Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Where You Go Matters: A Study on the Privacy Implications of Continuous Location Tracking

Published: 18 December 2020 Publication History

Abstract

Data gathered from smartphones enables service providers to infer a wide range of personal information about their users, such as their traits, their personality, and their demographics. This personal information can be made available to third parties, such as advertisers, sometimes unbeknownst to the users. Leveraging location information, advertisers can serve ads micro-targeted to users based on the places they visited. Understanding the types of information that can be extracted from location data and implications in terms of user privacy is of critical importance.
In this context, we conducted an extensive in-the-wild research study to shed light on the range of personal information that can be inferred from the places visited by users, as well as privacy sensitivity of the personal information. To this end, we developed TrackingAdvisor, a mobile application that continuously collects user location and extracts personal information from it. The app also provides an interface to give feedback about the relevance of the personal information inferred from location data and its corresponding privacy sensitivity. Our findings show that, while some personal information such as social activities is not considered private, other information such as health, religious belief, ethnicity, political opinions, and socio-economic status is considered private by the participants of the study. This study paves the way to the design of privacy-preserving systems that provide contextual recommendations and explanations to help users further protect their privacy by making them aware of the consequences of sharing their personal data.

References

[1]
Foursquare. https://foursquare.com.
[2]
Yuvraj Agarwal and Malcolm Hall. ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices using Crowdsourcing. In ACM MobiSys, pages 97--110, Taipei, Taiwan, June 2013. ACM.
[3]
Laura Alessandretti, Piotr Sapiezynski, Vedran Sekara, Sune Lehmann, and Andrea Baronchelli. Evidence for a Conserved Quantity in Human Mobility. Nature Human Behaviour, 2(7):485--491, 2018.
[4]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. In ACM CHI, pages 787--796, Seoul, Republic of Korea, April 2015. ACM.
[5]
Sören Auer, Christian Bizer, Georgi Kobilarov, Jens Lehmann, Richard Cyganiak, and Zachary Ives. DBPedia: A nucleus for a web of open data. In The semantic web, pages 722--735. Springer, 2007.
[6]
Louise Barkhuus and Anind K Dey. Location-Based Services for Mobile Telephony: A Study of Users' Privacy Concerns. In INTERACT, volume 3, pages 702--712, Zurich, Switzerland, 2003. IFIP.
[7]
Benjamin Baron and Mirco Musolesi. Interpretable Machine Learning for Privacy-Preserving Pervasive Systems. IEEE Pervasive Computing, 19(01):73--82, January 2020.
[8]
Bin Bi, Milad Shokouhi, Michal Kosinski, and Thore Graepel. Inferring the Demographics of Search Users: Social Data Meets Search Queries. In WWW, pages 131--140, Rio de Janeiro, Brazil, May 2013. ACM.
[9]
Steven Bird and Edward Loper. NLTK: The Natural Language toolkit. In ACL, page 31, Barcelona, Spain, July 2004. Association for Computational Linguistics.
[10]
AJ Brush, John Krumm, and James Scott. Exploring End-User Preferences for Location Obfuscation, Location-Based Services, and the Value of Location. In ACM UbiComp, pages 95--104, Copenhagen, Denmark, September 2010. ACM.
[11]
Luca Canzian and Mirco Musolesi. Trajectories of Depression: Unobtrusive Monitoring of Depressive States by Means of Smartphone Mobility Traces Analysis. In ACM UbiComp, pages 1293--1304, Osaka, Japan, September 2015. ACM.
[12]
Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I Hong, and Yuvraj Agarwal. Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones. ACM IMWUT, 1(3):42, 2017.
[13]
Martin J Chorley, Roger M Whitaker, and Stuart M Allen. Personality and Location-Based Social Networks. Computers in Human Behavior, 46:45--56, 2015.
[14]
Sunny Consolvo, Ian E Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In ACM CHI, pages 81--90, Portland, OR, USA, April 2005. ACM.
[15]
Mihaly Csikszentmihalyi and Reed Larson. Validity and Reliability of the Experience-sampling Method. In Flow and the foundations of positive psychology, pages 35--54. Springer, 2014.
[16]
Aron Culotta, Nirmal Kumar Ravi, and Jennifer Cutler. Predicting the Demographics of Twitter Users from Website Traffic Data. In AAAI, pages 72--78, Austin, TX, USA, January 2015. AAAI Press.
