Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2785830.2785845acmconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
research-article

Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions

Published: 24 August 2015 Publication History

Abstract

Through a controlled online experiment with 447 Android phone users using their own devices, we investigated how empowering users with information-disclosure control and enhancing their ads awareness affect their installation behaviors, information disclosure, and privacy perceptions toward different mobile apps. In the 3 (control: no, low, high) x 2 (ads awareness: absent, present) x 3 (app context: Wallpaper, BusTracker, Flashlight) fractional factorial between-subjects experiment, we designed privacy notice dialogs that simulate real Android app pre-installation privacy-setting interfaces to implement and manipulate control and ads awareness. Our findings suggest that empowering users with control over information disclosure and enhancing their ads awareness before installation effectively help them make better privacy decisions, increase their likelihood of installing an app, and improve their perceptions of the app. Implications for designing mobile apps' privacy notice dialogs and potential separate-ads-control solutions are discussed.

References

[1]
Amadeo, R. App ops: Android 4.3's hidden app permission manager, control permissions for individual apps! http://goo.gl/aV9VaI, 2013.
[2]
Balebako, R., and Cranor, L. Improving app privacy: Nudging app developers to protect user privacy. Security & Privacy, IEEE 12, 4 (2014), 55--58.
[3]
Balebako, R., Jung, J., Lu, W., Cranor, L. F., and Nguyen, C. Little brothers watching you: Raising awareness of data leaks on smartphones. In Proc. SOUPS '13, ACM (2013), 12.
[4]
Barnes, S. B. A privacy paradox: Social networking in the united states. First Monday 11, 9 (2006).
[5]
Beresford, A. R., Rice, A., Skehin, N., and Sohan, R. Mockdroid: trading privacy for application functionality on smartphones. In Proc. HotMobile '11, ACM (2011), 49--54.
[6]
Besmer, A., Lipford, H. R., Shehab, M., and Cheek, G. Social applications: exploring a more secure framework. In Proc. SOUPS'09, ACM (2009), 2.
[7]
Culnan, M. J., and Armstrong, P. K. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science 10, 1 (1999), 104--115.
[8]
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS) 32, 2 (2014), 5.
[9]
Enck, W., Octeau, D., McDaniel, P., and Chaudhuri, S. A study of android application security. In USENIX security symposium, vol. 2 (2011), 2.
[10]
Feldman, S., and Stenner, K. Perceived threat and authoritarianism. Political Psychology 18, 4 (1997), 741--770.
[11]
Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D. Android permissions demystified. In Proc. CCS'11, ACM (2011), 627--638.
[12]
Felt, A. P., Egelman, S., and Wagner, D. I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns. In Proc. CCS workshop on SPSM '12, ACM (2012), 33--44.
[13]
Felt, A. P., Finifter, M., Chin, E., Hanna, S., and Wagner, D. A survey of mobile malware in the wild. In Proc. CCS workshop on SPSM '11, ACM (2011), 3--14.
[14]
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and Wagner, D. Android permissions: User attention, comprehension, and behavior. In Proc. SOUPS'12, ACM (2012), 3.
[15]
Gilbert, P., Chun, B.-G., Cox, L. P., and Jung, J. Vision: automated security validation of mobile apps at app markets. In Proc. MCS '14, ACM (2011), 21--26.
[16]
Grace, M. C., Zhou, W., Jiang, X., and Sadeghi, A.-R. Unsafe exposure analysis of mobile in-app advertisements. In WISEC'12, ACM (2012), 101--112.
[17]
Han, J., Yan, Q., Gao, D., Zhou, J., and Deng, R. Comparing mobile privacy protection through cross-platform applications.
[18]
Henderson, R., and Divett, M. J. Perceived usefulness, ease of use and electronic supermarket use. International Journal of Human-Computer Studies 59, 3 (2003), 383--395.
[19]
Kalyanaraman, S., and Sundar, S. S. The psychological appeal of personalized content in web portals: does customization affect attitudes and behavior? Journal of Communication 56, 1 (2006), 110--132.
[20]
Kelley, P. G., Consolvo, S., Cranor, L. F., Jung, J., Sadeh, N., and Wetherall, D. A conundrum of permissions: installing applications on an android smartphone. In Proc. FC '12. Springer, 2012, 68--79.
[21]
Kelley, P. G., Cranor, L. F., and Sadeh, N. Privacy as part of the app decision-making process. In Proc. CHI'13, ACM (2013), 3393--3402.
[22]
Kittur, A., Chi, E. H., and Suh, B. Crowdsourcing user studies with mechanical turk. In Proc. CHI '08, ACM (2008), 453--456.
[23]
Liccardi, I., Pato, J., and Weitzner, D. J. Improving user choice through better mobile apps transparency and permissions analysis. Journal of Privacy and Confidentiality 5, 2 (2014), 1.
[24]
Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., and Zhang, J. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proc. Ubicomp '12, ACM (2012), 501--510.
[25]
Liu, B., Liu, B., Jin, H., and Govindan, R. Efficient privilege de-escalation for ad libraries in mobile apps. In Proc. MobiSys '15, ACM (2015), 89--103.
[26]
Loeb, S. A whopping 70 billion apps to be downloaded in 2013!, 2013. Retrieved May 10, 2015 from http://goo.gl/LIKIBw.
[27]
Madden, M., Lenhart, A., Cortesi, S., and Gasser, U. Teens and mobile apps privacy. Pew Internet and American Life Project (2013).
[28]
Malhotra, N. K., Kim, S. S., and Agarwal, J. Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model. Information Systems Research 15, 4 (2004), 336--355.
[29]
Metzger, M. J. Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Communication Research 33, 3 (2006), 155--179.
[30]
Nauman, M., Khan, S., and Zhang, X. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Proc. ASIACCS '10, ACM (2010), 328--332.
[31]
Nissenbaum, H. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press, 2009.
[32]
Pearce, P., Felt, A. P., Nunez, G., and Wagner, D. Addroid: Privilege separation for applications and advertisers in android. In ACSAC'12, ACM (2012), 71--72.
[33]
Sheehan, K. B., and Hoy, M. G. Dimensions of privacy concern among online consumers. Journal of public policy & marketing 19, 1 (2000), 62--73.
[34]
Smith, A. U.s. smartphone use in 2015, 2015. Retrieved May 10, 2015 from http://www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/.
[35]
Tan, J., Nguyen, K., Theodorides, M., Negrón-Arroyo, H., Thompson, C., Egelman, S., and Wagner, D. The effect of developer-specified explanations for permission requests on smartphone user behavior. In Proc. CHI'14, ACM (2014), 91--100.
[36]
Thurm, S., and Kane, Y. I. Your apps are watching you. The Wall Street Journal 17 (2010).
[37]
Tsai, J. Y., Kelley, P. G., Cranor, L. F., and Sadeh, N. Location-sharing technologies: Privacy risks and controls. ISJLP 6 (2010), 119.
[38]
Wang, N., Grossklags, J., and Xu, H. An online experiment of privacy authorization dialogues for social applications. In Proc. CSCW '13, ACM (2013), 261--272.
[39]
Wang, N., Wisniewski, P., Xu, H., and Grossklags, J. Designing the default privacy settings for facebook applications. In Proc. CSCW'14, ACM (2014), 249--252.
[40]
Wetherall, D., Choffnes, D., Greenstein, B., Han, S., Hornyack, P., Jung, J., Schechter, S., and Wang, X. Privacy revelations for web and mobile apps. In Proc. 13th USENIX HotOS (2011), 21.
[41]
Xu, H., Wang, N., and Grossklags, J. Privacy by redesign: Alleviating privacy concerns for third-party apps. In Proc. ICIS '12 (2012).
[42]
Zarmpou, T., Saprikis, V., Markos, A., and Vlachopoulou, M. Modeling users acceptance of mobile services. Electronic Commerce Research 12, 2 (2012), 225--248.

