{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:54:07Z","timestamp":1730325247384,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":91,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T00:00:00Z","timestamp":1684195200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1943351 and 2016717"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528551","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T07:30:36Z","timestamp":1651908636000},"page":"125-139","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps"],"prefix":"10.1145","author":[{"given":"Nisha","family":"Vinayaga-Sureshkanth","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Raveen","family":"Wijewickrama","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Anindya","family":"Maiti","sequence":"additional","affiliation":[{"name":"University of Oklahoma, Norman, OK, USA"}]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"volume-title":"https:\/\/search.appcensus.io","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"AppCensus. https:\/\/search.appcensus.io , 2020 . [Online; accessed 20-August-2020]. AppCensus. https:\/\/search.appcensus.io, 2020. [Online; accessed 20-August-2020]."},{"volume-title":"https:\/\/github.com\/androguard\/androguard","year":"2021","key":"e_1_3_2_1_2_1","unstructured":"Androguard. https:\/\/github.com\/androguard\/androguard , 2021 . [Online; accessed 15-June-2021]. Androguard. https:\/\/github.com\/androguard\/androguard, 2021. [Online; accessed 15-June-2021]."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/github.com\/NationalSecurityAgency\/ghidra","author":"Reverse Engineering Framework Ghidra Software","year":"2021","unstructured":"Ghidra Software Reverse Engineering Framework . https:\/\/github.com\/NationalSecurityAgency\/ghidra , 2021 . [Online; accessed 10-July-2021]. Ghidra Software Reverse Engineering Framework. https:\/\/github.com\/NationalSecurityAgency\/ghidra, 2021. [Online; accessed 10-July-2021]."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/play.google.com\/store\/apps","author":"Play Google","year":"2021","unstructured":"Google Play . https:\/\/play.google.com\/store\/apps , 2021 . [Online; accessed 22-June-2021]. Google Play. https:\/\/play.google.com\/store\/apps, 2021. [Online; accessed 22-June-2021]."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/ActivityRecognition","author":"Services Activity Recognition Google Play","year":"2021","unstructured":"Google Play Services Activity Recognition . https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/ActivityRecognition , 2021 . [Online; accessed 18-May-2021]. Google Play Services Activity Recognition. https:\/\/developers.google.com\/android\/reference\/com\/google\/android\/gms\/location\/ActivityRecognition, 2021. [Online; accessed 18-May-2021]."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/translate.google.com","author":"Translate Google","year":"2021","unstructured":"Google Translate . https:\/\/translate.google.com , 2021 . [Online; accessed 24-June-2021]. Google Translate. https:\/\/translate.google.com, 2021. [Online; accessed 24-June-2021]."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF","author":"Mobile Security","year":"2021","unstructured":"Mobile Security Framework (MobSF). https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF , 2021 . [Online; accessed 15-June-2021]. Mobile Security Framework (MobSF). https:\/\/github.com\/MobSF\/Mobile-Security-Framework-MobSF, 2021. [Online; accessed 15-June-2021]."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/github.com\/didi\/VirtualAPK","author":"APK.","year":"2021","unstructured":"Virtual APK. https:\/\/github.com\/didi\/VirtualAPK , 2021 . [Online; accessed 26-June-2021]. VirtualAPK. https:\/\/github.com\/didi\/VirtualAPK, 2021. [Online; accessed 26-June-2021]."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/developer.android.com\/studio","author":"Online Tracking Bringing Transparency","year":"2021","unstructured":"WhoTracks.me - Bringing Transparency to Online Tracking . https:\/\/developer.android.com\/studio , 2021 . [Online; accessed 20-June-2021]. WhoTracks.me - Bringing Transparency to Online Tracking. https:\/\/developer.android.com\/studio, 2021. [Online; accessed 20-June-2021]."