Skip to main content
Top

2019 | OriginalPaper | Chapter

Short Paper: Initial Recommendations for the Design of Privacy Management Tools for Smartphones

Authors : Alessandro Carelli, Matt Sinclair, Darren Southee

Published in: Human-Computer Interaction – INTERACT 2019

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The continuing rise in the popularity of smartphones has led to an accompanying rise in the exposure of users to privacy threats as in the case of unintended leakage of personal information from apps. To improve transparency and the ability of users to control data leakage, the design of privacy-enhancing tools aimed at reducing the burden of informed privacy-decisions should be grounded upon users’ tacit needs and preferences. To this end, the present study explores users’ personal perception and concerns toward privacy and their expectations. Initial recommendations include: (1) consideration of the preferences of users for preserving functionalities of their apps, informing users about both (2) the real benefits and actual possibility of using privacy management tools and (3) suspected applications’ data collection behaviours in a way that matches their real concerns and values.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The trailer of MyPermission app shown to participants is available at this link: https://​www.​youtube.​com/​watch?​time_​continue=​1&​v=​fTiPigYxxHE.
 
Literature
4.
go back to reference Narayanan, A., Shmatikov, V.: Myths and fallacies of ‘personally identifiable information’. Commun. ACM 53, 24–26 (2010)CrossRef Narayanan, A., Shmatikov, V.: Myths and fallacies of ‘personally identifiable information’. Commun. ACM 53, 24–26 (2010)CrossRef
6.
go back to reference Borgesius, F.Z.: Singling out people without knowing their names – behavioural targeting, pseudonymous data, and the new data protection regulation. SSRN Scholarly Paper ID 2733115, Social Science Research Network, Rochester, NY, 16 February 2016. https://papers.ssrn.com/abstract=2733115. Accessed 3 May 2018 Borgesius, F.Z.: Singling out people without knowing their names – behavioural targeting, pseudonymous data, and the new data protection regulation. SSRN Scholarly Paper ID 2733115, Social Science Research Network, Rochester, NY, 16 February 2016. https://​papers.​ssrn.​com/​abstract=​2733115. Accessed 3 May 2018
10.
go back to reference Almuhimedi, H., Schaub, F., Sadeh, N., et al.: Your location has been shared 5,398 times!: a field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787–796. ACM, New York (2015) Almuhimedi, H., Schaub, F., Sadeh, N., et al.: Your location has been shared 5,398 times!: a field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787–796. ACM, New York (2015)
11.
go back to reference Balebako, R., Jung, J., Lu, W., et al.: ‘Little brothers watching you’: raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, pp. 12:1–12:11. ACM, New York (2013) Balebako, R., Jung, J., Lu, W., et al.: ‘Little brothers watching you’: raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, pp. 12:1–12:11. ACM, New York (2013)
12.
go back to reference Felt, A.P., Egelman, S., Wagner, D.: I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 33–44. ACM, New York (2012) Felt, A.P., Egelman, S., Wagner, D.: I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 33–44. ACM, New York (2012)
13.
go back to reference Lin, J., Amini, S., Hong, J.I., et al.: Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 501–510. ACM (2012) Lin, J., Amini, S., Hong, J.I., et al.: Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp. 501–510. ACM (2012)
14.
go back to reference Liu, B., Andersen, M.S., Schaub, F., et al.: Follow my recommendations: a personalized privacy assistant for mobile app permissions. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 27–41. USENIX Association, Denver (2016) Liu, B., Andersen, M.S., Schaub, F., et al.: Follow my recommendations: a personalized privacy assistant for mobile app permissions. In: Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pp. 27–41. USENIX Association, Denver (2016)
15.
go back to reference Tsai, L., Wijesekera, P., Reardon, J., et al.: Turtle guard: helping android users apply contextual privacy preferences. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 145–162. USENIX Association, Santa Clara (2017) Tsai, L., Wijesekera, P., Reardon, J., et al.: Turtle guard: helping android users apply contextual privacy preferences. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 145–162. USENIX Association, Santa Clara (2017)
16.
go back to reference Wijesekera, P., Baokar, A., Tsai, J.Y., et al.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences (2017) Wijesekera, P., Baokar, A., Tsai, J.Y., et al.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences (2017)
19.
go back to reference Leon, P., Ur, B., Shay, R., et al.: Why johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 589–598. ACM, New York (2012) Leon, P., Ur, B., Shay, R., et al.: Why johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 589–598. ACM, New York (2012)
20.