Cited By

View all
  • (2024)Understanding Users' Perspectives on Location Privacy Management on iPhonesProceedings of the ACM on Human-Computer Interaction10.1145/36765298:MHCI(1-25)Online publication date: 24-Sep-2024
  • (2024)Privacy Slider: Fine-Grain Privacy Control for SmartphonesProceedings of the ACM on Human-Computer Interaction10.1145/36765198:MHCI(1-31)Online publication date: 24-Sep-2024
  • (2022)Response to Regulation of Technology: A Multi-Industry Perspectiveundefined10.12794/metadc1987004Online publication date: Aug-2022
  • Show More Cited By

Index Terms

  1. Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobileHCI '15: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services
      August 2015
      611 pages
      ISBN:9781450336529
      DOI:10.1145/2785830
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 August 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Ads Awareness
      2. Android
      3. Control
      4. Mobile
      5. Notice and Consent
      6. Privacy
      7. Third-Party Applications (Apps)

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      MobileHCI '15
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 202 of 906 submissions, 22%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)33
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 08 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Understanding Users' Perspectives on Location Privacy Management on iPhonesProceedings of the ACM on Human-Computer Interaction10.1145/36765298:MHCI(1-25)Online publication date: 24-Sep-2024
      • (2024)Privacy Slider: Fine-Grain Privacy Control for SmartphonesProceedings of the ACM on Human-Computer Interaction10.1145/36765198:MHCI(1-31)Online publication date: 24-Sep-2024
      • (2022)Response to Regulation of Technology: A Multi-Industry Perspectiveundefined10.12794/metadc1987004Online publication date: Aug-2022
      • (2022)Two Essays Examining the Effects of AIVA Search on Cognition, Emotion and Choiceundefined10.12794/metadc1944351Online publication date: May-2022
      • (2022)Digital NudgingProceedings of the 2022 Computers and People Research Conference10.1145/3510606.3550211(1-10)Online publication date: 2-Jun-2022
      • (2022)A Study of User Concerns about Smartphone Privacy2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955623(1-8)Online publication date: 24-Oct-2022
      • (2021)Influencing User’s Behavior Concerning Android Privacy PolicyMobile Information Systems10.1155/2021/34527002021Online publication date: 1-Jan-2021
      • (2021)Examining Power Use and the Privacy Paradox between Intention vs. Actual Use of Mobile ApplicationsProceedings of the 2021 European Symposium on Usable Security10.1145/3481357.3481513(223-235)Online publication date: 11-Oct-2021
      • (2020)Enhancing privacy through the visual design of privacy noticesProceedings of the Sixteenth USENIX Conference on Usable Privacy and Security10.5555/3488905.3488928(437-456)Online publication date: 10-Aug-2020
      • (2020)Out of Control – Privacy Calculus and the Effect of Perceived Control and Moral Considerations on the Usage of IoT Healthcare DevicesFrontiers in Psychology10.3389/fpsyg.2020.58205411Online publication date: 11-Nov-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media