Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure

Published: 23 March 2017 Publication History

Abstract

The wide adoption of mobile devices and social media platforms have dramatically increased the collection and sharing of personal information. More and more frequently, users are called to make decisions concerning the disclosure of their personal information. In this study, we investigate the factors affecting users’ choices toward the disclosure of their personal data, including not only their demographic and self-reported individual characteristics, but also their social interactions and their mobility patterns inferred from months of mobile phone data activity. We report the findings of a field study conducted with a community of 63 subjects provided with (i) a smart-phone and (ii) a Personal Data Store (PDS) enabling them to control the disclosure of their data. We monitor the sharing behavior of our participants through the PDS and evaluate the contribution of different factors affecting their disclosing choices of location and social interaction data. Our analysis shows that social interaction inferred by mobile phones is an important factor revealing willingness to share, regardless of the data type. In addition, we provide further insights on the individual traits relevant to the prediction of sharing behavior.

References

[1]
Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and the human behavior in the age of information. Science 347, 6221 (2015), 509--514.
[2]
Nadav Aharony, Wei Pan, Cory Ip, Inas Khayal, and Alex Pentland. 2011. Social fMRI: Investigating and shaping social mechanisms in the real world. Pervasive and Mobile Computing 7, 6 (2011), 643--659.
[3]
Yair Amichai-Hamburger and Gideon Vinitzky. 2010. Social network use and personality. Computers in Human Behavior 26, 6 (2010), 1289--1295.
[4]
Claudio Bettini and Daniele Riboni. 2015. Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing 17 (2015), 159--174.
[5]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science 4, 3 (2013), 340--347.
[6]
Luca Canzian and Mirco Musolesi. 2015. Trajectories of depression: Unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp’15). ACM, 1293--1304.
[7]
Simone Centellegher, Marco De Nadai, Michele Caraviello, Chiara Leonardi, Michele Vescovi, Yusi Ramadian, Nuria Oliver, Fabio Pianesi, Alex Pentland, Fabrizio Antonelli, and others. 2016. The mobile territorial lab: A multilayered and dynamic view on parents’ daily lives. EPJ Data Science 5, 1 (2016), 1.
[8]
Emily Christofides, Amy Muise, and Serge Desmarais. 2012. Hey mom, what’s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Social Psychological and Personality Science 3, 1 (2012), 48--54.
[9]
Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the 2005 Conference on Human Factors in Computing Systems, (CHI’05). ACM, 81--90.
[10]
Paul T. Costa and Robert R. McCrae. 2008. The revised neo personality inventory (neo-pi-r). The SAGE Handbook of Personality Theory and Assessment 2 (2008), 179--198.
[11]
European Union Parliament 8 Council. 2016. Regulation (EU) 2016/679. (April 2016). Retrieved October 28, 2016 from http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679.
[12]
Paul C. Cozby. 1973. Self-disclosure: A literature review. Psychological Bulletin 79, 2 (1973), 73.
[13]
Yves-Alexandre de Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D. Blondel. 2013. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports 3 (2013).
[14]
Yves-Alexandre de Montjoye, Laura Radaelli, Vivek Kumar Singh, and others. 2015. Unique in the shopping mall: On the reidentifiability of credit card metadata. Science 347, 6221 (2015), 536--539.
[15]
Yves-Alexandre de Montjoye, Erez Shmueli, Samuel S. Wang, and Alex Sandy Pentland. 2014. openPDS: Protecting the privacy of metadata through safeanswers. PloS ONE 9, 7 (2014), e98790.
[16]
Nathan Eagle, Michael Macy, and Rob Claxton. 2010. Network diversity and economic development. Science 328, 5981 (2010), 1029--1031.
[17]
T. Farma and I. Cortivonis. 2000. Un questionario sul “locus of control”: Suo utilizzo nel contesto italiano (A questionnaire on the locus of control: Its use in the italian context). Ricerca in Psicoterapia 2 (2000).
[18]
Joshua Fogel and Elham Nehmad. 2009. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 1 (2009), 153--160.
[19]
Leo A. Goodman and others. 1961. Snowball sampling. The Annals of Mathematical Statistics 32, 1 (1961), 148--170.
[20]
James William Hardin, Joseph M. Hilbe, and Joseph Hilbe. 2007. Generalized Linear Models and Extensions. Stata Press.
[21]
Mariea Grubbs Hoy and George Milne. 2010. Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising 10, 2 (2010), 28--45.
[22]
Gary Hsieh, Karen P. Tang, Wai Yong Low, and Jason I. Hong. 2007. Field deployment of IMBuddy: A study of privacy control and feedback mechanisms for contextual IM. In Ubiquitous Computing. Springer, 91--108.
[23]
Carlos Jensen, Colin Potts, and Christian Jensen. 2005. Privacy practices of internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies 63, 1 (2005), 203--227.
[24]
Iris A. Junglas, Norman A. Johnson, and Christiane Spitzmüller. 2008. Personality traits and concern for privacy: An empirical study in the context of location-based services. European Journal of Information Systems 17, 4 (2008), 387--402.
[25]
Bart P. Knijnenburg and Alfred Kobsa. 2013. Helping users with information disclosure decisions: Potential for adaptation. In Proceedings of the 2013 International Conference on Intelligent User Interfaces (IUI). ACM, 407--416.
[26]
Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Dimensionality of information disclosure behavior. International Journal of Human-Computer Studies 71, 12 (2013), 1144--1162.
[27]
Melinda Korzaan, Nita Brooks, and Timothy Greer. 2009. Demystifying personality and privacy: An empirical investigation into antecedents of concerns for information privacy. Journal of Behavioral Studies in Business 1 (2009), 1--17.