[17]
Dan Cvrcek, Marek Kumpost, Vashek Matyas, and George Danezis. A Study on the Value of Location Privacy. In ACM WPES, pages 109--118, Alexandria, VA, USA, October 2006. ACM.
[18]
George Danezis, Stephen Lewis, and Ross J Anderson. How Much is Location Privacy Worth? In WEIS, volume 5, 2005.
[19]
Yves-Alexandre De Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. Unique in the Crowd: The Privacy Bounds of Human Mobility. Scientific reports, 3:1376, 2013.
[20]
Riccardo Di Clemente, Miguel Luengo-Oroz, Matias Travizano, Sharon Xu, Bapu Vaitla, and Marta C González. Sequences of Purchases in Credit Card Data Reveal Life Styles in Urban Populations. Nature communications, 9, 2018.
[21]
EU Directive. 95/46/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the EC, 23(6), 1995.
[22]
EU Directive. Article 4 (2). General Data Protection Regulation (GDPR), 2018.
[23]
Finale Doshi-Velez and Been Kim. Towards a Rigorous Science of Interpretable Machine Learning. arXiv preprint arXiv:1702.08608, 2017.
[24]
Cynthia Dwork. Differential Privacy: A Survey of Results. In International Conference on Theory and Applications of Models of Computation, pages 1--19. Springer, 2008.
[25]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. Android Permissions: User Attention, Comprehension, and Behavior. In ACM SOUPS, page 14, Washington, DC, USA, July 2012. ACM.
[26]
Joseph L Fleiss. Measuring Nominal Scale Agreement Among Many Raters. Psychological bulletin, 76(5):378, 1971.
[27]
Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez. Show Me How You Move and I Will Tell You Who You Are. In ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, pages 34--41, San Jose, CA, USA, November 2010. ACM.
[28]
Erving Goffman et al. The Presentation of Self in Everyday Life. Harmondsworth London, 1959.
[29]
Jennifer Golbeck and Matthew Louis Mauriello. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns. Future Internet, 8(2):9, 2016.
[30]
Marta C Gonzalez, Cesar A Hidalgo, and Albert-Laszlo Barabasi. Understanding Individual Human Mobility Patterns. nature, 453(7196):779, 2008.
[31]
Thore Graepel, Joaquin Quinonero Candela, Thomas Borchert, and Ralf Herbrich. Web-Scale Bayesian Click-Through Rate Prediction for Sponsored Search Advertising in Microsoft's Bing Search Engine. In ICML, Haifa, Israel, June 2010.
[32]
Marco Gruteser and Xuan Liu. Protecting Privacy, in Continuous Location-Tracking Applications. IEEE Security & Privacy, 2(2):28--34, 2004.
[33]
Ramanathan Guha, Vineet Gupta, Vivek Raghunathan, and Ramakrishnan Srikant. User Modeling for a Personal Assistant. In ACM WSDM, pages 275--284, Shanghai, China, February 2015. ACM.
[34]
Mordechai Haklay and Patrick Weber. OpenStreetMap: User-generated Street Maps. IEEE Pervasive Computing, 7(4):12--18, 2008.
[35]
Ramaswamy Hariharan and Kentaro Toyama. Project Lachesis: Parsing and Modeling Location Histories. In GIScience, pages 106--124, Adelphi, MD, USA, October 2004. Springer.
[36]
John A Hartigan and Manchek A Wong. Algorithm AS 136: A k-means Clustering Algorithm. Journal of the Royal Statistical Society. Series C (Applied Statistics), 28(1):100--108, 1979.
[37]
Iris A Junglas and Richard T Watson. Location-Based Services. Communications of the ACM, 51(3):65--69, 2008.
[38]
Ashraf Khalil and Kay Connelly. Context-aware Telephony: Privacy Preferences and Sharing Patterns. In ACM CSCW, pages 469--478, Banff, Alberta, Canada, November 2006. ACM.
[39]
Michal Kosinski, David Stillwell, and Thore Graepel. Private Traits and Attributes Are Predictable from Digital Records of Human Behavior. Proceedings of the National Academy of Sciences, 110(15):5802--5805, 2013.
[40]
John Krumm. Inference Attacks on Location Tracks. In International Conference on Pervasive Computing, pages 127--143, White Plains, NY, USA, July 2007. Springer.
[41]
John Krumm. A Survey of Computational Location Privacy. Personal and Ubiquitous Computing, 13(6):391--399, 2009.
[42]
Todd Kulesza, Margaret Burnett, Weng-Keen Wong, and Simone Stumpf. Principles of Explanatory Debugging to Personalize Interactive Machine Learning. In ACM IUI, pages 126--137, Atlanta, GA, USA, 2015. ACM.
[43]
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu Liu, and Wei-Ying Ma. Mining User Similarity Based on Location History. In ACM SIGSPATIAL, page 34, Irvine, CA, USA, November 2008. ACM.
[44]
Ilaria Liccardi, Alfie Abdul-Rahman, and Min Chen. I Know Where You Live: Inferring Details of People's Lives by Visualizing Publicly Shared Location Data. In ACM CHI, pages 1--12, San Jose, CA, USA, May 2016. ACM.
[45]
Erika McCallister. Guide to Protecting the Confidentiality of Personally Identifiable Information. Diane Publishing, 2010.
[46]
Mary L McHugh. Interrater Reliability: The Kappa Statistic. Biochemia medica, 22(3):276--282, 2012.
[47]
K Mohamed, Etienne Côme, Johanna Baro, and Latifa Oukhellou. Understanding Passenger Patterns in Public Transit Through Smart Card and Socioeconomic Data. In UrbComp, Seattle, WA, USA, September 2014. ACM.
[48]
David C Mohr, Mi Zhang, and Stephen M Schueller. Personal Sensing: Understanding Mental Health using Ubiquitous Sensors and Machine Learning. Annual Review of Clinical Psychology, 13:23--47, 2017.
[49]
Feng Qiu and Junghoo Cho. Automatic Identification of User Interest for Personalized Search. In WWW, pages 727--736, Edinburgh, UK, May 2006. ACM.
[50]
Suzanne Rivoire, Mehul A Shah, Parthasarathy Ranganathan, and Christos Kozyrakis. JouleSort: A Balanced Energy-Efficiency Benchmark. In ACM SIGMOD, pages 365--376, Beijing, China, June 2007.
[51]
Naomi B Robbins, Richard M Heiberger, et al. Plotting Likert and other Rating Scales. In Joint Statistical Meeting, pages 1058--1066, Alanta, GA, USA, July 2001. American Statistical Association.
[52]
Luca Rossi and Mirco Musolesi. It's the Way You Check-In: Identifying Users in Location-Based Social Networks. In ACM COSN, Dublin, Ireland, October 2014. ACM.
[53]
Fuming Shih, Ilaria Liccardi, and Daniel Weitzner. Privacy Tipping Points in Smartphones Privacy Preferences. In ACM CHI, pages 807--816, Seoul, Republic of Korea, April 2015. ACM.
[54]
Milad Shokouhi. Learning to Personalize Query Auto-Completion. In ACM SIGIR, pages 103--112, Dublin, Ireland, July 2013. ACM.
[55]
Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. Quantifying Location Privacy. In IEEE Symposium on Security and Privacy, pages 247--262, Oakland, CA, USA, May 2011. IEEE.
[56]
Einar Snekkenes. Concepts for Personal Location Privacy Policies. In ACM EC, pages 48--57, Tampa, Florida, USA, October 2001. ACM.
[57]
Jacopo Staiano, Nuria Oliver, Bruno Lepri, Rodrigo de Oliveira, Michele Caraviello, and Nicu Sebe. Money walks: A Human-centric Study on the Economics of Personal Mobile Data. In ACM UbiComp, pages 583--594, Seattle, WA, USA, 2014. ACM.
[58]
Jaime Teevan, Susan T Dumais, and Eric Horvitz. Personalizing Search via Automated Analysis of Interests and Activities. In ACM SIGIR, pages 449--456, Salvador, Brazil, August 2005. ACM.
[59]
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y Tsai, Patrick Gage Kelley, James Springfield, Lorrie Cranor, Jason Hong, and Norman Sadeh. Empirical Models of Privacy in Location Sharing. In ACM UbiComp, pages 129--138, Copenhagen, Denmark, September 2010. ACM.
[60]
Janice Y Tsai, Patrick Kelley, Paul Drielsma, Lorrie Faith Cranor, Jason Hong, and Norman Sadeh. Who's Viewed You?: The Impact of Feedback in a Mobile Location-Sharing Application. In ACM CHI, pages 2003--2012, Boston, Massachusetts, USA, April 2009. ACM.
[61]
Pengfei Wang, Jiafeng Guo, Yanyan Lan, Jun Xu, and Xueqi Cheng. Your Cart Tells You: Inferring Demographic Attributes from Purchase Data. In ACM WSDM, pages 173--182, San Francisco, CA, USA, February 2016. ACM.
[62]
Dingqi Yang, Daqing Zhang, Bingqing Qu, and Philippe Cudré-Mauroux. PrivCheck: Privacy-Preserving Check-In Data Publishing for Personalized Location-Based Services. In ACM UbiComp, pages 545--556, Heidelberg, Germany, 2016. ACM.
[63]
Paul A Zandbergen. Accuracy of iPhone Locations: A comparison of Assisted GPS, WiFi and Cellular Positioning. Transactions in GIS, 13(1):5--25, 2009.
[64]
Lei Zhang, Jiangchuan Liu, Hongbo Jiang, and Yong Guan. SensTrack: Energy-Efficient Location Tracking with Smartphone Sensors. IEEE Sensors Journal, 13(10):3775--3784, 2013.
[65]
Yu Zheng, Xing Xie, and Wei-Ying Ma. Geolife: A Collaborative Social Networking Service Among User, Location and Trajectory. IEEE Data(base) Engineering Bulletin, June 2010.
[66]
Erheng Zhong, Ben Tan, Kaixiang Mo, and Qiang Yang. User Demographics Prediction based on Mobile Data. Pervasive and Mobile Computing, 9(6):823--837, 2013.
[67]
Yuan Zhong, Nicholas Jing Yuan, Wen Zhong, Fuzheng Zhang, and Xing Xie. You Are Where You Go: Inferring Demographic Attributes from Location Check-Ins. In ACM WSDM, pages 295--304, Shanghai, China, February 2015. ACM.
[68]
Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A Gunter, and Klara Nahrstedt. Identity, Location, Disease and More: Inferring your Secrets from Android Public Resources. In ACM CCS, pages 1017--1028, Berlin, Germany, November 2013. ACM.