go back to reference Dunphy, P., Vines, J., Coles-Kemp, L., et al.: Understanding the experience-centeredness of privacy and security technologies. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 83–94. ACM, New York (2014) Dunphy, P., Vines, J., Coles-Kemp, L., et al.: Understanding the experience-centeredness of privacy and security technologies. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 83–94. ACM, New York (2014)
21.
go back to reference Stark, L.: The emotional context of information privacy. Inf. Soc. 32, 14–27 (2016)CrossRef Stark, L.: The emotional context of information privacy. Inf. Soc. 32, 14–27 (2016)CrossRef
22.
go back to reference Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., et al.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2347–2356. ACM, New York (2014) Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., et al.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2347–2356. ACM, New York (2014)
23.
go back to reference Mathiasen, N.R., Bødker, S.: Experiencing security in interaction design. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2325–2334. ACM, New York (2011) Mathiasen, N.R., Bødker, S.: Experiencing security in interaction design. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2325–2334. ACM, New York (2011)
24.
go back to reference Nørgaard, M., Hornbæk, K.: What do usability evaluators do in practice?: An explorative study of think-aloud testing. In: Proceedings of the 6th Conference on Designing Interactive Systems, pp. 209–218. ACM, New York (2006) Nørgaard, M., Hornbæk, K.: What do usability evaluators do in practice?: An explorative study of think-aloud testing. In: Proceedings of the 6th Conference on Designing Interactive Systems, pp. 209–218. ACM, New York (2006)
25.
go back to reference Olmsted-Hawala, E.L., Murphy, E.D., Hawala, S., et al.: Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2381–2390. ACM, New York (2010) Olmsted-Hawala, E.L., Murphy, E.D., Hawala, S., et al.: Think-aloud protocols: a comparison of three think-aloud protocols for use in testing data-dissemination web sites for usability. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2381–2390. ACM, New York (2010)
27.
go back to reference Denscombe, M.: The Good Research Guide. Open University Press, New York (2007) Denscombe, M.: The Good Research Guide. Open University Press, New York (2007)
28.
go back to reference Clayton, R.B., Leshner, G., Almond, A.: The extended iSelf: the impact of iPhone separation on cognition, emotion, and physiology. J. Comput.-Mediated Commun. 20, 119–135 (2015)CrossRef Clayton, R.B., Leshner, G., Almond, A.: The extended iSelf: the impact of iPhone separation on cognition, emotion, and physiology. J. Comput.-Mediated Commun. 20, 119–135 (2015)CrossRef
29.
32.
go back to reference Jung, J., Han, S., Wetherall, D.: Short paper: enhancing mobile application permissions with runtime feedback and constraints. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 45–50. ACM, New York (2012) Jung, J., Han, S., Wetherall, D.: Short paper: enhancing mobile application permissions with runtime feedback and constraints. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 45–50. ACM, New York (2012)
34.
go back to reference Wright, P., McCarthy, J.C.: Experience-centered design designers, users, and communities in dialogue. Morgan & Claypool, San Rafael (2010)CrossRef Wright, P., McCarthy, J.C.: Experience-centered design designers, users, and communities in dialogue. Morgan & Claypool, San Rafael (2010)CrossRef
36.
go back to reference Gaver, W.W., Bowers, J., Boucher, A., et al.: The drift table: designing for ludic engagement. In: CHI 2004 Extended Abstracts on Human Factors in Computing Systems, pp. 885–900. ACM, New York (2004) Gaver, W.W., Bowers, J., Boucher, A., et al.: The drift table: designing for ludic engagement. In: CHI 2004 Extended Abstracts on Human Factors in Computing Systems, pp. 885–900. ACM, New York (2004)
37.
go back to reference Hutchinson, H., Mackay, W., Westerlund, B., et al.: Technology probes: inspiring design for and with families. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 17–24. ACM, New York (2003) Hutchinson, H., Mackay, W., Westerlund, B., et al.: Technology probes: inspiring design for and with families. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 17–24. ACM, New York (2003)
38.
go back to reference Uriu, D., Odom, W.: Designing for domestic memorialization and remembrance: a field study of fenestra in Japan. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 5945–5957. ACM, New York (2015) Uriu, D., Odom, W.: Designing for domestic memorialization and remembrance: a field study of fenestra in Japan. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 5945–5957. ACM, New York (2015)
39.
go back to reference Vines, J., Blythe, M., Dunphy, P., et al.: Cheque mates: participatory design of digital payments with eighty somethings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1189–1198. ACM, New York (2012) Vines, J., Blythe, M., Dunphy, P., et al.: Cheque mates: participatory design of digital payments with eighty somethings. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1189–1198. ACM, New York (2012)
Metadata
Title
Short Paper: Initial Recommendations for the Design of Privacy Management Tools for Smartphones
Authors
Alessandro Carelli
Matt Sinclair
Darren Southee
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-29387-1_28