[28]
Nicholas D. Lane, Emiliano Miluzzo, Hong Lu, Daniel Peebles, Tanzeem Choudhury, and Andrew T. Campbell. 2010. A survey of mobile phone sensing. Communications Magazine, IEEE 48, 9 (2010), 140--150.
[29]
Marc Langheinrich. 2001. Privacy by design--principles of privacy-aware ubiquitous systems. In Proceedings of the International Conference on Ubiquitous Computing. Springer, 273--291.
[30]
Neal Lathia, Veljko Pejovic, Kiran K. Rachuri, Cecilia Mascolo, Mirco Musolesi, and Peter J. Rentfrow. 2013. Smartphones for large-scale behavior change interventions. IEEE Pervasive Computing 12, 3 (2013), 66--73.
[31]
Janice Lo. 2010. Privacy concern, locus of control, and salience in a trust-risk model of information disclosure on social networking sites. In Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, (AMCIS’10). Association for Information Systems, 110.
[32]
Anmol Madan, Manuel Cebrian, Sai Moturu, Katayoun Farrahi, and Alex Pentland. 2012. Sensing the “health state” of a community. IEEE Pervasive Computing 11, 4 (2012), 36--45.
[33]
Paolo Massa, Chiara Leonardi, Bruno Lepri, Fabio Pianesi, and Massimo Zancanaro. 2015. If you are happy and you know it, say “I’m here”: Investigating parents’ location-sharing preferences. In Proceedings of the 15th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT’15). Springer, 315--332.
[34]
Roger C. Mayer and James H. Davis. 1999. The effect of the performance appraisal system on trust for management: A field quasi-experiment. Journal of Applied Psychology 84, 1 (1999), 123.
[35]
Emiliano Miluzzo, Nicholas D. Lane, Kristóf Fodor, Ronald Peterson, Hong Lu, Mirco Musolesi, Shane B. Eisenman, Xiao Zheng, and Andrew T. Campbell. 2008. Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems. ACM, 337--350.
[36]
Corrado Moiso, Fabrizio Antonelli, and Michele Vescovi. 2012. How do I manage my personal data? - A telco perspective. In Proceedings of the International Conference on Data Technologies and Applications (DATA’12). SciTePress, 123--128.
[37]
Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, Jeff Burke, Deborah Estrin, Mark Hansen, and Ramesh Govindan. 2010. Personal data vaults: A locus of control for personal data streams. In Proceedings of the 6th International Conference on Emerging Networking EXperiments and Technologies (CoNEXT). ACM, 17.
[38]
Christos Perentis, Michele Vescovi, and Bruno Lepri. 2015. Investigating factors affecting personal data disclosure. In Proceedings of the 24th International Conference on World Wide Web (WWW’15). ACM, 89--90.
[39]
Marco Perugini and L. Di Blas. 2002. The Big Five Marker Scales (BFMS) and the Italian AB5C taxonomy: Analyses from an Emic-etic Perspective. Hogrefe 8 Huber Publishers.
[40]
The Mobile Territorial Lab project. 2012. Mobile Territorial Lab. (Nov. 2012). Retrieved October 28, 2016 from http://www.mobileterritoriallab.eu/.
[41]
Daniele Quercia, Diego B. Las Casas, João Paulo Pesce, David Stillwell, Michal Kosinski, Virgílio A. F. Almeida, and Jon Crowcroft. 2012. Facebook and privacy: The balancing act of personality, gender, and relationship currency. In Proceedings of the 6th International Conference on Weblogs and Social Media. AAAI Press.
[42]
Jeffrey Rosen. 2012. The right to be forgotten. Stanford Law Review Online 64 (2012), 88.
[43]
Luca Rossi and Mirco Musolesi. 2014. It’s the way you check-in: Identifying users in location-based social networks. In Proceedings of the 2nd ACM Conference on Online Social Networks (COSN’14). ACM, New York, NY, 215--226.
[44]
Luca Rossi and Mirco Musolesi. 2015. Spatio-temporal techniques for user identification by means of GPS mobility data. EPJ Data Science 4, 11 (August 2015).
[45]
Julian B. Rotter. 1966. Generalized expectancies for internal versus external control of reinforcement. Psychological Monographs: General and Applied 80, 1 (1966), 1.
[46]
Julian B. Rotter. 1967. A new scale for the measurement of interpersonal trust. Journal of Personality 35, 4 (1967), 651--665.
[47]
Johann Schrammel, Christina Köffel, and Manfred Tscheligi. 2009. Personality traits, usage patterns and information disclosure in online communities. In Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology. British Computer Society, 169--174.
[48]
H. Jeff Smith, Sandra J. Milberg, and Sandra J. Burke. 1996. Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly (1996), 167--196.
[49]
Jacopo Staiano, Nuria Oliver, Bruno Lepri, Rodrigo de Oliveira, Michele Caraviello, and Nicu Sebe. 2014. Money walks: A human-centric study on the economics of personal mobile data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 583--594.
[50]
Panagiotis Symeonidis and Christos Perentis. 2014. Link prediction in multi-modal social networks. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD’14). Springer, 147--162.
[51]
Karen P. Tang, Pedram Keyani, James Fogarty, and Jason I. Hong. 2006. Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proccedings of the SIGCHI Conference on Human Factors in Computer Systems. ACM, 93--102.
[52]
Michele Vescovi, Christos Perentis, Chiara Leonardi, Bruno Lepri, and Corrado Moiso. 2014. My data store: Toward user awareness and control on personal data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp’14 Adjunct). ACM, New York, NY, USA, 179--182.
[53]
Lawrence R. Wheeless and Jams Grotz. 1976. Conceptualization and measurement of reported self-disclosure. Human Communication Research 2, 4 (1976), 338--346.
[54]
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, and John Zimmerman. 2011. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing. ACM, 197--206.
[55]
Alyson L. Young and Anabel Quan-Haase. 2009. Information revelation and internet privacy concerns on social network sites: A case study of Facebook. In Proceedings of the 4th International Conference on Communities and Technologies. ACM, 265--274.