Cited By

View all
  • (2024)Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data TypesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653284(319-324)Online publication date: 19-Jun-2024
  • (2024)Nebula: A Privacy-First Platform for Data Backhaul2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00092(3184-3202)Online publication date: 19-May-2024
  • (2024)Context-Aware Hybrid Encoding for Privacy-Preserving Computation in IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2023.328852311:1(1054-1064)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 4, Issue 4
December 2020
1356 pages
EISSN:2474-9567
DOI:10.1145/3444864
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 December 2020
Published in IMWUT Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Location tracking
  2. personal information inference
  3. self check-in mobile systems

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • EPSRC The Alan Turing Institute
  • EPSRC

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)187
  • Downloads (Last 6 weeks)16
Reflects downloads up to 28 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Privkit: A Toolkit of Privacy-Preserving Mechanisms for Heterogeneous Data TypesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653284(319-324)Online publication date: 19-Jun-2024
  • (2024)Nebula: A Privacy-First Platform for Data Backhaul2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00092(3184-3202)Online publication date: 19-May-2024
  • (2024)Context-Aware Hybrid Encoding for Privacy-Preserving Computation in IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2023.328852311:1(1054-1064)Online publication date: 1-Jan-2024
  • (2023)Exploring Transformer and Graph Convolutional Networks for Human Mobility ModelingSensors10.3390/s2310480323:10(4803)Online publication date: 16-May-2023
  • (2023)Not Only for Contact TracingProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35703486:4(1-26)Online publication date: 11-Jan-2023
  • (2022)Toward privacy-aware federated analytics of cohorts for smart mobilityFrontiers in Computer Science10.3389/fcomp.2022.8912064Online publication date: 27-Jul-2022
  • (2022)Know Thyself as a Virtual RealityThe International Review of Information Ethics10.29173/irie48131:1Online publication date: 22-Aug-2022
  • (2022)An Investigative Study on the Privacy Implications of Mobile E-scooter Rental AppsProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528551(125-139)Online publication date: 16-May-2022

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media