},{"key":"e_1_3_2_1_10_1","volume-title":"New Parked Or Not Feature Lets Riders Rate Proper Scooter Parking. https:\/\/www.li.me\/second-street\/parked-or-not-feature-riders-rate-scooter-parking","author":"Street Lime","year":"2018","unstructured":"Lime 2nd Street . New Parked Or Not Feature Lets Riders Rate Proper Scooter Parking. https:\/\/www.li.me\/second-street\/parked-or-not-feature-riders-rate-scooter-parking , 2018 . [Online; accessed 11-June-2021]. Lime 2nd Street. New Parked Or Not Feature Lets Riders Rate Proper Scooter Parking. https:\/\/www.li.me\/second-street\/parked-or-not-feature-riders-rate-scooter-parking, 2018. [Online; accessed 11-June-2021]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0197-0"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427287"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"issue":"6","key":"e_1_3_2_1_14_1","first-page":"490","article-title":"Lix and rix: Variations on a little-known readability index","volume":"26","author":"Anderson Jonathan","year":"1983","unstructured":"Jonathan Anderson . Lix and rix: Variations on a little-known readability index . Journal of Reading , 26 ( 6 ): 490 -- 496 , 1983 . Jonathan Anderson. Lix and rix: Variations on a little-known readability index. Journal of Reading, 26(6):490--496, 1983.","journal-title":"Journal of Reading"},{"key":"e_1_3_2_1_15_1","first-page":"985","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow , Samin Yaseer Mahmud , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Serge Egelman . Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck . In 29th USENIX Security Symposium (USENIX Security 20) , pages 985 -- 1002 , 2020 . Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck. In 29th USENIX Security Symposium (USENIX Security 20), pages 985--1002, 2020."},{"key":"e_1_3_2_1_16_1","volume-title":"Movies, Music And Wayback Machine. https:\/\/archive.org","author":"Archive The Internet","year":"2021","unstructured":"The Internet Archive . Digital library of Free And Borrowable Books , Movies, Music And Wayback Machine. https:\/\/archive.org , 2021 . [Online; accessed 25-June-2021]. The Internet Archive. Digital library of Free And Borrowable Books, Movies, Music And Wayback Machine. https:\/\/archive.org, 2021. [Online; accessed 25-June-2021]."},{"key":"e_1_3_2_1_17_1","volume-title":"Shared Mobility Services. https:\/\/austintexas.gov\/sharedmobility","author":"Austin Transportation Department (ATD).","year":"2020","unstructured":"Austin Transportation Department (ATD). Shared Mobility Services. https:\/\/austintexas.gov\/sharedmobility , 2020 . [Online; accessed 11-May-2021]. Austin Transportation Department (ATD). Shared Mobility Services. https:\/\/austintexas.gov\/sharedmobility, 2020. [Online; accessed 11-May-2021]."},{"key":"e_1_3_2_1_18_1","volume-title":"Jos\u00e9 Luis Fern\u00e1ndez-Alem\u00e1n, and Ambrosio Toval. Evaluating the privacy policies of mobile personal health records for pregnancy monitoring. Journal of medical systems, 42(8):144","author":"Bachiri Mariam","year":"2018","unstructured":"Mariam Bachiri , Ali Idri , Jos\u00e9 Luis Fern\u00e1ndez-Alem\u00e1n, and Ambrosio Toval. Evaluating the privacy policies of mobile personal health records for pregnancy monitoring. Journal of medical systems, 42(8):144 , 2018 . Mariam Bachiri, Ali Idri, Jos\u00e9 Luis Fern\u00e1ndez-Alem\u00e1n, and Ambrosio Toval. Evaluating the privacy policies of mobile personal health records for pregnancy monitoring. Journal of medical systems, 42(8):144, 2018."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432699"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978422"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/108056998504800203"},{"volume-title":"Scooter Share Companies in the US. https:\/\/boxercycles.com\/scooter-share-companies","year":"2020","key":"e_1_3_2_1_22_1","unstructured":"BoxerCycles. Scooter Share Companies in the US. https:\/\/boxercycles.com\/scooter-share-companies , 2020 . [Online; accessed 11-May-2021]. BoxerCycles. Scooter Share Companies in the US. https:\/\/boxercycles.com\/scooter-share-companies, 2020. [Online; accessed 11-May-2021]."