dc.identifier.citation |
[1] A. Ant, J. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen, “Financial privacy policies and the need for standardization,” IEEE Security Privacy, vol. 2, pp. 36–45, Mar. 2004. doi: 10.1109/MSECP.2004.1281243. [2] A. R. Besmer, J. Watson, and M. S. Banks, “Investigating user perceptions of mobile app privacy: An analysis of user-submitted app reviews,” International Journal of Information Security and Privacy, vol. 14, no. 4, p. 74, 2020. [3] B. Bonné, S. T. Peddinti, I. Bilogrevic, and N. Taft, “Exploring decision making with android’s runtime permission dialogs using in-context surveys,” in Sym posium on Usable Privacy and Security, ser. SOUPS, USENIX Association, 2017, pp. 195–210. [4] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. [5] A. Cavoukian, “The security-privacy paradox: Issues, misconceptions, and strate gies,” 2003. [6] N. Chen, J. Lin, S. C. H. Hoi, X. Xiao, and B. Zhang, “Ar-miner: Mining infor mative reviews for developers from mobile app marketplace,” New York, NY, USA: Association for Computing Machinery, 2014, isbn: 9781450327565. doi: 10 . 1145 / 2568225 . 2568263. [Online]. Available: https : / / doi . org / 10 . 1145/2568225.2568263. [7] J. Cohen, “A coefficient of agreement for nominal scales,” Educational and psy chological measurement, vol. 20, no. 1, pp. 37–46, 1960. [8] C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995. [9] M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, “A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy re quirements,” Requirements Engineering, vol. 16, no. 1, pp. 3–32, 2011. 35 [10] J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, “Bert: Pre-training of deep bidirectional transformers for language understanding,” arXiv preprint arXiv:1810.04805, 2019. [11] T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd. Springer, 2009, isbn: 978-0-387- 84857-0. [12] D. W. Hosmer, S. Lemeshow, and R. X. Sturdivant, Applied Logistic Regression. John Wiley & Sons, 2013. [13] K. S. Jones, “A statistical interpretation of term specificity and its application in retrieval,” Journal of Documentation, vol. 28, no. 1, pp. 11–21, 1972. doi: 10. 1108/eb026526. [14] J. Jung, S. Han, and D. Wetherall, “Enhancing mobile application permissions with runtime feedback and constraints,” in Proceedings of the Second ACMWork shop on Security and Privacy in Smartphones and Mobile Devices, ser. SPSM ’12, ACM, 2012. [15] A. Karim, “Classification of google play store application reviews using ma chine learning,” Jul. 2020. doi: 10.20944/preprints202007.0646.v1. [16] P. G. Kelley, L. F. Cranor, and N. Sadeh, “Privacy as part of the app decision making process,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ser. CHI ’13, Paris, France: ACM, 2013, pp. 3393–3402, isbn: 978-1-4503-1899-0. doi: 10 . 1145 / 2470654 . 2466466. [Online]. Avail able: https://doi.org/10.1145/2470654.2466466. [17] B. Liu, M. S. Andersen, F. Schaub, et al., “Follow my recommendations: A per sonalized privacy assistant for mobile app permissions,” in Twelfth Symposium on Usable Privacy and Security, ser. SOUPS 2016, USENIX Association, 2016, pp. 27–41. [18] Y. Liu, M. Ott, N. Goyal, et al., “Roberta: A robustly optimized bert pretraining approach,” arXiv preprint arXiv:1907.11692, 2019. [19] D. Mukherjee, A. Ahmadi, M. Vahdat Pour, and J. Reardon, “An empirical study on user reviews targeting mobile apps’ security & privacy,” 2020. arXiv: 2010. 06371 [cs.CR]. [20] P. Nema, P. Anthonysamy, N. Taft, and S. T. Peddinti, “Analyzing user perspec tives on mobile app privacy at scale,” 2020. [21] P. Nema, P. Anthonysamy, N. Taft, and S. T. Peddinti, “Analyzing user per spectives on mobile app privacy at scale,” New York, NY, USA: Association for 36 Computing Machinery, 2022, isbn: 9781450392211. doi: 10.1145/3510003. 3510079. [Online]. Available: https://doi.org/10.1145/3510003.3510079. [22] D. C. Nguyen, E. Derr, M. Backes, and S. Bugiel, “Short text, large effect: Mea suring the impact of user reviews on android app security & privacy,” in 2019 IEEE Symposium on Security and Privacy (SP), IEEE Press, 2019. [23] D. M. W. Powers, “Evaluation: From precision, recall and f-measure to roc, in formedness, markedness and correlation,” in Journal of Machine Learning Tech nologies, vol. 2, 2011, pp. 37–63. [24] A. Qureshi, M. Ahmad, S. Ullah, M. Yasir, F. Rustam, and I. Ashraf, “Perfor mance evaluation of machine learning models on large dataset of android ap plications reviews,” Multimedia Tools and Applications, vol. 82, pp. 1–23, Mar. 2023. doi: 10.1007/s11042-023-14713-6. [25] G. L. Scoccia, M. Autili, G. Stilo, and P. Inverardi, “An empirical study of privacy labels on the apple ios mobile app store,” New York, NY, USA: Association for Computing Machinery, 2022, isbn: 9781450393010. doi: 10.1145/3524613. 3527813. [Online]. Available: https://doi.org/10.1145/3524613.3527813. [26] M. Tavakoli, L. Zhao, A. Heydari, and G. Nenadic, “Extracting useful software development information from mobile application reviews: A survey of intelli gent mining techniques and tools,” Expert Systems with Applications, vol. 113, Jun. 2018. doi: 10.1016/j.eswa.2018.05.037. [27] C. Thompson, M. Johnson, S. Egelman, D. Wagner, and J. King, “When it’s bet ter to ask forgiveness than get permission: Attribution mechanisms for smart phone resources,” in Proceedings of the Ninth Symposium on Usable Privacy and Security, ser. SOUPS ’13, ACM, New York, NY, USA, 2013. [28] L. Tsai, P. Wijesekera, J. Reardon, et al., “Turtleguard: Helping android users apply contextual privacy preferences,” in Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security, vol. 1, 2017, pp. 145–162. [29] C. J. Van Rijsbergen, “The foundation of evaluation in retrieval systems,” Jour nal of Documentation, vol. 30, no. 4, pp. 365–373, 1974. [30] C. Wang, J. Jiang, M. Daneva, and M. Van Sinderen, “Coolted: A web-based collaborative labeling tool for the textual dataset,” in 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), IEEE, 2022, pp. 613–617. [31] J. Wei, K. Zou, Z. Chen, Y. Chen, L. Li, and P. Chen, “Eda: Easy data augmen tation techniques for boosting performance on text classification tasks,” in Pro ceedings of the 2019 Conference on Empirical Methods in Natural Language Pro 37 cessing and the 9th International Joint Conference on Natural Language Process ing (EMNLP-IJCNLP), 2019, pp. 6383–6389. [32] H. Xu, S. Gupta, M. B. Rosson, and J. Carroll, “Measuring mobile users’ con cerns for information privacy,” in International Conference on Information Sys tems, ser. ICIS 2012, Elsevier, 2012. [33] J. Zhang, J. Hua, Y. Chen, N. Niu, and C. Liu, “Mining user privacy concern topics from app reviews,” International Journal of Information Security and Pri vacy, vol. 14, no. 4, p. 74, 20 |
en_US |