Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2556288.2557421acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Leakiness and creepiness in app space: perceptions of privacy and mobile app use

Published: 26 April 2014 Publication History

Abstract

Mobile devices are playing an increasingly intimate role in everyday life. However, users can be surprised when informed of the data collection and distribution activities of apps they install. We report on two studies of smartphone users in western European countries, in which users were confronted with app behaviors and their reactions assessed. Users felt their personal space had been violated in "creepy" ways. Using Altman's notions of personal space and territoriality, and Nissenbaum's theory of contextual integrity, we account for these emotional reactions and suggest that they point to important underlying issues, even when users continue using apps they find creepy.

References

[1]
Abramson, L., Seligman, M. & Teasdale, J. (1978) Learned helplessness in humans: critique and reformulation. Journal of abnormal psychology, 87, 1, 49--74.
[2]
Acquisti, A., & Grossklags, J. (2005). Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy, 26--33.
[3]
Altman, I. (1975). The Environment and Social Behavior. Belmont, California, USA: Wadsworth Publishing company, Inc.
[4]
Barkhuus, L. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of CHI 2012 (Austin, Texas, 2012). ACM.
[5]
Barkhuus, L., & Polichar, V. E. (2011). Empowerment through seamfulness: smart phones in everyday life. Personal and Ubiquitous Computing, 629--639.
[6]
Benford, S., Greenhalgh, C., Giannachi, G., Walker, B., Marshall, J., & Rodden, T. (2013). Uncomfortable user experience. Communications of the ACM, 56(9), 66--73.
[7]
Braunstein, A., Granka, L., & Staddon, J. (2011). Indirect content privacy surveys: measuring privacy without asking about it. SOUPS '11. NY, USA: ACM.
[8]
Collins English dictionary. HarperCollins Publishers, City, 2009.
[9]
Felt, A., Egelman, S., & Wagner, D. (2012). I've got 99 problems, but vibration ain't one: A survey of smart-phone users' concerns. SPSM '12 (pp. 33--44) NY: ACM.
[10]
Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., & Wagner, D. (2012). Android Permissions: User Attention, Comprehension & Behavior. SOUPS '12 NY: ACM
[11]
Flurry. (2013). Retrieved April 12, 2013, from Big Data: http://www.flurry.com/big-data.html
[12]
Fortunati, L. (2001). The mobile phone: an identity on the move. In Personal & Ubiquitous Computing: Springer-Verlag London.
[13]
Friedman, B. (1997) Human values and the design of computer technology. CSLI Publications, Stanford, CA.
[14]
Futuresight. (2011). Retrieved from User perspectives on mobile privacy: http://goo.gl/9sgZXR
[15]
Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., et al. (2005). Stopping spyware at the gate: a user study of privacy, notice and spyware. SOUPS '05 (pp. 43--52). NY: ACM
[16]
Häkkilä, J. & Chatfield, C. 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication. Proceedings of MobileHCI (Salzburg, Austria, 2005). ACM
[17]
Karlson, A., Brush, A. J. & Schechter, S. Can I borrow your phone': understanding concerns when sharing mobile phones. In Proceedings of CHI 2009 (Boston, MA, 2009). ACM
[18]
Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. In Proceedings of FCDS12 (pp. 68--79). Berlin: Springer- Verlag, Heidelberg.
[19]
Kelley, P., Cranor, F., & Sadeh, N. (2013). Privacy as part of the app decision-making process. In Proceedings of CHI 13 (pp. 3393--3402). NY: ACM.
[20]
Knobel, C. & Bowker, G. (2011) Values in design. Communications of the ACM, 54, 7, 26--28.
[21]
Le Dantec, C., Poole, E. & Wyche, S. Values as lived experience: evolving value sensitive design in support of value discovery. Proceedings of CHI 2009 (Boston, MA, 2009). ACM.
[22]
Lederer, S., Mankoff, J., & Dey, A. (2003). Who wants to know what when' Privacy preference determinants in ubiquitous computing. CHI EA '03. NY: ACM.
[23]
Lenhart, A., Ling, R., Campbell, S., & Purcell. K. Teens and Mobile Phones. Pew Internet and American Life Project. (2010).
[24]
Lin, D., & Loui, M. (1998). Taking the byte out of cookies: Privacy, consent and the Web. Computers and Society, 28 (1), 39--51.
[25]
Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J., & Zhang, J. (2012). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp '12 (pp. 501--510). NY: ACM.
[26]
Ling, R. (2008). New tech, new ties: How mobile communication is reshaping social cohesion. Cambridge, MA: MIT.
[27]
Maier, S., & Seligman, M. (1976). Learned helplessness: Theory and evidence. Journal of Experimental Psychology: General, 105(1), 3--46.
[28]
Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., & Beznosov, K. (2012). Understanding users' requirements for data protection in smartphones. In ICDE Workshops, 2012. Washington, DC, USA.
[29]
Nafus, D. & Tracey, K. (2002) Mobile phone consumption & concepts of personhood. In J. Katz & M. Aakhus (Ed). Perpetual contact: Mobile communication, private talk, public performance. University Press, Cambridge.
[30]
Nippert-Eng, C. E. (2010). Islands of privacy. Chicago; London: The University of Chicago Press.
[31]
Nissenbaum, H. F. (2010) Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books, Stanford, CA.
[32]
Norberg, P., Horne, D. & Horne, D. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--127.
[33]
Oksman, V. & Rautiainen, P. (2003) "Perhaps it is a Body Part": How the Mobile Phone Became an Organic Part of the Everyday Lives of Finnish Children and Teenagers. In J. E. Katz (Ed). Machines that become us: The social context of personal communication technology. Transaction Publishers, New Brunswick, N.J.
[34]
Palen, L. & Dourish, P. Unpacking "privacy" for a networked world. In Proceedings of the CHI 2003 (Ft. Lauderdale, FL, 2003). ACM.
[35]
Peterson, C., Maier, S., & Seligman, M. (1993). Learned helplessness: A theory for the age of personal control. NY: Oxford University Press.
[36]
Rose, N. (1999) Powers of Freedom: Reframing Political Thought, NY: Cambridge University Press.
[37]
Seligman, M. E. (1972) Learned Helplessness. Annual Review of Medicine, 23, 1, 407--412.
[38]
Sundar, S., Kang, H., Wu, M., Go, E., & Zhang, B. (2013). Unlocking the privacy paradox: do cognitive heuristics hold the key' In CHI '13 Extended Abstracts, Paris, France: ACM.
[39]
Vijayan, J. Flashlight app vendor settles with FTC over privacy violations. Computerworld.com, IDG Network, Dec 6, 2013, http://goo.gl/OJ7P8P
[40]
Xu, H., Luo, X., Carroll, J., & Rosson, M. (2011). The personalization privacy paradox: An exploratory study of decision-making process for location-aware marketing. Decision Support Systems, 51(1), 42--52.
[41]
Zhou, Y., Zhang, X., Jiang, X., & Freeh, W. (2011). Taming information-stealing smartphone applications (on Android). TRUST'11 (pp. 93--107), Heidelberg: Springer-Verlag.
[42]
Zafeiropoulou, A., Millard, D., Webber, C., & O'Hara, K. (2013). Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions' WebSci, Paris, France.

