Skip to main content

On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study

  • Conference paper
  • First Online:
Computer Security (CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019)

Abstract

While the widespread use of mobile services offers a variety of benefits to mobile users, it also raises serious privacy concerns. We report the results of a user study that investigated the factors that influence the decision-making process pertaining to the trade-off between privacy and utility in mobile services. Through two focus groups, 16 individual interviews and a questionnaire survey involving 60 participants, the study identified awareness and knowledge of privacy risks, trust in service providers, desire for mobile services, and belief of cyber privacy as four factors that contribute to the perceived trade-off. The results also suggest that, with appropriate adoption, privacy-preserving tools can positively influence the privacy trade-off. In addition, our findings explore the cultural differences regarding privacy between participants from western countries (with the UK as the main representative) and China. In particular, the results suggest that participants from China are more likely to be comfortable with a government department protecting their individual privacy, while participants from western countries are more likely to wish to see such responsibility reside with some combination of individuals and non-governmental organisations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Full survey text can be accessed here:https://yangliu.typeform.com/to/OEPM6f (English Version),https://yang46.typeform.com/to/PR3oWD (Chinese Version).

  2. 2.

    Individualistic countries emphasis on prioritization of self over the group.

  3. 3.

    Collectivistic countries emphasis on prioritization of the group over self.

References

  1. AppBrain. Google Play Stats (2017). http://www.appbrain.com/stats. Accessed Dec 2017

  2. Bal, G., Rannenberg, K., Hong, J.: Styx: design and evaluation of a new privacy risk communication method for smartphones. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 113–126. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_10

    Chapter  Google Scholar 

  3. Barnes, S.B.: A privacy paradox: social networking in the united states. First Monday 11(9) (2006). https://doi.org/10.5210/fm.v11i9.1394

  4. Benenson, Z., Girard, A., Krontiris, I.: User acceptance factors for anonymous credentials: an empirical investigation. In: Workshop on the Economics of Information Security (WEIS 2015) (2015)

    Google Scholar 

  5. Beresford, A.R., Kübler, D., Preibusch, S.: Unwillingness to pay for privacy: a field experiment. Econ. Lett. 117(1), 25–27 (2012)

    Article  Google Scholar 

  6. Boyles, J.L., Smith, A., Madden, M.: Privacy and data management on mobile devices, vol. 4. Pew Internet & American Life Project (2012)

    Google Scholar 

  7. Cooper, R., Assal, H., Chiasson, S.: Cross-national privacy concerns on data collection by government agencies. In: Proceedings of the 15th International Conference on Privacy, Security and Trust (PST), pp. 28–30 (2017)

    Google Scholar 

  8. Earp, J.B., Baumer, D.: Innovative web use to learn about consumer behavior and online privacy. Commun. ACM 46(4), 81–83 (2003)

    Article  Google Scholar 

  9. Gorden, R.L.: Interviewing: Strategy, Techniques, and Tactics. Dorsey Press, Homewood (1969)

    Google Scholar 

  10. Holavanalli, S., et al.: Flow permissions for Android. In: Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering (ASE 2013), pp. 652–657. IEEE, Palo Alto (2013)

    Google Scholar 

  11. Kayes, I., Kourtellis, N., Quercia, D., Iamnitchi, A., Bonchi, F.: Cultures in community question answering. In: Proceedings of the 26th ACM Conference on Hypertext & Social Media (HT 2015), pp. 175–184. ACM (2015)

    Google Scholar 

  12. Keith, M.J., Thompson, S.C., Hale, J., Lowry, P.B., Greer, C.: Information disclosure on mobile devices: re-examining privacy calculus with actual user behavior. Int. J. Hum Comput Stud. 71(12), 1163–1173 (2013)

    Article  Google Scholar 

  13. Kern, M., Sametinger, J.: Permission tracking in Android. In: Proceedings of the 6th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2012), Barcelona, Spain, pp. 148–155 (2012)