},{"key":"e_1_3_2_1_23_1","first-page":"46","volume-title":"Proceedings of the International Conference on Software Engineering Research and Practice (SERP)","author":"Boxler Dan","year":"2018","unstructured":"Dan Boxler and Kristen R Walcott . Static taint analysis tools to detect information flows . In Proceedings of the International Conference on Software Engineering Research and Practice (SERP) , pages 46 -- 52 . The Steering Committee of The World Congress in Computer Science , 2018 . Dan Boxler and Kristen R Walcott. Static taint analysis tools to detect information flows. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP), pages 46--52. The Steering Committee of The World Congress in Computer Science, 2018."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387469"},{"key":"e_1_3_2_1_25_1","first-page":"68","article-title":"The forcast readability formula","volume":"67","author":"Caylor John","year":"1973","unstructured":"John Caylor , Thoman Stict , and J Patrick Ford . The forcast readability formula . Literacy Discussion. International Institute for Adult Literacy: UNESCO , 67 : 68 , 1973 . John Caylor, Thoman Stict, and J Patrick Ford. The forcast readability formula. Literacy Discussion. International Institute for Adult Literacy: UNESCO, 67:68, 1973.","journal-title":"Literacy Discussion. International Institute for Adult Literacy: UNESCO"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23597-0_4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89297-9_7"},{"issue":"2","key":"e_1_3_2_1_28_1","article-title":"How to use readability formulas to access and select english reading materials","volume":"50","author":"Chen Hai-Hon","year":"2012","unstructured":"Hai-Hon Chen . How to use readability formulas to access and select english reading materials . Journal of Educational Media & Library Sciences , 50 ( 2 ), 2012 . Hai-Hon Chen. How to use readability formulas to access and select english reading materials. Journal of Educational Media & Library Sciences, 50(2), 2012.","journal-title":"Journal of Educational Media & Library Sciences"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275523"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.01.008"},{"key":"e_1_3_2_1_31_1","volume-title":"The Micro-Mobility Revolution: The Introduction and Adoption of Electric Scooters in the United States. https:\/\/medium.com\/populus-ai\/the-micro-mobility-revolution-95e396db3754","author":"Clewlow Regina R","year":"2018","unstructured":"Regina R Clewlow . The Micro-Mobility Revolution: The Introduction and Adoption of Electric Scooters in the United States. https:\/\/medium.com\/populus-ai\/the-micro-mobility-revolution-95e396db3754 , 2018 . [Online; accessed 11-May-2021]. Regina R Clewlow. The Micro-Mobility Revolution: The Introduction and Adoption of Electric Scooters in the United States. https:\/\/medium.com\/populus-ai\/the-micro-mobility-revolution-95e396db3754, 2018. [Online; accessed 11-May-2021]."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2019.09.026"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622115"},{"key":"e_1_3_2_1_34_1","volume-title":"https:\/\/developer.android.com\/studio","author":"Developers Android","year":"2021","unstructured":"Android Developers . Android Studio . https:\/\/developer.android.com\/studio , 2021 . [Online; accessed 16-June-2021]. Android Developers. Android Studio. https:\/\/developer.android.com\/studio, 2021. [Online; accessed 16-June-2021]."},{"key":"e_1_3_2_1_35_1","volume-title":"Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):1--29","author":"Enck William","year":"2014","unstructured":"William Enck , Peter Gilbert , Seungyeop Han , Vasant Tendulkar , Byung-Gon Chun , Landon P Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N Sheth . Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):1--29 , 2014 . William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):1--29, 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0008"},{"volume-title":"https:\/\/github.com\/Exodus-Privacy\/exodus","year":"2021","key":"e_1_3_2_1_37_1","unstructured":"Exodus-Privacy. Exodus. https:\/\/github.com\/Exodus-Privacy\/exodus , 2021 . [Online; accessed 11-June-2021]. Exodus-Privacy. Exodus. https:\/\/github.com\/Exodus-Privacy\/exodus, 2021. [Online; accessed 11-June-2021]."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_1_39_1","volume-title":"Permission based android security: Issues and countermeasures. computers & security, 43:205--218","author":"Fang Zheran","year":"2014","unstructured":"Zheran Fang , Weili Han , and Yingjiu Li . Permission based android security: Issues and countermeasures. computers & security, 43:205--218 , 2014 . Zheran Fang, Weili Han, and Yingjiu Li. Permission based android security: Issues and countermeasures. computers & security, 43:205--218, 2014."