Skip to main content

Research Repository

Advanced Search

A comparative study of android users’ privacy preferences under the runtime permission model (2017)
Journal Article
Andriotis, P., Li, S., Spyridopoulos, T., & Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model. Lecture Notes in Artificial Intelligence, 10292 LNCS, 604-622. https://doi.org/10.1007/978-3-319-58460-7_42

© Springer International Publishing AG 2017. Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model... Read More about A comparative study of android users’ privacy preferences under the runtime permission model.

Privacy decision-making in the digital era: A game theoretic review (2017)
Journal Article
Anastasopoulou, K., Kokolakis, S., & Andriotis, P. (2017). Privacy decision-making in the digital era: A game theoretic review. Lecture Notes in Artificial Intelligence, 10292 LNCS, 589-603. https://doi.org/10.1007/978-3-319-58460-7_41

© Springer International Publishing AG 2017. Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Indiv... Read More about Privacy decision-making in the digital era: A game theoretic review.

Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks (2016)
Journal Article
Tryfonas, T., Carter, M., Crick, T., & Andriotis, P. (2016). Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks. Lecture Notes in Artificial Intelligence, 9750, 174-185. https://doi.org/10.1007/978-3-319-39381-0_16

© Springer International Publishing Switzerland 2016. Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which w... Read More about Mass surveillance in cyberspace and the lost art of keeping a secret: Policy lessons for government after the snowden leaks.

Impact of user data privacy management controls on mobile device investigations (2016)
Journal Article
Andriotis, P., & Tryfonas, T. (2016). Impact of user data privacy management controls on mobile device investigations. IFIP Advances in Information and Communication Technology, 484, 89-105. https://doi.org/10.1007/978-3-319-46279-0_5

© IFIP International Federation for Information Processing 2016. There are many different types of mobile device users, but most of them do not seek to expand the functionality of their smartphones and prefer to interact with them using predefined us... Read More about Impact of user data privacy management controls on mobile device investigations.

Optimizing short message text sentiment analysis for mobile device forensics (2016)
Journal Article
Aboluwarin, O., Andriotis, P., Takasu, A., & Tryfonas, T. (2016). Optimizing short message text sentiment analysis for mobile device forensics. IFIP Advances in Information and Communication Technology, 484, 69-87. https://doi.org/10.1007/978-3-319-46279-0_4

© IFIP International Federation for Information Processing 2016. Mobile devices are now the dominant medium for communications. Humans express various emotions when communicating with others and these communications can be analyzed to deduce their em... Read More about Optimizing short message text sentiment analysis for mobile device forensics.

Messaging activity reconstruction with sentiment polarity identification (2015)
Journal Article
Andriotis, P., & Oikonomou, G. (2015). Messaging activity reconstruction with sentiment polarity identification. Lecture Notes in Artificial Intelligence, 9190, 475-486. https://doi.org/10.1007/978-3-319-20376-8_42

© Springer International Publishing Switzerland 2015. Sentiment Analysis aims to extract information related to the emotional state of the person that produced a text document and also describe the sentiment polarity of the short or long message. Thi... Read More about Messaging activity reconstruction with sentiment polarity identification.

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method (2014)
Journal Article
Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. Lecture Notes in Artificial Intelligence, 8533 LNCS, 115-126. https://doi.org/10.1007/978-3-319-07620-1_11

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the... Read More about Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.