Raising User Awareness about Privacy Threats in Participatory Sensing Applications through Graphical Warnings

Mobile phones are increasingly leveraged as sensor platforms to collect information about user's context. The collected sensor readings can however reveal personal and sensitive information about the users and hence put their privacy at stake. In prior work, we have proposed different user interfaces allowing users to select the degree of granularity at which the sensor readings are shared in order to protect their privacy. In this paper, we aim at further increasing user awareness about potential privacy risks and investigate the introduction of picture-based warnings based on their current privacy settings. Depending on their privacy conception and the proposed warnings, users can then adapt their settings or leave them unchanged. We evaluate the picture-based warnings by conducting a user study involving 30 participants. The results show that more than 70% of the participants would change their settings after having seen the picture-based warnings.

[1]  Deborah Estrin,et al.  Image browsing, processing, and clustering for participatory sensing: lessons from a DietSense prototype , 2007, EmNets '07.

[2]  Delphine Reinhardt,et al.  What's the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications , 2013, 38th Annual IEEE Conference on Local Computer Networks - Workshops.

[3]  Salil S. Kanhere,et al.  A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..

[4]  K. Strater,et al.  Strategies and struggles with privacy in an online social networking community , 2008 .

[5]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[6]  Lorrie Faith Cranor,et al.  Crying Wolf: An Empirical Study of SSL Warning Effectiveness , 2009, USENIX Security Symposium.

[7]  Robert W. Reeder,et al.  Visual vs. compact: a comparison of privacy policy interfaces , 2010, CHI.

[8]  John Krumm,et al.  Exploring end user preferences for location obfuscation, location-based services, and the value of location , 2010, UbiComp.

[9]  Nathaniel Good,et al.  Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.

[10]  Norbert Gyorbíró,et al.  An Activity Recognition System For Mobile Phones , 2009, Mob. Networks Appl..

[11]  Predrag V. Klasnja,et al.  Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.

[12]  Wei Pan,et al.  SoundSense: scalable sound sensing for people-centric applications on mobile phones , 2009, MobiSys '09.

[13]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[14]  Ramachandran Ramjee,et al.  Nericell: rich monitoring of road and traffic conditions using mobile smartphones , 2008, SenSys '08.

[15]  Gary M. Weiss,et al.  Activity recognition using cell phone accelerometers , 2011, SKDD.

[16]  Jun Han,et al.  ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).

[17]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[18]  Matthias Hollick,et al.  Exploring user preferences for privacy interfaces in mobile sensing applications , 2012, MUM.

[19]  Lorrie Faith Cranor,et al.  You've been warned: an empirical study of the effectiveness of web browser phishing warnings , 2008, CHI.

[20]  Lorrie Faith Cranor,et al.  Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.

[21]  Hao Chen,et al.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.

[22]  Heather Richter Lipford,et al.  The impact of social navigation on privacy policy configuration , 2010, SOUPS.

[23]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[24]  Lorrie Faith Cranor,et al.  User interfaces for privacy agents , 2006, TCHI.

[25]  Jun Han,et al.  ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.

[26]  Katie Shilton,et al.  Four billion little brothers? , 2009, Commun. ACM.

[27]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[28]  Vesa T. Peltonen,et al.  Computational auditory scene recognition , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[29]  Mark Bilandzic,et al.  Laermometer: a mobile noise mapping application , 2008, NordiCHI.