CSS 2017: Cyberspace Safety and Security pp 427-441 | Cite as
Users’ Perceived Control, Trust and Expectation on Privacy Settings of Smartphone
Abstract
A common issue is that a large number of authorized apps use important and sensitive personal information without arousing users’ full awareness. Existing schemes for privacy protection on smartphones try to provide users with privacy settings to control privacy leakage. Privacy settings on smartphone are intended to inform users about risks of privacy leakage and let users take over control of smartphone. Therefore, it is essential to understand and measure how much users perceive and trust these settings. To this end, we design and conduct a fine-grained online survey with 222 respondents. We collect the demographics as well as users’ smartphone usage, covering not only participants’ basic background information like age, gender, job, but also time of smartphone use per day, respective importance and sensitivity level of personal data, and their smartphone OSs. In this paper, we investigate users’ current privacy perception and protection on smartphone in different groups, discussing participants’ responses to (1) Rating the importance and sensitivity of personal information; (2) Trust on existing privacy protection; (3) Perceived control on smartphone; (4) Frequency of searching privacy knowledge; (5) Concerns about manufacturer and third-party company’s behaviors on personal data and decision.
Keywords
Privacy Smartphone Trust SurveyNotes
Acknowledgment
This work is supported by the Opening Project of State Key Laboratory for Manufacturing Systems Engineering, No. sklms2016001.
References
- 1.Benenson, Z., Gassmann, F., Reinfelder, L.: Android and IOS users’ differences concerning security and privacy. In: CHI 2013 Extended Abstracts on Human Factors in Computing Systems (CHI EA 2013), New York, NY, USA, pp. 817–822. ACM (2013)Google Scholar
- 2.Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smart phone security and privacy. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 1. ACM (2012)Google Scholar
- 3.Felt, A.P., Egelman, S., Wagner, D.: I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 33–44. ACM (2012)Google Scholar
- 4.Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 3. ACM (2012)Google Scholar
- 5.GSMA. User perspectives on mobile privacy. futuresight. Technical report (2011)Google Scholar
- 6.Karlson, A.K., Brush, A.J., Schechter, S.: Can i borrow your phone? Understanding concerns when sharing mobile phones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1647–1650. ACM (2009)Google Scholar
- 7.Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app. decision-making process. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3393–3402. ACM (2013)Google Scholar
- 8.Matthews, T., Liao, K., Turner, A., Berkovich, M., Reeder, R., Consolvo, S.: She’ll just grab any device that’s closer: a study of everyday device & account sharing in households. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI 2016), New York, NY, USA, pp. 5921–5932. ACM (2016)Google Scholar
- 9.Preibusch, S.: Guide to measuring privacy concern: review of survey and observational instruments. Int. J. Hum. Comput. Stud. 71(12), 1133–1143 (2013)CrossRefGoogle Scholar
- 10.Seifert, J., Luca, A., Conradi, B., Hussmann, H.: TreasurePhone: context-sensitive user data protection on mobile phones. In: Floréen, P., Krüger, A., Spasojevic, M. (eds.) Pervasive 2010. LNCS, vol. 6030, pp. 130–137. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-12654-3_8 CrossRefGoogle Scholar
- 11.Shklovski, I., Mainwaring, S.D., Skttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2347–2356. ACM (2014)Google Scholar
- 12.Youn, S.: Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. J. Consum. Affairs 43(3), 389–418 (2009)CrossRefGoogle Scholar
- 13.Zhou, Y., Piekarska, M., Raake, A., Xu, T., Wu, X., Dong, B.: Control yourself: on user control of privacy settings using personalization and privacy panel on smartphones. Procedia Comput. Sci. 109, 100–107 (2017). 8th International Conference on Ambient Systems, Networks and Technologies (ANT-2017), 16–19 May 2017, Madeira, PortugalGoogle Scholar
- 14.Zhou, Y., Xu, T., Raake, A., Cai, Y.: Access control is not enough: how owner and guest set limits to protect privacy when sharing smartphone. In: Stephanidis, C. (ed.) HCI 2016. CCIS, vol. 617, pp. 494–499. Springer, Cham (2016). doi: 10.1007/978-3-319-40548-3_82 CrossRefGoogle Scholar