Abstract
While the widespread use of mobile services offers a variety of benefits to mobile users, it also raises serious privacy concerns. We report the results of a user study that investigated the factors that influence the decision-making process pertaining to the trade-off between privacy and utility in mobile services. Through two focus groups, 16 individual interviews and a questionnaire survey involving 60 participants, the study identified awareness and knowledge of privacy risks, trust in service providers, desire for mobile services, and belief of cyber privacy as four factors that contribute to the perceived trade-off. The results also suggest that, with appropriate adoption, privacy-preserving tools can positively influence the privacy trade-off. In addition, our findings explore the cultural differences regarding privacy between participants from western countries (with the UK as the main representative) and China. In particular, the results suggest that participants from China are more likely to be comfortable with a government department protecting their individual privacy, while participants from western countries are more likely to wish to see such responsibility reside with some combination of individuals and non-governmental organisations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Full survey text can be accessed here:https://yangliu.typeform.com/to/OEPM6f (English Version),https://yang46.typeform.com/to/PR3oWD (Chinese Version).
- 2.
Individualistic countries emphasis on prioritization of self over the group.
- 3.
Collectivistic countries emphasis on prioritization of the group over self.
References
AppBrain. Google Play Stats (2017). http://www.appbrain.com/stats. Accessed Dec 2017
Bal, G., Rannenberg, K., Hong, J.: Styx: design and evaluation of a new privacy risk communication method for smartphones. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 113–126. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_10
Barnes, S.B.: A privacy paradox: social networking in the united states. First Monday 11(9) (2006). https://doi.org/10.5210/fm.v11i9.1394
Benenson, Z., Girard, A., Krontiris, I.: User acceptance factors for anonymous credentials: an empirical investigation. In: Workshop on the Economics of Information Security (WEIS 2015) (2015)
Beresford, A.R., Kübler, D., Preibusch, S.: Unwillingness to pay for privacy: a field experiment. Econ. Lett. 117(1), 25–27 (2012)
Boyles, J.L., Smith, A., Madden, M.: Privacy and data management on mobile devices, vol. 4. Pew Internet & American Life Project (2012)
Cooper, R., Assal, H., Chiasson, S.: Cross-national privacy concerns on data collection by government agencies. In: Proceedings of the 15th International Conference on Privacy, Security and Trust (PST), pp. 28–30 (2017)
Earp, J.B., Baumer, D.: Innovative web use to learn about consumer behavior and online privacy. Commun. ACM 46(4), 81–83 (2003)
Gorden, R.L.: Interviewing: Strategy, Techniques, and Tactics. Dorsey Press, Homewood (1969)
Holavanalli, S., et al.: Flow permissions for Android. In: Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013), pp. 652–657. IEEE, Palo Alto (2013)
Kayes, I., Kourtellis, N., Quercia, D., Iamnitchi, A., Bonchi, F.: Cultures in community question answering. In: Proceedings of the 26th ACM Conference on Hypertext & Social Media (HT 2015), pp. 175–184. ACM (2015)
Keith, M.J., Thompson, S.C., Hale, J., Lowry, P.B., Greer, C.: Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. Int. J. Hum Comput Stud. 71(12), 1163–1173 (2013)
Kern, M., Sametinger, J.: Permission tracking in Android. In: Proceedings of the 6th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2012), Barcelona, Spain, pp. 148–155 (2012)
Kitzinger, J.: Qualitative research: introducing focus groups. BMJ: Br. Med. J. 311(7000), 299 (1995)
Liu, F., Zhao, X., Chau, P.Y., Tang, Q.: Roles of perceived value and individual differences in the acceptance of mobile coupon applications. Internet Res. 25(3), 471–495 (2015)
Liu, Y., Simpson, A.: Privacy-preserving targeted mobile advertising: formal models and analysis. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM/QASA -2016. LNCS, vol. 9963, pp. 94–110. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47072-6_7
Liu, Y., Simpson, A.C.: Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation. Softw.: Pract. Exp. 46(12), 1657–1684 (2016)
Luo, X., Li, H., Zhang, J., Shim, J.P.: Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decis. Support Syst. 49(2), 222–234 (2010)
Marvin, G.: Survey: 3 out of 4 consumers now notice retargeted ads (2016). http://marketingland.com/3-out-4-consumers-notice-retargeted-ads-67813. Accessed July 2017
Okazaki, S., Mendez, F.: Exploring convenience in mobile commerce: moderating effects of gender. Comput. Hum. Behav. 29(3), 1234–1242 (2013)
Phelan, C., Lampe, C., Resnick, P.: It’s creepy, but it doesn’t bother me. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI 2016), pp. 5240–5251. ACM (2016)
Pötzsch, S.: Privacy awareness: a means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) Privacy and Identity 2008. IAICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03315-5_17
Preibusch, S.: Guide to measuring privacy concern: review of survey and observational instruments. Int. J. Hum. Comput. Stud. 71(12), 1133–1143 (2013)
Sabouri, A.: On the user acceptance of privacy-preserving attribute-based credentials – a qualitative study. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM/QASA -2016. LNCS, vol. 9963, pp. 130–145. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47072-6_9
Sheehan, K.B.: Toward a typology of internet users and online privacy concerns. Inf. Soc. 18(1), 21–32 (2002)
Taylor, V.F., Martinovic, I.: Securank: starving permission-hungry apps using contextual permission analysis. In: Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2016, pp. 43–52. ACM, New York (2016)
Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: privacy preserving targeted advertising. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, p. 2010 (2010)
Virkki, J., Chen, L.: Personal perspectives: individual privacy in the IoT. Adv. Internet Things 3(02), 21 (2013)
Wash, R., Rader, E., Fennell, C.: Can people self-report security accurately?: agreement between self-report and behavioral measures. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI 2017), pp. 2228–2232. ACM (2017)
Acknowledgments
The authors thank the participants of the survey for their valuable comments. We are grateful to the reviewers for their constructive and helpful comments. We also wish to thank Norbert Nthala, Emma Osborn and Aaron Ceross for discussions that helped to improve this work. This work is partly supported by the National Key Research and Development Program of China (2017YFB0802204), Key Research and Development Program for Guangdong Province, China (2019B010136001), and Basic Research Project of Shenzhen, China (JCYJ20180507183624136).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Y., Simpson, A. (2020). On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study. In: Katsikas, S., et al. Computer Security. CyberICPS SECPRE SPOSE ADIoT 2019 2019 2019 2019. Lecture Notes in Computer Science(), vol 11980. Springer, Cham. https://doi.org/10.1007/978-3-030-42048-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-42048-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42047-5
Online ISBN: 978-3-030-42048-2
eBook Packages: Computer ScienceComputer Science (R0)