skip to main content
10.1145/3565066.3609737acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
extended-abstract

User-Centered Privacy to Improve User Quantification using Smartphone Sensing

Published: 26 September 2023 Publication History

Abstract

Mobile sensing technologies enable adaptive and context-aware applications. At the same time, they raise a range of privacy concerns. Thus, to reduce privacy concerns today apps are restricted from accessing certain information hindering to deliver full personalization and novel adaptive use cases. I investigate this issue by shedding light on the privacy concerns that arise from state-of-the-art mobile sensing data, studying the users’ perspective on mobile smartphone privacy, and proposing concepts that protect the users’ privacy while keeping the resulting data usable. I found that there is a lack of user-centered privacy design and that control features play a key role to give the users more agency. My results motivate the proliferation of control-enhancing privacy features in mobile applications. I show that the benefits of trust and system adoption surpass any impairments that control features might bring to the data.

References

[1]
Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security Privacy 3, 1 (2005), 26–33. https://doi.org/10.1109/MSP.2005.22
[2]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI ’15). Association for Computing Machinery, New York, NY, USA, 787–796. https://doi.org/10.1145/2702123.2702210
[3]
Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, and Carolyn Nguyen. 2013. "Little Brothers Watching You": Raising Awareness of Data Leaks on Smartphones. In Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS ’13). Association for Computing Machinery, New York, NY, USA, Article 12, 11 pages. https://doi.org/10.1145/2501604.2501616
[4]
Susanne Barth, Menno DT de Jong, Marianne Junger, Pieter H Hartel, and Janina C Roppelt. 2019. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41 (2019), 55–69. https://doi.org/10.1016/j.tele.2019.03.003
[5]
Florian Bemmann and Daniel Buschek. 2020. LanguageLogger: A Mobile Keyboard Application for Studying Language Use in Everyday Text Communication in the Wild. Proc. ACM Hum.-Comput. Interact. 4, EICS, Article 84 (jun 2020), 24 pages. https://doi.org/10.1145/3397872
[6]
Florian Bemmann, Carmen Mayer, and Sven Mayer. 2023. Leveraging Mobile Sensing Technology for Societal Change Towards more Sustainable Behavior. In Workshop Proceedings of the HCI for Climate Change: Imagining Sustainable Futures (2023-04-23) (HCI4CC3). https://doi.org/10.48550/arXiv.2303.12426 arxiv:2303.12426 [cs.HC]
[7]
Florian Bemmann, Maximiliane Windl, Jonas Erbe, Sven Mayer, and Heinrich Hussmann. 2022. The Influence of Transparency and Control on the Willingness of Data Sharing in Adaptive Mobile Apps. Proc. ACM Hum.-Comput. Interact. 6, MHCI, Article 189 (sep 2022), 26 pages. https://doi.org/10.1145/3546724
[8]
Jan Hendrik Betzing, Matthias Tietz, Jan vom Brocke, and Jörg Becker. 2020. The impact of transparency on mobile privacy decision making. Electronic Markets 30, 3 (2020), 607–625. https://doi.org/10.1007/s12525-019-00332-3
[9]
Jan Blom, Daniel Gatica-Perez, and Niko Kiukkonen. 2011. People-Centric Mobile Sensing with a Pragmatic Twist: From Behavioral Data Points to Active User Involvement. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (Stockholm, Sweden) (MobileHCI ’11). Association for Computing Machinery, New York, NY, USA, 381–384. https://doi.org/10.1145/2037373.2037431
[10]
Mauro Cherubini, Rodrigo de Oliveira, Anna Hiltunen, and Nuria Oliver. 2011. Barriers and Bridges in the Adoption of Today’s Mobile Phone Contextual Services. In Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services (Stockholm, Sweden) (MobileHCI ’11). Association for Computing Machinery, New York, NY, USA, 167–176. https://doi.org/10.1145/2037373.2037400
[11]
Delphine Christin, Andreas Reinhardt, Salil S Kanhere, and Matthias Hollick. 2011. A survey on privacy in mobile participatory sensing applications. Journal of systems and software 84, 11 (2011), 1928–1946. https://doi.org/10.1016/j.jss.2011.06.073
[12]
Christos Efstratiou, Ilias Leontiadis, Marco Picone, Kiran K Rachuri, Cecilia Mascolo, and Jon Crowcroft. 2012. Sense and sensibility in a pervasive world. In International Conference on Pervasive Computing. Springer, Cham, 406–424. https://doi.org/10.1007/978-3-642-31205-2_25
[13]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android permissions: User attention, comprehension, and behavior. In Proceedings of the eighth symposium on usable privacy and security. 1–14. https://doi.org/10.1145/2335356.2335360
[14]
Alisa Frik, Juliann Kim, Joshua Rafael Sanchez, and Joanne Ma. 2022. Users’ expectations about and use of smartphone privacy and security settings. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems. 1–24. https://doi.org/10.1145/3491102.3517504
[15]
Paul Gerber, Melanie Volkamer, and Karen Renaud. 2015. Usability versus Privacy Instead of Usable Privacy: Google’s Balancing Act between Usability and Privacy. SIGCAS Comput. Soc. 45, 1 (feb 2015), 16–21. https://doi.org/10.1145/2738210.2738214
[16]
Gabriella M Harari. 2020. A process-oriented approach to respecting privacy in the context of mobile phone tracking. Current opinion in psychology 31 (2020), 141–147. https://doi.org/10.1016/j.copsyc.2019.09.007
[17]
Sabrina Karwatzki, Olga Dytynko, Manuel Trenz, and Daniel Veit. 2017. Beyond the personalization–privacy paradox: Privacy valuation, transparency features, and service personalization. Journal of Management Information Systems 34, 2 (2017), 369–400. https://doi.org/10.1080/07421222.2017.1334467