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0029"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0057532"},{"key":"e_1_3_2_1_44_1","volume-title":"One of the first contact-tracing apps violates its own privacy policy. https:\/\/www.washingtonpost.com\/technology\/2020\/05\/21\/care19-dakota-privacy-coronavirus\/","author":"Fowler Geoffrey A","year":"2020","unstructured":"Geoffrey A Fowler . One of the first contact-tracing apps violates its own privacy policy. https:\/\/www.washingtonpost.com\/technology\/2020\/05\/21\/care19-dakota-privacy-coronavirus\/ , 2020 . [Online; accessed 11-May-2021]. Geoffrey A Fowler. One of the first contact-tracing apps violates its own privacy policy. https:\/\/www.washingtonpost.com\/technology\/2020\/05\/21\/care19-dakota-privacy-coronavirus\/, 2020. [Online; accessed 11-May-2021]."},{"key":"e_1_3_2_1_45_1","volume-title":"Drozer: The Leading Security Assessment Framework for Android. https:\/\/github.com\/FSecureLABS\/drozer","author":"LABS.","year":"2021","unstructured":"FSecure LABS. Drozer: The Leading Security Assessment Framework for Android. https:\/\/github.com\/FSecureLABS\/drozer , 2021 . [Online; accessed 14-June-2021]. FSecureLABS. Drozer: The Leading Security Assessment Framework for Android. https:\/\/github.com\/FSecureLABS\/drozer, 2021. [Online; accessed 14-June-2021]."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_17"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trd.2020.102230"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2012.6151305"},{"key":"e_1_3_2_1_49_1","first-page":"531","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang G Shin , and Karl Aberer . Polisis : Automated analysis and presentation of privacy policies using deep learning . In 27th USENIX Security Symposium (USENIX Security 18) , pages 531 -- 548 , 2018 . Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18), pages 531--548, 2018."},{"key":"e_1_3_2_1_50_1","volume-title":"Comparison of recreational reading books levels using the fry readability graph and the flesch-kincaid grade level","author":"Hoke Brenda Lynn","year":"1999","unstructured":"Brenda Lynn Hoke . Comparison of recreational reading books levels using the fry readability graph and the flesch-kincaid grade level . 1999 . Brenda Lynn Hoke. Comparison of recreational reading books levels using the fry readability graph and the flesch-kincaid grade level. 1999."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.6.MOBMU-302"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23597-0_11"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_28"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2017.6.MOBMU-301"},{"volume-title":"Electric Scooter Sharing. https:\/\/www.li.me\/electric-scooter","year":"2020","key":"e_1_3_2_1_55_1","unstructured":"Lime. Electric Scooter Sharing. https:\/\/www.li.me\/electric-scooter , 2020 . [Online; accessed 19-June-2021]. Lime. Electric Scooter Sharing. https:\/\/www.li.me\/electric-scooter, 2020. [Online; accessed 19-June-2021]."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3409120.3410641"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897905"},{"key":"e_1_3_2_1_58_1","volume-title":"Impact of e-scooters on pedestrian safety: A field study using pedestrian crowd-sensing. arXiv preprint arXiv:1908.05846","author":"Maiti Anindya","year":"2019","unstructured":"Anindya Maiti , Nisha Vinayaga-Sureshkanth , Murtuza Jadliwala , Raveen Wijewickrama , and Greg P Griffin . Impact of e-scooters on pedestrian safety: A field study using pedestrian crowd-sensing. arXiv preprint arXiv:1908.05846 , 2019 . Anindya Maiti, Nisha Vinayaga-Sureshkanth, Murtuza Jadliwala, Raveen Wijewickrama, and Greg P Griffin. Impact of e-scooters on pedestrian safety: A field study using pedestrian crowd-sensing. arXiv preprint arXiv:1908.05846, 2019."},{"key":"e_1_3_2_1_59_1","volume-title":"NTNU","author":"Mangset Peder Lind","year":"2018","unstructured":"Peder Lind Mangset . Analysis of mobile application's compliance with the general data protection regulation (gdpr). Master's thesis , NTNU , 2018 . Peder Lind Mangset. Analysis of mobile application's compliance with the general data protection regulation (gdpr). Master's thesis, NTNU, 2018."