Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2406367.2406385acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmumConference Proceedingsconference-collections
research-article

Exploring user preferences for privacy interfaces in mobile sensing applications

Published: 04 December 2012 Publication History

Abstract

By leveraging smartphones as sensing platforms, mobile sensing applications can collect information in an unprecedented quantity and granularity. The transmission of unprocessed sensor readings can, however, pose severe threats to the users' privacy. To protect their privacy, users can apply filters to eliminate privacy-sensitive elements of the sensor readings prior to transmission. The resulting privacy protection depends on the configuration of these filters, which is controlled by the users through a privacy interface. In this paper, we study interface elements for the realization of this interface in order to foster its acceptance and maximize the efficacy of the provided privacy protection. To this end, we have implemented six graphical privacy interfaces, which have been evaluated by 80 participants of our user study. The results show a preference of the users towards differently colored and sized elements to visualize the current level of privacy protection and define their preferred privacy settings.

References

[1]
The ObscuraCam Application. Online: https://play.google.com (accessed in 06.2012).
[2]
The PrivacyCamera Application. Online: https://play.google.com (accessed in 06.2012).
[3]
A. Adams and M. Sasse. Users Are Not the Enemy. Communications of the ACM, 42(12):40--46, 1999.
[4]
A. Brush, J. Krumm, and J. Scott. Exploring End User Preferences for Location Obfuscation, Location-based Services, and the Value of Location. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing (Ubicomp), pages 95--104, 2010.
[5]
D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick. A Survey on Privacy in Mobile Participatory Sensing Applications. Journal of Systems and Software, 84(11):1928--1946, 2011.
[6]
L. F. Cranor, P. Guduru, and M. Arjula. User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interacteration (TOCHI), 13:135--178, 2006.
[7]
T. Das, P. Mohan, V. N. Padmanabhan, R. Ramjee, and A. Sharma. PRISM: Platform for Remote Sensing using Smartphones. In Proceedings of the 8th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 63--76, 2010.
[8]
A. H. Emanuel von Zezschwitz. Towards Privacy-Aware Mobile Device Sharing. In 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), 2012.
[9]
N. S. Good and A. Krekelberg. Usability and Privacy: A Study of Kazaa P2P File-sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 137--144, 2003.
[10]
N. Győrbíró, Á. Fábián, and G. Hományi. An Activity Recognition System for Mobile Phones. Mobile Networks and Applications, 14(1):82--91, 2009.
[11]
L. Jedrzejczyk, B. A. Price, A. Bandara, and B. Nuseibeh. "Privacy-shake": A Haptic Interface for Managing Privacy Settings in Mobile Location Sharing Applications. In Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI), pages 411--412, 2010.
[12]
A. K. Karlson, A. B. Brush, and S. Schechter. Can I Borrow Your Phone?: Understanding Concerns When Sharing Mobile Phones. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 1647--1650, 2009.
[13]
P. Klasnja, S. Consolvo, T. Choudhury, R. Beckwith, and J. Hightower. Exploring Privacy Concerns about Personal Sensing. Pervasive Computing, pages 176--183, 2009.
[14]
H. Lipford, A. Besmer, and J. Watson. Understanding Privacy Settings in Facebook with an Audience View. In Proceedings of the 1st Conference on Usability, Psychology, and Security (UPSEC), pages 1--8, 2008.
[15]
H. Lu, W. Pan, N. Lane, T. Choudhury, and A. Campbell. SoundSense: Scalable Sound Sensing for People-centric Applications on Mobile Phones. In Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 165--178, 2009.
[16]
P. Mohan, V. Padmanabhan, and R. Ramjee. Nericell: Rich Monitoring of Road and Traffic Conditions using Mobile Smartphones. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys), pages 323--336, 2008.
[17]
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: Password Inference Using Accelerometers on Smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications (HotMobile), pages 9:1--9:6, 2012.
[18]
R. Rana, C. Chou, S. Kanhere, N. Bulusu, and W. Hu. Ear-Phone: An End-to-end Participatory Urban Noise Mapping System. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pages 105--116, 2010.
[19]
B. N. Schilit, A. LaMarca, G. Borriello, W. G. Griswold, D. McDonald, E. Lazowska, A. Balachandran, J. Hong, and V. Iverson. Challenge: Ubiquitous Location-aware Computing and the "Place Lab" Initiative. In Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), pages 29--35, 2003.
[20]
A. Whitten and J. Tygar. Why Johnny can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium (SSYM), pages 14--29, 1999.

Cited By

View all
  • (2023)Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of ThingsACM Transactions on Internet of Things10.1145/36000964:3(1-34)Online publication date: 7-Jun-2023
  • (2022)Study on Recent disputed of Internet of Things (IoT) in Wearable Technologies2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)10.1109/AISP53593.2022.9760593(1-4)Online publication date: 12-Feb-2022
  • (2022)Passive social sensing with smartphones: a systematic reviewComputing10.1007/s00607-022-01112-2105:1(29-51)Online publication date: 12-Aug-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MUM '12: Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
December 2012
383 pages
ISBN:9781450318150
DOI:10.1145/2406367
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • University of Duisburg-Essen

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 December 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile sensing applications
  2. privacy interfaces
  3. user study

Qualifiers

  • Research-article

Conference

MUM '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 190 of 465 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)2
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of ThingsACM Transactions on Internet of Things10.1145/36000964:3(1-34)Online publication date: 7-Jun-2023
  • (2022)Study on Recent disputed of Internet of Things (IoT) in Wearable Technologies2022 2nd International Conference on Artificial Intelligence and Signal Processing (AISP)10.1109/AISP53593.2022.9760593(1-4)Online publication date: 12-Feb-2022
  • (2022)Passive social sensing with smartphones: a systematic reviewComputing10.1007/s00607-022-01112-2105:1(29-51)Online publication date: 12-Aug-2022
  • (2022)Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart WatchesICT Systems Security and Privacy Protection10.1007/978-3-031-06975-8_3(34-50)Online publication date: 3-Jun-2022
  • (2020)Psychological Effects and Their Role in Online Privacy Interactions: A ReviewIEEE Access10.1109/ACCESS.2020.29695628(21236-21260)Online publication date: 2020
  • (2019)OmniWedges: Improved Radar-Based Audience Selection for Social NetworksHuman-Computer Interaction – INTERACT 201910.1007/978-3-030-29390-1_56(654-658)Online publication date: 23-Aug-2019
  • (2018)Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?2018 IEEE Symposium on Privacy-Aware Computing (PAC)10.1109/PAC.2018.00015(86-94)Online publication date: Sep-2018
  • (2018)Opportunities and Risks of Delegating Sensing Tasks to the CrowdHandbook of Mobile Data Privacy10.1007/978-3-319-98161-1_6(129-165)Online publication date: 27-Oct-2018
  • (2017)URetail16th IFIP TC 13 International Conference on Human-Computer Interaction --- INTERACT 2017 - Volume 1051610.1007/978-3-319-68059-0_54(473-477)Online publication date: 25-Sep-2017
  • (2014)Usable Privacy for Mobile Sensing ApplicationsProceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 850110.1007/978-3-662-43826-8_7(92-107)Online publication date: 2-Jul-2014
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media