    Google Scholar 

  14. Kitzinger, J.: Qualitative research: introducing focus groups. BMJ: Br. Med. J. 311(7000), 299 (1995)

    Article  Google Scholar 

  15. Liu, F., Zhao, X., Chau, P.Y., Tang, Q.: Roles of perceived value and individual differences in the acceptance of mobile coupon applications. Internet Res. 25(3), 471–495 (2015)

    Article  Google Scholar 

  16. Liu, Y., Simpson, A.: Privacy-preserving targeted mobile advertising: formal models and analysis. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM/QASA -2016. LNCS, vol. 9963, pp. 94–110. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47072-6_7

    Chapter  Google Scholar 

  17. Liu, Y., Simpson, A.C.: Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation. Softw.: Pract. Exp. 46(12), 1657–1684 (2016)

    Google Scholar 

  18. Luo, X., Li, H., Zhang, J., Shim, J.P.: Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decis. Support Syst. 49(2), 222–234 (2010)

    Article  Google Scholar 

  19. Marvin, G.: Survey: 3 out of 4 consumers now notice retargeted ads (2016). http://marketingland.com/3-out-4-consumers-notice-retargeted-ads-67813. Accessed July 2017

  20. Okazaki, S., Mendez, F.: Exploring convenience in mobile commerce: moderating effects of gender. Comput. Hum. Behav. 29(3), 1234–1242 (2013)

    Article  Google Scholar 

  21. Phelan, C., Lampe, C., Resnick, P.: It’s creepy, but it doesn’t bother me. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI 2016), pp. 5240–5251. ACM (2016)

    Google Scholar 

  22. Pötzsch, S.: Privacy awareness: a means to solve the privacy paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) Privacy and Identity 2008. IAICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03315-5_17

    Chapter  Google Scholar 

  23. Preibusch, S.: Guide to measuring privacy concern: review of survey and observational instruments. Int. J. Hum. Comput. Stud. 71(12), 1133–1143 (2013)

    Article  Google Scholar 

  24. Sabouri, A.: On the user acceptance of privacy-preserving attribute-based credentials – a qualitative study. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM/QASA -2016. LNCS, vol. 9963, pp. 130–145. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47072-6_9

    Chapter  Google Scholar 

  25. Sheehan, K.B.: Toward a typology of internet users and online privacy concerns. Inf. Soc. 18(1), 21–32 (2002)

    Article  Google Scholar 

  26. Taylor, V.F., Martinovic, I.: Securank: starving permission-hungry apps using contextual permission analysis. In: Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2016, pp. 43–52. ACM, New York (2016)

    Google Scholar 

  27. Toubiana, V., Narayanan, A., Boneh, D., Nissenbaum, H., Barocas, S.: Adnostic: privacy preserving targeted advertising. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, p. 2010 (2010)

    Google Scholar 

  28. Virkki, J., Chen, L.: Personal perspectives: individual privacy in the IoT. Adv. Internet Things 3(02), 21 (2013)

    Article  Google Scholar 

  29. Wash, R., Rader, E., Fennell, C.: Can people self-report security accurately?: agreement between self-report and behavioral measures. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI 2017), pp. 2228–2232. ACM (2017)

    Google Scholar 

Download references

Acknowledgments

The authors thank the participants of the survey for their valuable comments. We are grateful to the reviewers for their constructive and helpful comments. We also wish to thank Norbert Nthala, Emma Osborn and Aaron Ceross for discussions that helped to improve this work. This work is partly supported by the National Key Research and Development Program of China (2017YFB0802204), Key Research and Development Program for Guangdong Province, China (2019B010136001), and Basic Research Project of Shenzhen, China (JCYJ20180507183624136).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y., Simpson, A. (2020). On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study. In: Katsikas, S., et al. Computer Security. CyberICPS SECPRE SPOSE ADIoT 2019 2019 2019 2019. Lecture Notes in Computer Science(), vol 11980. Springer, Cham. https://doi.org/10.1007/978-3-030-42048-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-42048-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-42047-5

  • Online ISBN: 978-3-030-42048-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics