, 2013, University of New Orleans

  Mobile computing devices have become an essential part of everyday life and are becoming the primary means for collecting and storing sensitive personal and… (more)

Subjects/Keywords: android; security; privacy; permissions; instrumentation; aspect oriented programming; appsanitizer

…microphone, camera, etc. Unfortunately, the Android permissions model does not provide users with… …enough control over the installed apps, which can easily result in loss of privacy, and has… …potentially serious security implications in corporate environments. Android Permissions Framework… …declare at installation time the permissions it needs; during the installation process, the user… …is given the choice of agreeing to the requested permissions on an all-or-nothing basis… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stelly, C. D. (2013). Dynamic User Defined Permissions for Android Devices. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Stelly, Christopher D. “Dynamic User Defined Permissions for Android Devices.” 2013. Thesis, University of New Orleans. Accessed January 23, 2021. https://scholarworks.uno.edu/td/1775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Stelly, Christopher D. “Dynamic User Defined Permissions for Android Devices.” 2013. Web. 23 Jan 2021.

Vancouver:

Stelly CD. Dynamic User Defined Permissions for Android Devices. [Internet] [Thesis]. University of New Orleans; 2013. [cited 2021 Jan 23]. Available from: https://scholarworks.uno.edu/td/1775.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Stelly CD. Dynamic User Defined Permissions for Android Devices. [Thesis]. University of New Orleans; 2013. Available from: https://scholarworks.uno.edu/td/1775

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Gollapudi, Narasimha Aditya. Privacy Preserving Controls for Android Applications.

Degree: Computer Science, 2014, Arizona State University

Subjects/Keywords: Computer science; Computer engineering; Android Permissions; Android Security; Privacy Android

…threats when concerned to user privacy. Android uses permissions mechanism to grant access to… …security, permissions and user privacy in Android. Chapter 4 deals with the project involving… …user’s privacy. The permissions of an app should be listed using the 14 privacy. System/Signature These are probably the most powerful permissions, which have… …communication entity, Intents, permissions re-delegation might be a potential threat to user’s privacy… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gollapudi, N. A. (2014). Privacy Preserving Controls for Android Applications. (Masters Thesis). Arizona State University. Retrieved from http://repository.asu.edu/items/26863

Chicago Manual of Style (16th Edition):

Gollapudi, Narasimha Aditya. “Privacy Preserving Controls for Android Applications.” 2014. Masters Thesis, Arizona State University. Accessed January 23, 2021. http://repository.asu.edu/items/26863.

MLA Handbook (7th Edition):

Gollapudi, Narasimha Aditya. “Privacy Preserving Controls for Android Applications.” 2014. Web. 23 Jan 2021.

Vancouver:

Gollapudi NA. Privacy Preserving Controls for Android Applications. [Internet] [Masters thesis]. Arizona State University; 2014. [cited 2021 Jan 23]. Available from: http://repository.asu.edu/items/26863.

Council of Science Editors:

Gollapudi NA. Privacy Preserving Controls for Android Applications. [Masters Thesis]. Arizona State University; 2014. Available from: http://repository.asu.edu/items/26863

.