{"id":"https://openalex.org/W2913037077","doi":"https://doi.org/10.3390/informatics6010007","title":"What Is This Sensor and Does This App Need Access to It?","display_name":"What Is This Sensor and Does This App Need Access to It?","publication_year":2019,"publication_date":"2019-01-24","ids":{"openalex":"https://openalex.org/W2913037077","doi":"https://doi.org/10.3390/informatics6010007","mag":"2913037077"},"language":"en","primary_location":{"id":"doi:10.3390/informatics6010007","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics6010007","pdf_url":"https://www.mdpi.com/2227-9709/6/1/7/pdf?version=1551764206","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2227-9709/6/1/7/pdf?version=1551764206","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023973244","display_name":"Maryam Mehrnezhad","orcid":"https://orcid.org/0000-0002-4223-6885"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Maryam Mehrnezhad","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne NE4 5TG, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne NE4 5TG, UK","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029147151","display_name":"Ehsan Toreini","orcid":"https://orcid.org/0000-0002-5172-2957"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ehsan Toreini","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne NE4 5TG, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne NE4 5TG, UK","institution_ids":["https://openalex.org/I84884186"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023973244","https://openalex.org/A5029147151"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.5026,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.82561324,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"6","issue":"1","first_page":"7","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7138291597366333},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7070024013519287},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.691757082939148},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5256375074386597},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.5215204358100891},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.5094648003578186},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4804063141345978},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4031124413013458},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.38382917642593384},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.28742823004722595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7138291597366333},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7070024013519287},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.691757082939148},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5256375074386597},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.5215204358100891},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.5094648003578186},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4804063141345978},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4031124413013458},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.38382917642593384},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.28742823004722595},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/informatics6010007","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics6010007","pdf_url":"https://www.mdpi.com/2227-9709/6/1/7/pdf?version=1551764206","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:35ce823e876241caace21be7aec8a5c6","is_oa":true,"landing_page_url":"https://doaj.org/article/35ce823e876241caace21be7aec8a5c6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics, Vol 6, Iss 1, p 7 (2019)","raw_type":"article"},{"id":"pmh:oai:durham-repository.worktribe.com:1141815","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1141815","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Presentation / Conference Contribution"},{"id":"pmh:oai:eprint.ncl.ac.uk:255347","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402485","display_name":"Newcastle University ePrints (Newcastle Univesity)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I84884186","host_organization_name":"Newcastle University","host_organization_lineage":["https://openalex.org/I84884186"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:mdpi.com:/2227-9709/6/1/7/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/informatics6010007","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Informatics","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/informatics6010007","is_oa":true,"landing_page_url":"https://doi.org/10.3390/informatics6010007","pdf_url":"https://www.mdpi.com/2227-9709/6/1/7/pdf?version=1551764206","source":{"id":"https://openalex.org/S2738238905","display_name":"Informatics","issn_l":"2227-9709","issn":["2227-9709"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.6299999952316284,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2913037077.pdf","grobid_xml":"https://content.openalex.org/works/W2913037077.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1525179699","https://openalex.org/W1973831058","https://openalex.org/W1976081290","https://openalex.org/W2022359655","https://openalex.org/W2038790378","https://openalex.org/W2063634953","https://openalex.org/W2090465075","https://openalex.org/W2116092808","https://openalex.org/W2146096861","https://openalex.org/W2148009765","https://openalex.org/W2150097065","https://openalex.org/W2227908937","https://openalex.org/W2232454642","https://openalex.org/W2342352258","https://openalex.org/W2401233188","https://openalex.org/W2415424630","https://openalex.org/W2541261609","https://openalex.org/W2547961895","https://openalex.org/W2686848947","https://openalex.org/W2722360008","https://openalex.org/W2750605411","https://openalex.org/W2750691906","https://openalex.org/W6689233180"],"related_works":["https://openalex.org/W2316685381","https://openalex.org/W3003485427","https://openalex.org/W2056388267","https://openalex.org/W2249350383","https://openalex.org/W4210309948","https://openalex.org/W2755037920","https://openalex.org/W2114381667","https://openalex.org/W4388923452","https://openalex.org/W2072937473","https://openalex.org/W3211901564"],"abstract_inverted_index":{"Mobile":[0],"sensors":[1,26,52,91,135,152,166,198],"have":[2],"already":[3],"proven":[4],"to":[5,24,59,133,247,264],"be":[6],"helpful":[7],"in":[8,28],"different":[9],"aspects":[10],"of":[11,51,66,84,116,158,180,184],"people\u2019s":[12],"everyday":[13],"lives":[14],"such":[15,190],"as":[16,191],"fitness,":[17],"gaming,":[18],"navigation,":[19],"etc.":[20],"However,":[21,187],"illegitimate":[22],"access":[23],"these":[25,127,151,159,185,197],"results":[27,115,162],"a":[29,203],"malicious":[30],"program":[31],"running":[32],"with":[33,138,169,236],"an":[34],"exploit":[35],"path.":[36],"While":[37],"the":[38,48,64,77,80,89,98,114,129,143,148,156,176,181,192,207,213,216],"users":[39,61,233,263],"are":[40],"benefiting":[41],"from":[42],"richer":[43],"and":[44,56,62,82,96,104,199,224,239,251,261,268],"more":[45,69],"personalized":[46],"apps,":[47],"growing":[49],"number":[50],"introduces":[53],"new":[54],"security":[55,81,178,250],"privacy":[57,83],"risks":[58,183,201],"end":[60],"makes":[63],"task":[65],"sensor":[67,124],"management":[68],"complex.":[70],"In":[71,126],"this":[72,271],"paper,":[73],"first,":[74],"we":[75,112,120,254],"discuss":[76],"issues":[78],"around":[79],"mobile":[85,94,105,123,134,232,262],"sensors.":[86,160,186],"We":[87,141,210],"investigate":[88],"available":[90],"on":[92,122,206,270],"mainstream":[93],"devices":[95],"study":[97],"permission":[99],"policies":[100],"that":[101,119,164,218,230],"Android,":[102],"iOS":[103],"web":[106],"browsers":[107],"offer":[108],"for":[109,150,257],"them.":[110],"Second,":[111],"reflect":[113],"two":[117],"workshops":[118],"organized":[121],"security.":[125],"workshops,":[128],"participants":[130,149,214],"were":[131,234],"introduced":[132],"by":[136,147,167],"working":[137,168],"sensor-enabled":[139,170],"apps.":[140],"evaluated":[142],"risk":[144],"levels":[145],"perceived":[146],"after":[153],"they":[154,219,242],"understood":[155],"functionalities":[157],"The":[161],"showed":[163,229],"knowing":[165],"apps":[171,223],"would":[172],"not":[173],"immediately":[174],"improve":[175,248],"users\u2019":[177,208],"inference":[179],"actual":[182],"other":[188],"factors":[189],"prior":[193],"general":[194],"knowledge":[195],"about":[196,215],"their":[200,222,225,249],"had":[202],"strong":[204],"impact":[205],"perception.":[209],"also":[211],"taught":[212],"ways":[217],"could":[220,243],"audit":[221],"permissions.":[226],"Our":[227],"findings":[228],"when":[231],"provided":[235],"reasonable":[237],"choices":[238],"intuitive":[240],"teaching,":[241],"easily":[244],"self-direct":[245],"themselves":[246],"privacy.":[252],"Finally,":[253],"provide":[255],"recommendations":[256],"educators,":[258],"app":[259],"developers,":[260],"contribute":[265],"toward":[266],"awareness":[267],"education":[269],"topic.":[272]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
