To Deny , or Not to Deny : A Personalized Privacy Assistant for Mobile App Permissions [ Draft ]

Many smartphone users are uncomfortable with the permissions requested by their mobile apps. The sheer number of permissions can be so overwhelming that many users are unable to adequately manage their permission settings. We present a methodology for building personalized privacy assistants to recommend permission settings to users. We conducted two field studies with Android users: the first (n=84), to collect privacy preferences and build a recommendation system, the second (n=51), to evaluate the effectiveness of the recommendations. Results show that 73.7% of recommendations are accepted. Following interactions with the assistant, participants were motivated to further review and modify their settings with daily privacy nudges. Despite showing significant engagement and modifying permissions not covered in the recommendations, participants only modified 5.6% of the recommendations they had accepted. We discuss implications of our results for the design of existing permission managers and future privacy assistants.

[1]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[2]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[3]  Christopher D. Wickens,et al.  A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[4]  Andrew S. Patrick,et al.  From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions , 2003, Privacy Enhancing Technologies.

[5]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[6]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[7]  Gediminas Adomavicius,et al.  Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.

[8]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[9]  Yong Liu,et al.  Do I Do What I Say?: Observed Versus Stated Privacy Preferences , 2007, INTERACT.

[10]  Jens Grossklags,et al.  What Can Behavioral Economics Teach Us about Privacy , 2008 .

[11]  Chih-Jen Lin,et al.  LIBLINEAR: A Library for Large Linear Classification , 2008, J. Mach. Learn. Res..

[12]  Norman M. Sadeh,et al.  Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden? , 2009, Privacy Enhancing Technologies.

[13]  Acquisti Carnegie NudgingPrivacy The Behavioral Economics of Personal Information , 2009 .

[14]  Xinwen Zhang,et al.  Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.

[15]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[16]  Tamara G. Kolda,et al.  Scalable Tensor Factorizations with Missing Data , 2010, SDM.

[17]  Norman M. Sadeh,et al.  User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models , 2011, AAAI.

[18]  Alessandro Acquisti,et al.  Nudging Users Towards Privacy on Mobile Devices , 2011 .

[19]  Alastair R. Beresford,et al.  MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.

[20]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[21]  Steve Hanna,et al.  Android permissions demystified , 2011, CCS '11.

[22]  G. Kalyanaram,et al.  Nudge: Improving Decisions about Health, Wealth, and Happiness , 2011 .

[23]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[24]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[25]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.

[26]  Jennifer King How Come I'm Allowing Strangers to Go Through My Phone? Smartphones and Privacy Expectations. , 2012 .

[27]  David A. Wagner,et al.  Short paper: location privacy: user behavior in the field , 2012, SPSM '12.

[28]  David A. Wagner,et al.  I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns , 2012, SPSM '12.

[29]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.

[30]  Lorrie Faith Cranor,et al.  Privacy manipulation and acclimation in a location sharing application , 2013, UbiComp.

[31]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[32]  可児 潤也 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .

[33]  Bongshin Lee,et al.  Nudging People Away from Privacy-Invasive Mobile Apps through Visual Framing , 2013, INTERACT.

[34]  Bart P. Knijnenburg,et al.  Profiling Facebook Users' Privacy Behaviors , 2014 .

[35]  Byung-Gon Chun,et al.  TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones , 2014, Commun. ACM.

[36]  Bart P. Knijnenburg Information Disclosure Profiles for Segmentation and Recommendation , 2014 .

[37]  David A. Wagner,et al.  The effect of developer-specified explanations for permission requests on smartphone user behavior , 2014, CHI.

[38]  Norman M. Sadeh,et al.  Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.

[39]  Norman M. Sadeh,et al.  Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? , 2014, WWW.

[40]  Marco Gruteser,et al.  A Field Study of Run-Time Location Access Disclosures on Android Smartphones , 2014 .

[41]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[42]  Matthew Smith,et al.  Using personal examples to improve risk communication for security & privacy decisions , 2014, CHI.

[43]  Yang Wang,et al.  A field trial of privacy nudges for facebook , 2014, CHI.

[44]  Lorrie Faith Cranor,et al.  Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.

[45]  Jie Gu,et al.  Interaction Effects of Contextual Cues on Privacy Concerns: The Case of Android Applications , 2015, 2015 48th Hawaii International Conference on System Sciences.

[46]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[47]  Michael Weber,et al.  Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making , 2015, IEEE Pervasive Computing.

[48]  Ilaria Liccardi,et al.  Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.

[49]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[50]  Subhasish Mazumdar,et al.  Introducing Privacy Threats from Ad Libraries to Android Users Through Privacy Granules , 2015 .