ABSTRACT
In close relationships, snooping on another's mobile device is commonly regarded as an invasion of privacy. The prevalence of such behavior is, however, difficult to assess. We compared two in-person survey techniques, one in which the question about snooping behavior is posed directly, and one in which strong anonymity controls are employed. Results (n=90) reveal that, while in the first case 10% of respondents admitted to snooping, in the second the estimate was 60%. This shows that, although there is a potent social desirability bias at play, strong anonymity controls do improve estimates. Furthermore, it suggests an alarming prevalence of snooping behavior among the target population.
Supplemental Material
Available for Download
Zip file containing a PDF of the Accompanying Poster
- Acquisti, A. Nudging Privacy: The Behavioral Economics of Personal Information. IEEE Security & Privacy Magazine 7, 6 (2009), 82--85. Google ScholarDigital Library
- Ben-Asher, N. et al. On the need for different security methods on mobile phones. In Proc. MobileHCI'11, ACM Press (2011), 465--473. Google ScholarDigital Library
- Clarke, N. L., Furnell, S. M. Authentication of users on mobile telephones A survey of attitudes and practices. Computers & Security 24, 7 (2005), 519--527.Google ScholarDigital Library
- Coutts, E., Jann, B. Sensitive Questions in Online Surveys: Experimental Results for the Randomized Response Technique (RRT) and the Unmatched Count Technique (UCT). Sociological Methods & Research 40, 1 (2011), 169--93.Google ScholarCross Ref
- Felt, A. P., Egelman, S., Wagner, D. I've got 99 problems, but vibration ain't one: A Survey of Smartphone Users' Concerns. In Proc. SPSM'12, ACM Press (2012), 33--44 Google ScholarDigital Library
- Johnson, M., Egelman, S., Bellovin, S. M. Facebook and privacy: it's complicated. In Proc. SOUPS'12, ACM Press (2012), 1--15. Google ScholarDigital Library
- McNeeley, S. Sensitive Issues in Surveys: Reducing Refusals While Increasing Reliability and Quality of Responses to Sensitive Survey Items. Handbook of Survey Methodology for the Social Sciences, Springer (2012), 377--396.Google Scholar
- Muslukhov, I. et al. Know your enemy: the risk of unauthorized access in smartphones by insiders. In Proc. MobileHCI'13, ACM Press (2013), 271--280. Google ScholarDigital Library
- Raghavarao, D., Federer, W. T. Block Total Response as an Alternative to the Randomized Response Method in Surveys. J. Royal Statistical Society Ser. B 41, 1 (1979), 40--45.Google Scholar
- Tourangeau, R., Yan, T. Sensitive questions in surveys. Psychological bulletin 133, 5 (2007), 859--883Google Scholar
Index Terms
- Measuring snooping behavior with surveys: it's how you ask it
Recommendations
POSTER: Preserving privacy and accountability for personal devices
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityUsing personal mobile devices for work gave rise to a trend called "bring your own device", or BYOD. BYOD brings a productivity boost for employees, but also headaches for employers: on the one hand, the business has a legitimate interest in monitoring ...
Subspace Snooping: Exploiting Temporal Sharing Stability for Snoop Reduction
Although snoop-based coherence protocols provide fast cache-to-cache transfers with a simple and robust coherence mechanism, scaling the protocols has been difficult due to the overheads of broadcast snooping. In this paper, we propose a coherence ...
Evaluating the performance of four snooping cache coherency protocols
Special Issue: Proceedings of the 16th annual international symposium on Computer ArchitectureWrite-invalidate and write-broadcast coherency protocols have been criticized for being unable to achieve good bus performance across all cache configurations. In particular, write-invalidate performance can suffer as block size increases; and large ...
Comments