skip to main content
10.1145/2559206.2581240acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
poster

Measuring snooping behavior with surveys: it's how you ask it

Published:26 April 2014Publication History

ABSTRACT

In close relationships, snooping on another's mobile device is commonly regarded as an invasion of privacy. The prevalence of such behavior is, however, difficult to assess. We compared two in-person survey techniques, one in which the question about snooping behavior is posed directly, and one in which strong anonymity controls are employed. Results (n=90) reveal that, while in the first case 10% of respondents admitted to snooping, in the second the estimate was 60%. This shows that, although there is a potent social desirability bias at play, strong anonymity controls do improve estimates. Furthermore, it suggests an alarming prevalence of snooping behavior among the target population.

Skip Supplemental Material Section

Supplemental Material

References

  1. Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. IEEE Security & Privacy Magazine 7, 6 (2009), 82--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ben-Asher, N. et al. On the need for different security methods on mobile phones. In Proc. MobileHCI'11, ACM Press (2011), 465--473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Clarke, N. L., Furnell, S. M. Authentication of users on mobile telephones A survey of attitudes and practices. Computers & Security 24, 7 (2005), 519--527.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Coutts, E., Jann, B. Sensitive Questions in Online Surveys: Experimental Results for the Randomized Response Technique (RRT) and the Unmatched Count Technique (UCT). Sociological Methods & Research 40, 1 (2011), 169--93.Google ScholarGoogle ScholarCross RefCross Ref
  5. Felt, A. P., Egelman, S., Wagner, D. I've got 99 problems, but vibration ain't one: A Survey of Smartphone Users' Concerns. In Proc. SPSM'12, ACM Press (2012), 33--44 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Johnson, M., Egelman, S., Bellovin, S. M. Facebook and privacy: it's complicated. In Proc. SOUPS'12, ACM Press (2012), 1--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. McNeeley, S. Sensitive Issues in Surveys: Reducing Refusals While Increasing Reliability and Quality of Responses to Sensitive Survey Items. Handbook of Survey Methodology for the Social Sciences, Springer (2012), 377--396.Google ScholarGoogle Scholar
  8. Muslukhov, I. et al. Know your enemy: the risk of unauthorized access in smartphones by insiders. In Proc. MobileHCI'13, ACM Press (2013), 271--280. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Raghavarao, D., Federer, W. T. Block Total Response as an Alternative to the Randomized Response Method in Surveys. J. Royal Statistical Society Ser. B 41, 1 (1979), 40--45.Google ScholarGoogle Scholar
  10. Tourangeau, R., Yan, T. Sensitive questions in surveys. Psychological bulletin 133, 5 (2007), 859--883Google ScholarGoogle Scholar

Index Terms

  1. Measuring snooping behavior with surveys: it's how you ask it

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems
      April 2014
      2620 pages
      ISBN:9781450324748
      DOI:10.1145/2559206

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 April 2014

      Check for updates

      Qualifiers

      • poster

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader