Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2536853.2536861acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings

Published: 02 December 2013 Publication History

Abstract

Mobile phones are increasingly leveraged as sensor platforms to collect information about user's context. The collected sensor readings can however reveal personal and sensitive information about the users and hence put their privacy at stake. In prior work, we have proposed different user interfaces allowing users to select the degree of granularity at which the sensor readings are shared in order to protect their privacy. In this paper, we aim at further increasing user awareness about potential privacy risks and investigate the introduction of picture-based warnings based on their current privacy settings. Depending on their privacy conception and the proposed warnings, users can then adapt their settings or leave them unchanged. We evaluate the picture-based warnings by conducting a user study involving 30 participants. The results show that more than 70% of the participants would change their settings after having seen the picture-based warnings.

References

[1]
The ObscuraCam Application. Online: https://play.google.com (accessed in 06.2012).
[2]
The PrivacyCamera Application. Online: https://play.google.com (accessed in 06.2012).
[3]
S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair. Over-Exposed? Privacy Patterns and Considerations in Online and Mobile Photo Sharing. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 357--366, 2007.
[4]
Apple Inc. Apple Apps on the App Store. Online: http://www.apple.com/iphone/from-the-app-store/ (accessed in 05.2013), 2013.
[5]
A. Besmer, J. Watson, and H. R. Lipford. The Impact of Social Navigation on Privacy Policy Configuration. In Proceedings of the 6th ACM Symposium on Usable Privacy and Security (SOUPS), pages 7:1--7:10. ACM, 2010.
[6]
M. Bilandzic, M. Banholzer, D. Peev, V. Georgiev, F. Balagtas-Fernandez, and A. De Luca. Laermometer: A Mobile Noise Mapping Application. In Proceedings of the 5th ACM Nordic Conference on Human-Computer Interaction (NordiCHI), pages 415--418, 2008.
[7]
C. Bravo-Lillo, L. F. Cranor, J. Downs, and S. Komanduri. Bridging the Gap in Computer Security Warnings: A Mental Model Approach. IEEE Security & Privacy, 9(2):18--26, 2011.
[8]
A. Brush, J. Krumm, and J. Scott. Exploring End User Preferences for Location Obfuscation, Location-based Services, and the Value of Location. In Proceedings of the 12th ACM International Conference on Ubiquitous Computing (Ubicomp), pages 95--104, 2010.
[9]
L. Cai and H. Chen. TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion. In Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec), pages 9--9, 2011.
[10]
CBC News. Depressed Woman Loses Benefits over Facebook Photos. Online: http://www.cbc.ca (accessed in 05.2013), 2009.
[11]
CBS News. Did the Internet Kill Privacy? Facebook Photos Lead to a Teacher Losing her Job; What Expectations of Privacy Exist in the Digital Era? Online: http://www.cbsnews.com (accessed in 05.2013), 2011.
[12]
D. Christin, C. Büchner, and N. Leibecke. What's the Value of Your Privacy? Exploring Factors That Influence Privacy-sensitive Contributions to Participatory Sensing Applications. In Proceedings of the IEEE Workshop on Privacy and Anonymity for the Digital Economy (LCN Workshop), 2013.
[13]
D. Christin, A. Reinhardt, M. Hollick, and K. Trumpold. Exploring User Preferences for Privacy Interfaces in Mobile Sensing Applications. In Proceedings of 11th ACM International Conference on Mobile and Ubiquitous Multimedia (MUM), pages 14:1--14:10, 2012.
[14]
D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick. A Survey on Privacy in Mobile Participatory Sensing Applications. Journal of Systems and Software, 84(11):1928--1946, 2011.
[15]
S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 81--90, 2005.
[16]
L. F. Cranor, P. Guduru, and M. Arjula. User Interfaces for Privacy Agents. ACM Transactions on Computer-Human Interacteration (TOCHI), 13:135--178, 2006.
[17]
M. O. Derawi, C. Nickel, P. Bours, and C. Busch. Unobtrusive User-authentication on Mobile Phones using Biometric Gait. In Proceeding of the 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pages 306--311, 2010.
[18]
S. Egelman, L. F. Cranor, and J. Hong. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In Proceedings of the SIGCHI/ACM Conference on Human Factors in Computing Systems (CHI), pages 1065--1074, New York, NY, USA, 2008.
[19]
N. S. Good and A. Krekelberg. Usability and Privacy: A Study of Kazaa P2P File-sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 137--144, 2003.
[20]
Google Inc. Google Play Store. Online: https://play.google.com (accessed in 05.2013), 2013.
[21]
N. Győrbíró, Á. Fábián, and G. Hományi. An Activity Recognition System for Mobile Phones. Mobile Networks and Applications, 14(1):82--91, 2009.
[22]
J. Han, E. Owusu, L. Nguyen, A. Perrig, and J. Zhang. ACComplice: Location Inference using Accelerometers on Smartphones. In 4th International Conference on Communication Systems and Networks (COMSNETS), pages 1--9, 2012.
[23]
International Communication Union. The World in 2013: ICT Facts and Figures. Online: http://www.itu.int (accessed in 05.2013), 2013.
[24]
P. Klasnja, S. Consolvo, T. Choudhury, R. Beckwith, and J. Hightower. Exploring Privacy Concerns about Personal Sensing. In Proceedings of the 7th International Conference on Pervasive Computing (Pervasive), pages 176--183, 2009.
[25]
J. Krumm. Inference Attacks on Location Tracks. In Proceedings of the 5th IEEE International Conference on Pervasive Computing (Pervasive), pages 127--143, 2007.
[26]
J. R. Kwapisz, G. M. Weiss, and S. A. Moore. Activity Recognition using Cell Phone Accelerometers. SIGKDD Explorations Newsletter, 12:74--82, 2011.
[27]
S. Lederer, I. Hong, K. Dey, and A. Landay. Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal Ubiquitous Computing, 8(6):440--454, 2004.
[28]
H. R. Lipford, J. Watson, M. Whitney, K. Froiland, and R. W. Reeder. Visual vs. Compact: A Comparison of Privacy Policy Interfaces. In Proceedings of the 28th International ACM Conference on Human Factors in Computing Systems (CHI), pages 1111--1114, 2010.
[29]
H. Lu, W. Pan, N. D. Lane, T. Choudhury, and A. T. Campbell. SoundSense: Scalable Sound Sensing for People-centric Applications on Mobile Phones. In Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 165--178, 2009.
[30]
P. Mohan, V. Padmanabhan, and R. Ramjee. Nericell: Rich Monitoring of Road and Traffic Conditions using Mobile Smartphones. In Proceedings of the 6th A CM Conference on Embedded Network Sensor Systems (SenSys), pages 323--336, 2008.
[31]
V. Peltonen, J. Tuomi, A. Klapuri, J. Huopaniemi, and T. Sorsa. Computational Auditory Scene Recognition. In Proceedings of the 27th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), volume 2, pages II--1941--II--1944, 2002.
[32]
F. Y. Rashid. Facial-Recognition Tools, Facebook Photos Threaten End to Anonymity: Study. Online: http://www.eweek.com, Aug. 2011.
[33]
S. Reddy, A. Parker, J. Hyman, J. A. Burke, D. Estrin, and M. Hansen. Image Browsing, Processing, and Clustering for Participatory Sensing: Lessons from a DietSense Prototype. In Proceedings of the 4th Workshop on Embedded Networked Sensors (EmNets), pages 13--17, 2007.
[34]
K. Shilton. Four Billion Little Brothers?: Privacy, Mobile Phones, and Ubiquitous Data Collection. Communications of the ACM, 52(11):48--53, 2009.
[35]
K. Strater and H. R. Lipford. Strategies and Struggles with Privacy in an Online Social Networking Community. In Proceedings of the 22nd British HCI Group Annual Conference on People and Computers (BCS-HCI), volume 1, pages 111--119, 2008.
[36]
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM), pages 399--416, Berkeley, CA, USA, 2009. USENIX Association.