[18]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A conundrum of permissions: installing applications on an android smartphone. In International conference on financial cryptography and data security. Springer, 68–79. https://doi.org/10.1007/978-3-642-34638-5_6
[19]
Florian Keusch, Bella Struminskaya, Christopher Antoun, Mick P Couper, and Frauke Kreuter. 2019. Willingness to participate in passive mobile data collection. Public opinion quarterly 83, S1 (2019), 210–235. https://doi.org/10.1093/poq/nfz007
[20]
Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring privacy concerns about personal sensing. In International Conference on Pervasive Computing. Springer, 176–183. https://doi.org/10.1007/978-3-642-01516-8_13
[21]
Frauke Kreuter, Georg-Christoph Haas, Florian Keusch, Sebastian Bähr, and Mark Trappmann. 2020. Collecting survey and smartphone sensor data with an app: Opportunities and challenges around privacy and informed consent. Social Science Computer Review 38, 5 (2020), 533–549. https://doi.org/10.1177/0894439318816389
[22]
Florian Künzler. 2019. Context-aware notification management systems for just-in-time adaptive interventions. In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 435–436. https://doi.org/10.1109/PERCOMW.2019.8730874
[23]
Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I Hong. 2014. Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, 199–212. https://doi.org/10.5555/3235838.3235856
[24]
Sandra C Matz, Michal Kosinski, Gideon Nave, and David J Stillwell. 2017. Psychological targeting as an effective approach to digital mass persuasion. Proceedings of the national academy of sciences 114, 48 (2017), 12714–12719.
[25]
Patricia A Norberg, Daniel R Horne, and David A Horne. 2007. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs 41, 1 (2007), 100–126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
[26]
Iryna Pentina, Lixuan Zhang, Hatem Bata, and Ying Chen. 2016. Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison. Computers in Human Behavior 65 (2016), 409–419.
[27]
Sarah Prange, Sven Mayer, Maria-Lena Bittl, Mariam Hassib, and Florian Alt. 2021. Investigating User Perceptions Towards Wearable Mobile Electromyography. In Human-Computer Interaction – INTERACT 2021. Springer International Publishing, Cham, 339–360. https://doi.org/10.1007/978-3-030-85610-6_20
[28]
Emilee Rader. 2022. Normative and Non-Social Beliefs about Sensor Data: Implications for Collective Privacy Management. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 653–670. https://www.usenix.org/conference/soups2022/presentation/rader
[29]
Melanie Revilla, Mick Couper, and Carlos Ochoa. 2019. Willingness of Online Panelists to Perform Additional Tasks. methods, data, analyses 13, 2 (2019), 29. https://doi.org/10.12758/mda.2018.01
[30]
Alireza Sahami Shirazi, Niels Henze, Tilman Dingler, Martin Pielot, Dominik Weber, and Albrecht Schmidt. 2014. Large-Scale Assessment of Mobile Notifications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI ’14). Association for Computing Machinery, New York, NY, USA, 3055–3064. https://doi.org/10.1145/2556288.2557189
[31]
Albrecht Schmidt, Michael Beigl, and Hans Gellersen. 1999. There is more to context than location. Computers & Graphics 23, 6 (1999), 893–901. https://doi.org/10.1016/S0097-8493(99)00120-X
[32]
Ramona Schoedel, Fiona Kunz, Maximilian Bergmann, Florian Bemmann, Markus Bühner, and Larissa Sust. 2023. Snapshots of daily life: Situations investigated through the lens of smartphone sensing.Journal of Personality and Social Psychology (2023). https://doi.org/10.1037/pspp0000469
[33]
Gian Luca Scoccia, Ivano Malavolta, Marco Autili, Amleto Di Salle, and Paola Inverardi. 2019. Enhancing trustability of android applications via user-centric flexible permissions. IEEE Transactions on Software Engineering 47, 10 (2019), 2032–2051.
[34]
Nađa Terzimehić, Florian Bemmann, Miriam Halsner, and Sven Mayer. 2023. A Mixed-Method Exploration into the Mobile Phone Rabbit Hole. Proc. ACM Hum.-Comput. Interact. 6, MHCI, Article 194 (sep 2023), 29 pages. https://doi.org/10.1145/3604241
[35]
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, and Vincent W Freeh. 2011. Taming information-stealing smartphone applications (on android). In Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings 4. Springer, 93–107.
[36]
J Christopher Zimmer, Riza Arsal, Mohammad Al-Marzouq, Dewayne Moore, and Varun Grover. 2010. Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure. Decision Support Systems 48, 2 (2010), 395–406. https://doi.org/10.1016/j.dss.2009.10.003

Index Terms

  1. User-Centered Privacy to Improve User Quantification using Smartphone Sensing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobileHCI '23 Companion: Proceedings of the 25th International Conference on Mobile Human-Computer Interaction
    September 2023
    256 pages
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 September 2023

    Check for updates

    Author Tag

    1. human computer interaction

    Qualifiers

    • Extended-abstract
    • Research
    • Refereed limited

    Conference

    MobileHCI '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 202 of 906 submissions, 22%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 62
      Total Downloads
    • Downloads (Last 12 months)38
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 09 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media