Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference69 articles.
1. Improving app privacy: Nudging app developers to protect user privacy;Balebako;IEEE Secur. Priv.,2014
2. The privacy and security behaviors of smartphone app developers;Balebako,2014
3. Beigi, G., Guo, R., Nou, A., Zhang, Y., Liu, H., 2019. Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining. pp. 213–221.
4. Binns, R., Lyngs, U., Van Kleek, M., Zhao, J., Libert, T., Shadbolt, N., 2018a. Third party tracking in the mobile ecosystem. In: Proceedings of the 10th ACM Conference on Web Science. pp. 23–31.
5. Measuring third-party tracker power across web and mobile;Binns;ACM Trans. Internet Technol.,2018