Cited By

View all
  • (2024)PrivXR: A Cross-Platform Privacy-Preserving API and Privacy Panel for Extended Reality2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops59983.2024.10503341(417-420)Online publication date: 11-Mar-2024
  • (2024)User profile visualisation for privacy awareness on Geo-Social NetworksJournal of Location Based Services10.1080/17489725.2024.2399512(1-35)Online publication date: 26-Sep-2024
  • (2024)Read or skip privacy policies when installing apps on wearable devices: the roles of perceived necessity and threat cluesHumanities and Social Sciences Communications10.1057/s41599-024-02989-411:1Online publication date: 24-May-2024
  • Show More Cited By

Index Terms

  1. Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        MoMM '13: Proceedings of International Conference on Advances in Mobile Computing & Multimedia
        December 2013
        599 pages
        ISBN:9781450321068
        DOI:10.1145/2536853
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        In-Cooperation

        • @WAS: International Organization of Information Integration and Web-based Applications and Services

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 02 December 2013

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Mobile Computing
        2. Participatory Sensing
        3. Privacy

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        MoMM '13

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)16
        • Downloads (Last 6 weeks)2
        Reflects downloads up to 21 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)PrivXR: A Cross-Platform Privacy-Preserving API and Privacy Panel for Extended Reality2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops59983.2024.10503341(417-420)Online publication date: 11-Mar-2024
        • (2024)User profile visualisation for privacy awareness on Geo-Social NetworksJournal of Location Based Services10.1080/17489725.2024.2399512(1-35)Online publication date: 26-Sep-2024
        • (2024)Read or skip privacy policies when installing apps on wearable devices: the roles of perceived necessity and threat cluesHumanities and Social Sciences Communications10.1057/s41599-024-02989-411:1Online publication date: 24-May-2024
        • (2023)Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of ThingsACM Transactions on Internet of Things10.1145/36000964:3(1-34)Online publication date: 7-Jun-2023
        • (2022)Enhanced Privacy in Smart Workplaces: Employees’ Preferences for Transparency Indicators and Control Interactions in the Case of Data Collection with Smart WatchesICT Systems Security and Privacy Protection10.1007/978-3-031-06975-8_3(34-50)Online publication date: 3-Jun-2022
        • (2021)Usable Differential Privacy for the Internet-of-Things2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops51409.2021.9431047(426-427)Online publication date: 22-Mar-2021
        • (2021)Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awarenessTelematics and Informatics10.1016/j.tele.2021.10159261(101592)Online publication date: Aug-2021
        • (2021)Transferring recommendations through privacy user models across domainsUser Modeling and User-Adapted Interaction10.1007/s11257-021-09307-632:1-2(25-90)Online publication date: 8-Nov-2021
        • (2021)Information Privacy AwarenessEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1484-1(1-3)Online publication date: 28-Jan-2021
        • (2020)Are my Apps Peeking? Comparing Nudging Mechanisms to Raise Awareness of Access to Mobile Front-facing CameraProceedings of the 19th International Conference on Mobile and Ubiquitous Multimedia10.1145/3428361.3428384(186-190)Online publication date: 22-Nov-2020
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media