Control yourself: on user control of privacy settings using personalization and privacy panel on smartphones

被引:7
作者
Zhou, Yun [1 ]
Piekarska, Marta [2 ]
Raake, Alexander [3 ]
Xu, Tao [4 ]
Wu, Xiaojun [5 ]
Dong, Bei [5 ]
机构
[1] Shaanxi Normal Univ, Sch Educ, Xian 710062, Shaanxi, Peoples R China
[2] Tech Univ Berlin, Telekom Innovat Labs, Secur Telecommun, D-10623 Berlin, Germany
[3] Univ Technol Ilmenau, Inst Media Technol, Audiovisual Technol Grp, D-98693 Ilmenau, Germany
[4] Northwestern Polytech Univ, Sch Software & Microelect, Xian 710072, Peoples R China
[5] Shaanxi Normal Univ, Minist Educ, Key Lab Modern Teaching Technol, Xian 710062, Shaanxi, Peoples R China
来源
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017) | 2017年 / 109卷
关键词
Privacy; Smartphone; Control; Personalized Settings; Lab Study;
D O I
10.1016/j.procs.2017.05.300
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper assesses the gap between actual and perceived privacy features of smartphones, exploring privacy as one decision-making factor in information protection, and the balance between privacy control and the required user interaction with the settings. We conducted a fine-grained evaluation partly based on the Privacy Panel, a protection solution on Firefox OS including features of Find my Device, Backup, Location Blurring, and Guest Mode. Results showed that safety as one decision-making factor impacted information protection in different use cases at different levels. Although people sacrifice more privacy as the price of a handset grows, they still see privacy as a factor of various significance with respect to context of finding back smartphone and selecting storage places. People were satisfied to use improved privacy settings but still did not well adapt to complex personalized interfaces. Sorting methods, recommendations and establishing profiles have shown to be feasible ways to assist users to balance between full control and the additional interaction burden when adjusting privacy settings in a complex app ecosystem. (C) 2017 The Authors. Published by Elsevier B.V.
引用
收藏
页码:100 / 107
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 2012, NORDICHI 12 P 7 NORD
[2]  
[Anonymous], 2012, P 2 ACM WORKSHOP SEC
[3]  
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[4]  
[Anonymous], 2013, P ANN INT C MOB SYST, DOI DOI 10.1145/2462456.2464460
[5]  
Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
[6]   TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones [J].
Enck, William ;
Gilbert, Peter ;
Chun, Byung-Gon ;
Cox, Landon P. ;
Jung, Jaeyeon ;
McDaniel, Patrick ;
Sheth, Anmol N. .
COMMUNICATIONS OF THE ACM, 2014, 57 (03) :99-106
[7]  
Karlson Amy K., 2009, P SIGCHI C HUM FACT, P1647, DOI [10.1145/1518701.1518953, DOI 10.1145/1518701.1518953]
[8]   Privacy and security issues in cloud computing: The role of institutions and institutional evolution [J].
Kshetri, Nir .
TELECOMMUNICATIONS POLICY, 2013, 37 (4-5) :372-386
[9]   Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones [J].
Liu, Yunxin ;
Rahmati, Ahmad ;
Jang, Hyukjae ;
Huang, Yuanhe ;
Zhong, Lin ;
Zhang, Yongguang ;
Zhang, Shensheng .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (12) :1682-1696
[10]   "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households [J].
Matthews, Tara ;
Liao, Kerwell ;
Turner, Anna ;
Berkovich, Marianne ;
Reeder, Rob ;
Consolvo, Sunny .
34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, 2016, :5921-5932