Cited By

View all
  • (2024)Online self-disclosure: An interdisciplinary literature review of 10 years of researchNew Media & Society10.1177/14614448241247313Online publication date: 10-May-2024
  • (2023)Personal Data Stores (PDS): A ReviewSensors10.3390/s2303147723:3(1477)Online publication date: 28-Jan-2023
  • (2022)Motivating Factors to Self-Disclosure on Social Media: A Systematic MappingIEEE Transactions on Professional Communication10.1109/TPC.2022.318442865:3(370-391)Online publication date: Sep-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 17, Issue 2
Special Issue on Advances in Social Computing and Regular Papers
May 2017
249 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3068849
  • Editor:
  • Munindar P. Singh
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 March 2017
Accepted: 01 November 2016
Revised: 01 October 2016
Received: 01 February 2016
Published in TOIT Volume 17, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Human factors
  2. living labs
  3. mobile sensing
  4. personal mobile data
  5. privacy
  6. social computing

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)36
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Online self-disclosure: An interdisciplinary literature review of 10 years of researchNew Media & Society10.1177/14614448241247313Online publication date: 10-May-2024
  • (2023)Personal Data Stores (PDS): A ReviewSensors10.3390/s2303147723:3(1477)Online publication date: 28-Jan-2023
  • (2022)Motivating Factors to Self-Disclosure on Social Media: A Systematic MappingIEEE Transactions on Professional Communication10.1109/TPC.2022.318442865:3(370-391)Online publication date: Sep-2022
  • (2021)An assessment framework for safeguarding public values on mobility platformsUrban Transformations10.1186/s42854-021-00023-33:1Online publication date: 7-Sep-2021
  • (2021)Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacyTechnological Forecasting and Social Change10.1016/j.techfore.2021.120681167(120681)Online publication date: Jun-2021
  • (2020)Learning From Others Without Sacrificing Privacy: Simulation Comparing Centralized and Federated Machine Learning on Mobile Health Data (Preprint)JMIR mHealth and uHealth10.2196/23728Online publication date: 21-Aug-2020
  • (2020)How does digital technology impact on the co-production of local services? Evidence from a childcare experiencePublic Money & Management10.1080/09540962.2020.1728066(1-11)Online publication date: 20-Feb-2020
  • (2020)Privacy concerns about personalized advertising across multiple social media platforms in Japan: the relationship with information control and persuasion knowledgeInternational Journal of Advertising10.1080/02650487.2020.1796322(1-21)Online publication date: 24-Jul-2020
  • (2020)Between privacy and security: the factors that drive intentions to use cyber-security applicationsBehaviour & Information Technology10.1080/0144929X.2020.1781259(1-15)Online publication date: 29-Jun-2020
  • (2018)An information-aware visualization for privacy-preserving accelerometer data sharingHuman-centric Computing and Information Sciences10.1186/s13673-018-0137-68:1(1-28)Online publication date: 1-Dec-2018
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media