Cited By

View all
  • (2024)Lavoro e dinamica tecnologica: incubi, illusioni, aspettativeIdee di lavoro e di ozio per la nostra civiltà10.36253/979-12-215-0319-7.138(1181-1194)Online publication date: 2024
  • (2024)From Zero to Hero: Detecting Leaked Data through Synthetic Data Injection and Model QueryingProceedings of the VLDB Endowment10.14778/3659437.365944617:8(1898-1910)Online publication date: 1-Apr-2024
  • (2024)‘Babies are a massive money spinner’: Data, reproductive labour and the commodification of pre-motherhood in fertility and pregnancy appsNew Media & Society10.1177/14614448241262805Online publication date: 26-Jul-2024
  • Show More Cited By

Index Terms

  1. Leakiness and creepiness in app space: perceptions of privacy and mobile app use

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2014
    4206 pages
    ISBN:9781450324731
    DOI:10.1145/2556288
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 April 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bodily integrity
    2. creepiness
    3. data privacy
    4. learned helplessness
    5. mobile devices

    Qualifiers

    • Research-article

    Conference

    CHI '14
    Sponsor:
    CHI '14: CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2014
    Ontario, Toronto, Canada

    Acceptance Rates

    CHI '14 Paper Acceptance Rate 465 of 2,043 submissions, 23%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)306
    • Downloads (Last 6 weeks)37
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Lavoro e dinamica tecnologica: incubi, illusioni, aspettativeIdee di lavoro e di ozio per la nostra civiltà10.36253/979-12-215-0319-7.138(1181-1194)Online publication date: 2024
    • (2024)From Zero to Hero: Detecting Leaked Data through Synthetic Data Injection and Model QueryingProceedings of the VLDB Endowment10.14778/3659437.365944617:8(1898-1910)Online publication date: 1-Apr-2024
    • (2024)‘Babies are a massive money spinner’: Data, reproductive labour and the commodification of pre-motherhood in fertility and pregnancy appsNew Media & Society10.1177/14614448241262805Online publication date: 26-Jul-2024
    • (2024)Dr. Convenience Love or: How I Learned to Stop Worrying and Love my Voice Assistant✱Proceedings of the 13th Nordic Conference on Human-Computer Interaction10.1145/3679318.3685364(1-14)Online publication date: 13-Oct-2024
    • (2024)Envisioning a human-centric data economy through speculative practice and co-designCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3665130(6-10)Online publication date: 1-Jul-2024
    • (2024)A Roadmap for Applying the Contextual Integrity Framework in Qualitative Privacy ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36537108:CSCW1(1-29)Online publication date: 26-Apr-2024
    • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
    • (2024)Sensitive Data Donation: A Feminist Reframing of Data Practices for Intimate Research ContextsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661524(2420-2434)Online publication date: 1-Jul-2024
    • (2024)Collective Privacy Sensemaking on Social Media about Period and Fertility Tracking post Roe v. WadeProceedings of the ACM on Human-Computer Interaction10.1145/36410008:CSCW1(1-35)Online publication date: 26-Apr-2024
    • (2024)Better Living Through Creepy Technology? Exploring Tensions Between a Novel Class of Well-Being Apps and Affective Discomfort in App CultureProceedings of the ACM on Human-Computer Interaction10.1145/36372998:CSCW1(1-39)Online publication date: 26-Apr-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media