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00199"},{"key":"e_1_3_2_1_61_1","first-page":"1053","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Michalevsky Yan","year":"2014","unstructured":"Yan Michalevsky , Dan Boneh , and Gabi Nakibly . Gyrophone : Recognizing speech from gyroscope signals . In 23rd USENIX Security Symposium (USENIX Security 14) , pages 1053 -- 1067 , 2014 . Yan Michalevsky, Dan Boneh, and Gabi Nakibly. Gyrophone: Recognizing speech from gyroscope signals. In 23rd USENIX Security Symposium (USENIX Security 14), pages 1053--1067, 2014."},{"key":"e_1_3_2_1_62_1","volume-title":"Shared Micromobility in the U.S","author":"National Association of City Transportation Officials.","year":"2019","unstructured":"National Association of City Transportation Officials. Shared Micromobility in the U.S .: 2019 . https:\/\/nacto.org\/shared-micromobility-2019, 2019. [Online; accessed 11-May-2021]. National Association of City Transportation Officials. Shared Micromobility in the U.S.: 2019. https:\/\/nacto.org\/shared-micromobility-2019, 2019. [Online; accessed 11-May-2021]."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799522"},{"key":"e_1_3_2_1_64_1","volume-title":"https:\/\/github.com\/dpnishant\/appmon","author":"Patnaik Nishant Das","year":"2021","unstructured":"Nishant Das Patnaik . AppMon. https:\/\/github.com\/dpnishant\/appmon , 2021 . [Online; accessed 23-June-2021]. Nishant Das Patnaik. AppMon. https:\/\/github.com\/dpnishant\/appmon, 2021. [Online; accessed 23-June-2021]."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25744-0_13"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v17i1\/2.13112"},{"key":"e_1_3_2_1_67_1","unstructured":"Carnegie Mellon University PrivacyGrade. Grading The Privacy Of Smartphone Apps. http:\/\/privacygrade.org\/ 2015. [Online; accessed 11-May-2021]. Carnegie Mellon University PrivacyGrade. Grading The Privacy Of Smartphone Apps. http:\/\/privacygrade.org\/ 2015. [Online; accessed 11-May-2021]."},{"key":"e_1_3_2_1_68_1","volume-title":"Lumen Privacy Monitor. https:\/\/www.icsi.berkeley.edu\/icsi\/projects\/networking\/haystack","author":"Project Haystack","year":"2021","unstructured":"Haystack Project . Lumen Privacy Monitor. https:\/\/www.icsi.berkeley.edu\/icsi\/projects\/networking\/haystack , 2021 . [Online; accessed 22-June-2021]. Haystack Project. Lumen Privacy Monitor. https:\/\/www.icsi.berkeley.edu\/icsi\/projects\/networking\/haystack, 2021. [Online; accessed 22-June-2021]."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213873"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_1_71_1","first-page":"603","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon , \u00c1lvaro Feal , Primal Wijesekera , Amit Elazari Bar On , Narseo Vallina-Rodriguez , and Serge Egelman . 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system . In 28th USENIX Security Symposium (USENIX Security 19) , pages 603 -- 620 , 2019 . Joel Reardon, \u00c1lvaro Feal, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 50 ways to leak your data: An exploration of apps' circumvention of the android permissions system. In 28th USENIX Security Symposium (USENIX Security 19), pages 603--620, 2019."},{"key":"e_1_3_2_1_72_1","volume-title":"Offering, Technology, Sharing Type - Global Industry Trends Analysis and Revenue Forecast to","author":"Markets Research","year":"2030","unstructured":"Research and Markets . Micromobility Telematics Market Research Report: By Service Type , Offering, Technology, Sharing Type - Global Industry Trends Analysis and Revenue Forecast to 2030 . https:\/\/www.researchandmarkets.com\/reports\/5331633\/micromobility-telematics-market-research-report, 2020. [Online; accessed 10-June-2020]. Research and Markets. Micromobility Telematics Market Research Report: By Service Type, Offering, Technology, Sharing Type - Global Industry Trends Analysis and Revenue Forecast to 2030. https:\/\/www.researchandmarkets.com\/reports\/5331633\/micromobility-telematics-market-research-report, 2020. [Online; accessed 10-June-2020]."