Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure

The wide adoption of mobile devices and social media platforms have dramatically increased the collection and sharing of personal information. More and more frequently, users are called to make decisions concerning the disclosure of their personal information. In this study, we investigate the factors affecting users’ choices toward the disclosure of their personal data, including not only their demographic and self-reported individual characteristics, but also their social interactions and their mobility patterns inferred from months of mobile phone data activity. We report the findings of a field study conducted with a community of 63 subjects provided with (i) a smart-phone and (ii) a Personal Data Store (PDS) enabling them to control the disclosure of their data. We monitor the sharing behavior of our participants through the PDS and evaluate the contribution of different factors affecting their disclosing choices of location and social interaction data. Our analysis shows that social interaction inferred by mobile phones is an important factor revealing willingness to share, regardless of the data type. In addition, we provide further insights on the individual traits relevant to the prediction of sharing behavior.

[1]  Jason I. Hong,et al.  Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM , 2007, UbiComp.

[2]  S. Berg Snowball Sampling—I , 2006 .

[3]  P. Cozby Self-disclosure: a literature review. , 1973, Psychological bulletin.

[4]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[5]  George R. Milne,et al.  Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .

[6]  Alfred Kobsa,et al.  Helping users with information disclosure decisions: potential for adaptation , 2013, IUI '13.

[7]  Alex Pentland,et al.  Sensing the "Health State" of a Community , 2012, IEEE Pervasive Computing.

[8]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[9]  Nicu Sebe,et al.  Money walks: a human-centric study on the economics of personal mobile data , 2014, UbiComp.

[10]  Janice Lo,et al.  Privacy Concern, Locus of Control, and Salience in a Trust-Risk Model of Information Disclosure on Social Networking Sites , 2010, AMCIS.

[11]  Alfred Kobsa,et al.  Dimensionality of information disclosure behavior , 2013, Int. J. Hum. Comput. Stud..

[12]  Cecilia Mascolo,et al.  Smartphones for Large-Scale Behavior Change Interventions , 2013, IEEE Pervasive Computing.

[13]  N. Eagle,et al.  Network Diversity and Economic Development , 2010, Science.

[14]  Mirco Musolesi,et al.  Spatio-temporal techniques for user identification by means of GPS mobility data , 2015, EPJ Data Science.

[15]  Mirco Musolesi,et al.  Trajectories of depression: unobtrusive monitoring of depressive states by means of smartphone mobility traces analysis , 2015, UbiComp.

[16]  J. Hardin,et al.  Generalized Linear Models and Extensions , 2001 .

[17]  Yair Amichai-Hamburger,et al.  Social network use and personality , 2010, Comput. Hum. Behav..

[18]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[19]  Alex Pentland,et al.  The Mobile Territorial Lab: a multilayered and dynamic view on parents’ daily lives , 2016, EPJ Data Science.

[20]  John Zimmerman,et al.  Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.

[21]  Fabio Pianesi,et al.  If You Are Happy and You Know It, Say "I'm Here": Investigating Parents' Location-Sharing Preferences , 2015, INTERACT.

[22]  S. Desmarais,et al.  Hey Mom, What’s on Your Facebook? Comparing Facebook Disclosure and Privacy in Adolescents and Adults , 2012 .

[23]  Corrado Moiso,et al.  How Do I Manage My Personal Data? - A Telco Perspective , 2012, DATA.

[24]  P. Costa,et al.  The revised NEO personality inventory (NEO-PI-R) , 2008 .

[25]  Norman A. Johnson,et al.  Personality traits and concern for privacy: an empirical study in the context of location-based services , 2008, Eur. J. Inf. Syst..

[26]  Deborah Estrin,et al.  Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.

[27]  J. Rotter Generalized expectancies for internal versus external control of reinforcement. , 1966, Psychological monographs.

[28]  M. Perugini,et al.  The Big Five Marker Scales (BFMS) and the Italian AB5C taxonomy: Analyses from an emic-etic perspective , 2002 .

[29]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[30]  Mirco Musolesi,et al.  It's the way you check-in: identifying users in location-based social networks , 2014, COSN '14.

[31]  James Fogarty,et al.  Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications , 2006, CHI.

[32]  J. Rotter A new scale for the measurement of interpersonal trust. , 1967, Journal of personality.

[33]  Alex Pentland,et al.  Social fMRI: Investigating and shaping social mechanisms in the real world , 2011, Pervasive Mob. Comput..

[34]  Tara Matthews,et al.  Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.

[35]  Lawrence R. Wheeless,et al.  Conceptualization and Measurement of Reported Self-Disclosure. , 1976 .

[36]  Bruno Lepri,et al.  Investigating Factors Affecting Personal Data Disclosure , 2015, WWW.

[37]  Panagiotis Symeonidis,et al.  Link Prediction in Multi-modal Social Networks , 2014, ECML/PKDD.

[38]  Corrado Moiso,et al.  My data store: toward user awareness and control on personal data , 2014, UbiComp Adjunct.

[39]  Lee A. Bygrave,et al.  A right to be forgotten? , 2014, Commun. ACM.

[40]  Manfred Tscheligi,et al.  Personality traits, usage patterns and information disclosure in online communities , 2009, BCS HCI.

[41]  Alessandro Acquisti,et al.  Misplaced Confidences , 2013, WEIS.

[42]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[43]  Erez Shmueli,et al.  openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.

[44]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[45]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[46]  MusolesiMirco,et al.  Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure , 2017 .

[47]  J. H. Davis,et al.  The effect of the performance appraisal system on trust for management: A field quasi-experiment. , 1999 .

[48]  Virgílio A. F. Almeida,et al.  Facebook and Privacy: The Balancing Act of Personality, Gender, and Relationship Currency , 2012, ICWSM.

[49]  Y. de Montjoye,et al.  Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.

[50]  Anabel Quan-Haase,et al.  Information revelation and internet privacy concerns on social network sites: a case study of facebook , 2009, C&T.

[51]  T. Farma,et al.  Un questionario sul “locus control” : suo utilizzo nel contesto italiano , 2000 .

[52]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[53]  Claudio Bettini,et al.  Privacy protection in pervasive systems: State of the art and technical challenges , 2015, Pervasive Mob. Comput..