Author:
Chong Isis,Ge Huangyi,Li Ninghui,Proctor Robert W.
Funder
National Science Foundation
Subject
Law,General Computer Science
Reference35 articles.
1. Studying the effectiveness of android application permissions requests;Benton,2013
2. Gist is the grist: fuzzy-trace theory and the new intuitionism;Brainerd;Dev Rev,1990
3. Amazon's mechanical turk: a new source of inexpensive, yet high-quality, data;Buhrmester;Perspect Psychol Sci,2011
4. Communicating numerical risk: Human factors that aid understanding in health care;Brust-Renck;Rev Hum Factors Ergon,2013
5. CBS News (2016, July 24). Beware downloading some apps or risk “being spied on”. Retrieved from http://www.cbsnews.com/news/mobile-phone-apps-malware-risks-how-to-prevent-hacking-breach/.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献