{"id":"https://openalex.org/W2604847839","doi":"https://doi.org/10.1515/popets-2017-0014","title":"Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions","display_name":"Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions","publication_year":2017,"publication_date":"2017-04-01","ids":{"openalex":"https://openalex.org/W2604847839","doi":"https://doi.org/10.1515/popets-2017-0014","mag":"2604847839"},"language":"en","primary_location":{"id":"doi:10.1515/popets-2017-0014","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0014","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/2/article-p23.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/2/article-p23.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013067968","display_name":"Yousra Javed","orcid":"https://orcid.org/0000-0002-0293-9551"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yousra Javed","raw_affiliation_strings":["University of North Carolina Charlotte"],"affiliations":[{"raw_affiliation_string":"University of North Carolina Charlotte","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013557688","display_name":"Mohamed Shehab","orcid":"https://orcid.org/0000-0002-4189-9118"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Shehab","raw_affiliation_strings":["University of North Carolina Charlotte"],"affiliations":[{"raw_affiliation_string":"University of North Carolina Charlotte","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013067968"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":2.0342,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.87801007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2017","issue":"2","first_page":"23","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9360715746879578},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7041667103767395},{"id":"https://openalex.org/keywords/eye-tracking","display_name":"Eye tracking","score":0.6794909238815308},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6345019340515137},{"id":"https://openalex.org/keywords/gaze","display_name":"Gaze","score":0.6045370697975159},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5529963970184326},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5206441283226013},{"id":"https://openalex.org/keywords/dialog-box","display_name":"Dialog box","score":0.5101163983345032},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4932977557182312},{"id":"https://openalex.org/keywords/user-group","display_name":"User group","score":0.42650213837623596},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3609546422958374},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2668917179107666},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24246692657470703}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9360715746879578},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041667103767395},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.6794909238815308},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6345019340515137},{"id":"https://openalex.org/C2779916870","wikidata":"https://www.wikidata.org/wiki/Q14467155","display_name":"Gaze","level":2,"score":0.6045370697975159},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5529963970184326},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5206441283226013},{"id":"https://openalex.org/C173853756","wikidata":"https://www.wikidata.org/wiki/Q86915","display_name":"Dialog box","level":2,"score":0.5101163983345032},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4932977557182312},{"id":"https://openalex.org/C3017738328","wikidata":"https://www.wikidata.org/wiki/Q613366","display_name":"User group","level":2,"score":0.42650213837623596},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3609546422958374},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2668917179107666},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24246692657470703},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/popets-2017-0014","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0014","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/2/article-p23.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fa022a1183d642e99c80248d32849d7e","is_oa":true,"landing_page_url":"https://doaj.org/article/fa022a1183d642e99c80248d32849d7e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 2, Pp 23-37 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/popets-2017-0014","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0014","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/2/article-p23.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.75,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2604847839.pdf","grobid_xml":"https://content.openalex.org/works/W2604847839.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W119933994","https://openalex.org/W1468986134","https://openalex.org/W1522768299","https://openalex.org/W1968533893","https://openalex.org/W1980767298","https://openalex.org/W1984018499","https://openalex.org/W2033811191","https://openalex.org/W2086648145","https://openalex.org/W2094432159","https://openalex.org/W2126411273","https://openalex.org/W2144981153","https://openalex.org/W2156744053","https://openalex.org/W2157337727","https://openalex.org/W2324898316","https://openalex.org/W2488684219"],"related_works":["https://openalex.org/W2374086689","https://openalex.org/W3176279093","https://openalex.org/W2373945265","https://openalex.org/W2370203001","https://openalex.org/W2074755311","https://openalex.org/W2379813727","https://openalex.org/W2151660018","https://openalex.org/W2409075021","https://openalex.org/W2374491724","https://openalex.org/W2361337511"],"abstract_inverted_index":{"Abstract":[0],"Habituation":[1],"is":[2],"a":[3,62,111,117,123,200],"key":[4],"factor":[5],"behind":[6],"the":[7,27,80,89,94,99,105,159,164,167,171,181,188,194,205,209,213],"lack":[8],"of":[9,29,113,166,177],"attention":[10,31,67,143],"towards":[11,33,68,144],"permission":[12,133,182],"authorization":[13,129,138,153],"dialogs":[14,154],"during":[15],"third":[16],"party":[17],"application":[18,69,128],"installation.":[19],"Various":[20],"solutions":[21],"have":[22],"been":[23],"proposed":[24],"to":[25,38,48,56,75,91,157,163,212],"combat":[26],"problem":[28],"achieving":[30],"switch":[32],"permissions.":[34,100,145],"However,":[35,192],"users":[36,72],"continue":[37],"ignore":[39],"these":[40],"dialogs,":[41],"and":[42,50,60,85,121,137,202],"authorize":[43,76],"dangerous":[44,201],"permissions,":[45],"which":[46,197],"leads":[47],"security":[49],"privacy":[51],"breaches.":[52],"We":[53,78,109],"leverage":[54],"eye-tracking":[55],"approach":[57,115,151],"this":[58],"problem,":[59],"propose":[61],"mechanism":[63],"for":[64],"enforcing":[65],"user":[66,95,103,124],"permissions":[70,160],"before":[71],"are":[73,107],"able":[74,156],"them.":[77],"deactivate":[79],"dialog\u2019s":[81],"decision":[82],"buttons":[83,106],"initially,":[84],"use":[86],"feedback":[87],"from":[88,208],"eye-tracker":[90],"ensure":[92],"that":[93],"has":[96],"looked":[97],"at":[98],"After":[101],"determining":[102],"attention,":[104],"activated.":[108],"implemented":[110],"prototype":[112],"our":[114,150],"as":[116],"Chrome":[118],"browser":[119],"extension,":[120],"conducted":[122],"study":[125],"on":[126,152,180],"Facebook\u2019s":[127],"dialogs.":[130],"Using":[131],"participants\u2019":[132,142],"identification,":[134],"eye-gaze":[135,178],"fixations,":[136],"decisions,":[139],"we":[140],"evaluate":[141],"The":[146],"participants":[147,198],"who":[148],"used":[149],"were":[155],"identify":[158],"better,":[161],"compared":[162],"rest":[165],"participants,":[168],"even":[169],"after":[170],"habituation":[172],"period.":[173],"Their":[174],"average":[175],"number":[176],"fixations":[179],"text":[183],"was":[184,216],"significantly":[185],"higher":[186],"than":[187],"other":[189],"group":[190,211,215],"participants.":[191],"examining":[193],"rate":[195],"in":[196],"denied":[199],"unnecessary":[203],"permission,":[204],"hypothesized":[206],"increase":[207],"control":[210],"treatment":[214],"not":[217],"statistically":[218],"significant.":[219]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
