skip to main content
10.1145/2702123.2702404acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Privacy Tipping Points in Smartphones Privacy Preferences

Authors Info & Claims
Published:18 April 2015Publication History

ABSTRACT

The aim of this research was to understand what affects people's privacy preferences in smartphone apps. We ran a four-week study in the wild with 34 participants. Participants were asked to answer questions, which were used to gather their personal context and to measure their privacy preferences by varying app name and purpose of data collection. Our results show that participants shared the most when no information about data access or purpose was given, and shared the least when both of these details were specified. When just one of either purpose or the requesting app was shown, participants shared less when just the purpose was specified than when just the app name was given. We found that the purpose for data access was the predominant factor affecting users' choices. In our study the purpose condition vary from being not specified, to vague to be very specific. Participants were more willing to disclose data when no purpose was specified. When a vague purpose was shown, participants became more privacy-aware and were less willing to disclose their information. When specific purposes were shown participants were more willing to disclose when the purpose for requesting the information appeared to be beneficial to them, and shared the least when the purpose for data access was solely beneficial to developers.

References

  1. Abdesslem, F. B., Parris, I., and Henderson, T. Mobile experience sampling: Reaching the parts of facebook other methods cannot reach. In In Privacy and Usability Methods Powwow (2010).Google ScholarGoogle Scholar
  2. Acquisti, A., and Grossklags, J. Privacy and rationality in individual decision making. Security Privacy, IEEE (2005), 26--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Acquisti, A., and Grossklags, J. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. In WEIS (2007), 12.Google ScholarGoogle Scholar
  4. Aharony, N., Pan, W., Ip, C., Khayal, I., and Pentland, A. Social fmri: Investigating and shaping social mechanisms in the real world. Pervasive and Mobile Computing 7, 6 (2011), 643--659. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., and Nair, R. Over-exposed: privacy patterns and considerations in online and mobile photo sharing. In Proc. ACM CHI (2007), 357--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Balebako, R., Jung, J., Lu, W., Cranor, L. F., and Nguyen, C. "Little Brothers Watching You": Raising Awareness of Data Leaks on Smartphones. In Proc. of ACM SOUPS (2013), 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bansal, G., Zahedi, F., Gefen, D., et al. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems 49, 2 (2010), 138--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cherubini, M., and Oliver, N. A refined experience sampling method to capture mobile user experience. Proc. of ACM CHI Workshop of Mobile User Experience Research (2009), 1--6.Google ScholarGoogle Scholar
  9. Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: why, when, & what people want to share. In Proc. ACM CHI (2005), 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. OSDI'10 (2010), 99--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android permissions: User attention, comprehension, and behavior. In Proc. ACM SOUP (2012), 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hann, I.-H., Hui, K.-L., Lee, T., and Png, I. Online information privacy: Measuring the cost-benefit trade-off. Proc. of ICIS (2002), 1.Google ScholarGoogle Scholar
  13. Hurwitz, J. User choice, privacy sensitivity, and acceptance of personal information collection. In European Data Protection: Coming of Age, S. Gutwirth, R. Leenes, P. de Hert, and Y. Poullet, Eds. Springer Netherlands, 2013, 295--312.Google ScholarGoogle ScholarCross RefCross Ref
  14. Joinson, A. N., Reips, U.-D., Buchanan, T., and Schofield, C. B. P. Privacy, trust, and self-disclosure online. Human-Computer Interaction (2010), 1--24.Google ScholarGoogle Scholar
