Privacy Tipping Points in Smartphones Privacy Preferences

被引:45
作者
Shih, Fuming [1 ]
Liccardi, Ilaria [1 ,2 ]
Weitzner, Daniel J. [1 ]
机构
[1] MIT, CSAIL, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Univ Oxford, Oxford E Res Ctr, Oxford, England
来源
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS | 2015年
关键词
Privacy Preferences; Android; Experience Sampling; DISCLOSURE;
D O I
10.1145/2702123.2702404
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The aim of this research was to understand what affects people's privacy preferences in smartphone apps. We ran a four-week study in the wild with 34 participants. Participants were asked to answer questions, which were used to gather information about their personal context and to measure their privacy preferences, by varying app name and the purpose of data collection. Our results show that participants shared the most when no information about data access or purpose was given, and shared the least when both of these details were specified. When just one of either purpose or the requesting app was shown, participants shared less when just the purpose was specified than when just the app name was given. We found that the predominant factor affecting users' choices was the purpose for data access. In our study the purpose varied from being not specified, to vague, to being very specific. Participants were more willing to disclose data when no purpose was specified. When a vague purpose was shown, participants became more privacy-aware and were less willing to disclose their information. When specific purposes were shown, participants were more willing to disclose, provided the purpose for requesting the information appeared to be beneficial to them, while participants shared the least when the purpose for data access was solely beneficial to developers.
引用
收藏
页码:807 / 816
页数:10
相关论文
共 36 条
[1]  
Abdesslem F. B., 2010, PRIVACY USABILITY ME
[2]   Privacy and rationality in individual decision making [J].
Acquisti, A ;
Grossklags, J .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :26-33
[3]  
Acquisti A., 2007, WEIS, P12
[4]   Social fMRI: Investigating and shaping social mechanisms in the real world [J].
Aharony, Nadav ;
Pan, Wei ;
Ip, Cory ;
Khayal, Inas ;
Pentland, Alex .
PERVASIVE AND MOBILE COMPUTING, 2011, 7 (06) :643-659
[5]  
Ahern S, 2007, CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1 AND 2, P357
[6]  
[Anonymous], 2013, European Data Protection: Coming of Age, DOI DOI 10.1007/978-94-007-5170-5_13
[7]  
[Anonymous], 2014, P 19 INT C INT US IN
[8]  
[Anonymous], 2013, P 9 S US PRIV SEC AS, DOI [DOI 10.1145/2501604.2501616, 10.1145/2501604.2501616]
[9]  
[Anonymous], 2006, Proc. 2006 20th anniversary conference on Computer supported cooperative work, DOI DOI 10.1145/1180875.1180947
[10]   The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online [J].
Bansal, Gaurav ;
Zahedi, Fatemeh Mariam ;
Gefen, David .
DECISION SUPPORT SYSTEMS, 2010, 49 (02) :138-150