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2019.100243"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442442.3458606"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91238-7_45"},{"key":"e_1_3_2_1_77_1","volume-title":"Automated readability index. Technical report","author":"Senter RJ","year":"1967","unstructured":"RJ Senter and Edgar A Smith . Automated readability index. Technical report , University of Cincinnati , Ohio , 1967 . RJ Senter and Edgar A Smith. Automated readability index. Technical report, University of Cincinnati, Ohio, 1967."},{"key":"e_1_3_2_1_78_1","first-page":"4","article-title":"An exploratory analysis of mobile security tools. In KSU Proceedings on Cybersecurity Education","author":"Shahriar Hossain","year":"2019","unstructured":"Hossain Shahriar , Md Arabin Talukder , and Md Saiful Islam . An exploratory analysis of mobile security tools. In KSU Proceedings on Cybersecurity Education , Research and Practice. 4 , 2019 . Hossain Shahriar, Md Arabin Talukder, and Md Saiful Islam. An exploratory analysis of mobile security tools. In KSU Proceedings on Cybersecurity Education, Research and Practice. 4, 2019.","journal-title":"Research and Practice."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10897-008-9181-0"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2011010104"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_2_1_82_1","first-page":"3","volume-title":"Which apps have privacy policies? In Annual Privacy Forum","author":"Story Peter","year":"2018","unstructured":"Peter Story , Sebastian Zimmeck , and Norman Sadeh . Which apps have privacy policies? In Annual Privacy Forum , pages 3 -- 23 . Springer , 2018 . Peter Story, Sebastian Zimmeck, and Norman Sadeh. Which apps have privacy policies? In Annual Privacy Forum, pages 3--23. Springer, 2018."},{"key":"e_1_3_2_1_83_1","volume-title":"Taming reflection: An essential step toward whole-program analysis of android apps. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3):1--36","author":"Sun Xiaoyu","year":"2021","unstructured":"Xiaoyu Sun , Li Li , Tegawend\u00e9 F Bissyand\u00e9 , Jacques Klein , Damien Octeau , and John Grundy . Taming reflection: An essential step toward whole-program analysis of android apps. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3):1--36 , 2021 . Xiaoyu Sun, Li Li, Tegawend\u00e9 F Bissyand\u00e9, Jacques Klein, Damien Octeau, and John Grundy. Taming reflection: An essential step toward whole-program analysis of android apps. ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3):1--36, 2021."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.303"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376499"},{"key":"e_1_3_2_1_86_1","volume-title":"Illuminating the third party mobile ecosystem with the lumen privacy monitor","author":"Vallina-Rodriguez Narseo","year":"2017","unstructured":"Narseo Vallina-Rodriguez . Illuminating the third party mobile ecosystem with the lumen privacy monitor . 2017 . Narseo Vallina-Rodriguez. Illuminating the third party mobile ecosystem with the lumen privacy monitor. 2017."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278558"},{"issue":"2","key":"e_1_3_2_1_88_1","first-page":"158","article-title":"A table for rapid determination of revised dale-chall readability scores","volume":"26","author":"Williams Robert T","year":"1972","unstructured":"Robert T Williams . A table for rapid determination of revised dale-chall readability scores . The Reading Teacher , 26 ( 2 ): 158 -- 165 , 1972 . Robert T Williams. A table for rapid determination of revised dale-chall readability scores. The Reading Teacher, 26(2):158--165, 1972.","journal-title":"The Reading Teacher"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105608"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380401"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69483-2_10"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"San Antonio TX USA","acronym":"WiSec '22"},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3507657.3528551","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528551","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T06:17:56Z","timestamp":1684217876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528551"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":91,"alternative-id":["10.1145\/3507657.3528551","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528551","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}