  15. Kelley, P. G., Cesca, L., Bresee, J., and Cranor, L. F. Standardizing privacy notices: an online study of the nutrition label approach. In Proc. of ACM CHI (2010), 1573--1582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kelley, P. G., Cranor, L. F., and Sadeh, N. Privacy as part of the app decision-making process. In Proc. ACM CHI (2013), 3393--3402. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Khalil, A., and Connelly, K. Context-aware telephony: privacy preferences and sharing patterns. In Proc. ACM CSCW (2006), 469--478. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Knijnenburg, B. P., and Kobsa, A. Helping users with information disclosure decisions: Potential for adaptation. In Proc. ACM IUI (2013), 407--416. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Knijnenburg, B. P., and Kobsa, A. Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Transactions on Interactive Intelligent Systems (TiiS) 3, 3 (2013), 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Langer, E. Minding matters. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 22). New York, Academic Press. (1989).Google ScholarGoogle Scholar
  21. Lathia, N., Rachuri, K. K., Mascolo, C., and Rentfrow, P. J. Contextual dissonance: Design bias in sensor-based experience sampling methods. In Proc. of ACM UBICOMP (2013), 183--192. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Liccardi, I., Pato, J., and Weitzner, D. J. Improving Mobile App selection through Transparency and Better Permission Analysis. Journal of Privacy and Confidentiality: Vol. 5: Iss. 2, Article 1. (2014), 1--55.Google ScholarGoogle Scholar
  23. Liccardi, I., Pato, J., Weitzner, D. J., Abelson, H., and De Roure, D. No technical understanding required: Helping users make informed choices about access to their personal data. In Proc. ACM Mobiquitous (2014), 140--150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., and Zhang, J. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proc. of ACM UBICOMP (2012), 501--510. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Mancini, C., Thomas, K., Rogers, Y., Price, B. A., Jedrzejczyk, L., Bandara, A. K., Joinson, A. N., and Nuseibeh, B. From spaces to places: emerging contexts in mobile privacy. In Proc. ACM UBICOMP (2009), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Nissenbaum, H. Privacy as Contextual Integrity. Washington Law Review 79 (2004), 119.Google ScholarGoogle Scholar
  27. Park, Y. J., and Jang, S. M. Understanding privacy knowledge and skill in mobile communication. Computers in Human Behavior 38 (2014), 296--303. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Shilton, K., and Martin, K. E. Mobile privacy expectations in context. In Proc. of Communication, Information and Internet Policy (2013).Google ScholarGoogle ScholarCross RefCross Ref
  29. Shklovski, I., Mainwaring, S. D., Skúladóttir, H. H., and Borgthorsson, H. Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. In Proc. ACM CHI (2014), 2347--2356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Tan, J., Nguyen, K., Theodorides, M., Negrón-Arroyo, H., Thompson, C., Egelman, S., and Wagner, D. The effect of developer-specified explanations for permission requests on smartphone user behavior. In Proc. ACM CHI (2014), 91--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Toch, E. Crowdsourcing privacy preferences in context-aware applications. Personal and Ubiquitous Computing (2014), 129--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y., Kelley, P. G., Springfield, J., Cranor, L., Hong, J., and Sadeh, N. Empirical models of privacy in location sharing. In Proc. ACM UBICOMP (2010), 129--138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Urban, J., Hoofnagle, C., and Li, S. Mobile phones and privacy. In UC Berkeley Public Law Research Paper (2012).Google ScholarGoogle ScholarCross RefCross Ref
  34. Venkatanathan, J., Ferreira, D., Benisch, M., Lin, J., Karapanos, E., Kostakos, V., Sadeh, N., and Toch, E. Improving users' consistency when recalling location sharing preferences. In Proc, of INTERACT (Springer). 2011, 380--387. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. White House. Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy. 15--19.Google ScholarGoogle Scholar
  36. White House. Big data and privacy: A technological perspective. 40--41.Google ScholarGoogle Scholar
  37. World Economic Forum. Unlocking the value of personal data: From collection to usage.Google ScholarGoogle Scholar
  38. Xie, J., Knijnenburg, B. P., and Jin, H. Location sharing privacy preference: Analysis and personalized recommendation. In Proc. IUI '14, IUI '14 (2014), 189--198. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy Tipping Points in Smartphones Privacy Preferences

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
      April 2015
      4290 pages
      ISBN:9781450331456
      DOI:10.1145/2702123

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader