What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management.
Jie TangBin ZhangUmair AkramPublished in: Inf. (2021)
Keyphrases
- mobile applications
- mobile devices
- mobile phone
- user experience
- access control
- context aware
- identity management
- smart phones
- management system
- mobile users
- privacy preserving
- m learning
- location based services
- mobile apps
- mobile environments
- personal information
- mobile services
- mobile platform
- wireless devices
- mobile technologies
- role based access control
- data management
- knowledge base
- private information
- conflict resolution
- privacy concerns
- wifi