Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study

Data over-collection is a widespread problem in smartphones. Information-rich nature of data stored on smartphones makes them attractive targets for those seeking user data. Many smartphone applications collect user data that are beyond their functional needs. This behavior of smartphone applications puts smartphone users vulnerable to potential privacy violations. We believe that, in addition to hardware and software controls, privacy behavior of users can play a fundamental role in encountering problems like data over-collection. Learning such behaviors is, therefore, of interest to researchers, solution designers, experience designers, privacy experts, and regulators. Moreover, privacy is a globally occurring process, yet it is unique in different cultures. Therefore, privacy behaviors, in given cultural and technical contexts, can be valuable for experts. We conducted an exploratory study to assess privacy behaviors of smartphone users in Pakistan in the context of data over-collection problem. In this study, we surveyed a representative sample of smartphone users at a Pakistani academic institution. The study explored perceived data-sensitivity, privacy awareness, basic privacy management skills, and general privacy attitudes of our target user group. We also examined changes in respective variable values, if smartphone users are pre-informed of data over-collection problem through an informal privacy awareness session. We present the findings of our study in this paper.

[1]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[2]  J. Gliem,et al.  Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales , 2003 .

[3]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[4]  Shuqiang Zhang,et al.  Assessing Multicultural Competence: Perceived Versus Demonstrated Performance , 2008 .

[5]  Ping Gao,et al.  The transformation of the mobile telecommunications industry in Pakistan: A developing country perspective , 2009 .

[6]  Elizabeth Papadopoulou,et al.  Is There Really a Conflict Between Privacy and Personalisation? , 2011, ISD.

[7]  Yajin Zhou,et al.  Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.

[8]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[9]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[10]  可児 潤也 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .

[11]  Tao Xie,et al.  Improving mobile application security via bridging user expectations and application behaviors , 2014, HotSoS '14.

[12]  Lorrie Faith Cranor,et al.  Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding , 2014 .

[13]  Norman M. Sadeh,et al.  Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.

[14]  Lilian Mitrou,et al.  Reengineering the user: privacy concerns about personal data on smartphones , 2015, Inf. Comput. Secur..

[15]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[16]  Yue Liu User control of personal information concerning mobile-app: Notice and consent? , 2014, Comput. Law Secur. Rev..

[17]  Haejung Yun,et al.  A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators , 2014, ICIS.

[18]  Zhong Wang,et al.  Privacy trust crisis of personal data in China in the era of Big Data: The survey and countermeasures , 2015, Comput. Law Secur. Rev..

[19]  Michael Nofer The Value of Social Media for Predicting Stock Returns , 2015, Springer Fachmedien Wiesbaden.

[20]  Seung-Hyun Kim,et al.  Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[21]  Katarzyna Wac,et al.  Anonymous smartphone data collection: factors influencing the users’ acceptance in mobile crowd sensing , 2015, Personal and Ubiquitous Computing.

[22]  Jacques Ophoff,et al.  Security awareness and adoption of security controls by smartphone users , 2015, 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec).

[23]  Ilaria Liccardi,et al.  Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.

[24]  Paarijaat Aditya,et al.  Brave New World: Privacy Risks for Mobile Users , 2015, MOCO.

[25]  Meikang Qiu,et al.  Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.

[26]  Paul Resnick,et al.  It's Creepy, But it Doesn't Bother Me , 2016, CHI.

[27]  Steffen Beich Research Design And Methods A Process Approach , 2016 .

[28]  Wonsun Shin,et al.  Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure , 2016, Cyberpsychology Behav. Soc. Netw..

[29]  H. Jeff Smith,et al.  A cross-cultural comparison of information privacy concerns in Singapore, Sweden and the United States , 2016, ICEC.

[30]  Anirudha Joshi,et al.  Beyond “yesterday’s tomorrow”: future-focused mobile interaction design by and for emergent users , 2016, Personal and Ubiquitous Computing.

[31]  Borka Jerman-Blazic,et al.  User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study , 2016, Telematics Informatics.