skip to main content
10.1145/2370216.2370290acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing

Published:05 September 2012Publication History

ABSTRACT

Smartphone security research has produced many useful tools to analyze the privacy-related behaviors of mobile apps. However, these automated tools cannot assess people's perceptions of whether a given action is legitimate, or how that action makes them feel with respect to privacy. For example, automated tools might detect that a blackjack game and a map app both use one's location information, but people would likely view the map's use of that data as more legitimate than the game. Our work introduces a new model for privacy, namely privacy as expectations. We report on the results of using crowdsourcing to capture users' expectations of what sensitive resources mobile apps use. We also report on a new privacy summary interface that prioritizes and highlights places where mobile apps break people's expectations. We conclude with a discussion of implications for employing crowdsourcing as a privacy evaluation technique.

References

  1. "Katz v United States 389 U. S. 347." Available: http://en.wikipedia.org/wiki/Katz_v._United_StatesGoogle ScholarGoogle Scholar
  2. S. Amini, et al., "Towards Scalable Evaluation of Mobile Applications through Crowdsourcing and Automation," CMU-CyLab-12-006, Carnegie Mellon University, 2012.Google ScholarGoogle Scholar
  3. D. Barrera, et al., "A methodology for empirical analysis of permission-based security models and its application to android," In Proc. CCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Barth, et al., "Privacy and Contextual Integrity: Framework and Applications," In Proc. IEEE Symposium on Security and Privacy, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Benisch, et al., "Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs," Personal and Ubiquitous Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Beresford, et al., "MockDroid: trading privacy for application functionality on smartphones," In Proc. HotMobile, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. S. Bernstein, et al., "Soylent: a word processor with a crowd inside," In Proc. UIST, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Bravo-Lillo, et al., "Bridging the gap in computer security warnings: a mental model approach," IEEE Security & Privacy Magazine, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. J. Camp, "Mental models of privacy and security," Technology and Society Magazine, IEEE, vol. 28, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  10. E. Chin, et al., "Analyzing inter-application communication in Android," In Proc. MobiSys, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Craik, the nature of explanation, Cambridge University Press, 1943.Google ScholarGoogle Scholar
  12. M. Egele, et al., "PiOS: Detecting Privacy Leaks in iOS Applications," In Proc. NDSS, 2011.Google ScholarGoogle Scholar
  13. W. Enck, "Defending Users against Smartphone Apps: Techniques and Future Directions," in LNCS. vol. 7093, ed, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. Enck, et al., "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," In Proc. OSDI 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Enck, et al., "A Study of Android Application Security," In Proc. USENIX Security Symposium, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. P. Felt, et al., "Android permissions demystified," In Proc. CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. P. Felt, et al., "A survey of mobile malware in the wild," In Proc. SPSM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. P. Felt, et al., "Android Permissions: User Attention, Comprehension, and Behavior," UCB/EECS-2012-26, University of California, Berkeley, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. P. Felt, et al., "Permission re-delegation: attacks and defenses," In Proc. USENIX conference on Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. Good, et al., "Stopping spyware at the gate: a user study of privacy, notice and spyware," In Proc. SOUPS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Grobart. "The Facebook Scare That Wasn't." Available: http://gadgetwise.blogs.nytimes.com/2011/08/10/the-facebook-scare-that-wasnt/Google ScholarGoogle Scholar
  22. P. Hornyack, et al., "These aren't the droids you're looking for: retrofitting android to protect data from imperious applications," In Proc. CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Jensen and C. Potts, "Privacy policies as decision-making tools: an evaluation of online privacy notices," In Proc. CHI, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Jeon, et al., "Dr. Android and Mr. Hide: Fine-grained security policies on unmodified Android," 2012.Google ScholarGoogle Scholar
  25. P. G. Kelley, et al., "A "nutrition label" for privacy," In Proc. SOUPS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. G. Kelley, et al., "A Conundrum of permissions: Installing Applications on an Android Smartphone," In Proc. USEC, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. G. Liu, et al., "Smartening the crowds: computational techniques for improving human verification to fight phishing scams," In Proc. SOUPS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Nauman, et al., "Apex: extending Android permission model and enforcement with user-defined runtime constraints," In Proc. ASIACCS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Norman, The design of everyday things: Basic Books, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Palen and P. Dourish, "Unpacking "privacy" for a networked world," In Proc. CHI, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. S. Patil, et al., "With a little help from my friends: can social navigation inform interpersonal privacy preferences?," In Proc. Proceedings of the ACM 2011 conference on Computer supported cooperative work, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. N. Sadeh, et al., "Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application," The Journal of Personal and Ubiquitous Computing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D. J. Solove, "A Taxonomy of Privacy," University of Pennsylvania Law Review, Vol. 154, No. 3, January 2006.Google ScholarGoogle ScholarCross RefCross Ref
  34. A. Thampi. "Path uploads your entire iPhone address book to its servers." Available: http://mclov.in/2012/02/08/path-uploads-your-entire-address-book-to-their-servers.htmlGoogle ScholarGoogle Scholar
  35. S. Thurm and Y. I. Kane, "Your Apps are Watching You," WSJ, 2011.Google ScholarGoogle Scholar
  36. T. Vidas, et al., "Curbing android permission creep," Proceedings of the Web, vol. 2, 2011.Google ScholarGoogle Scholar
  37. A. Wagner. "Google Posts Refreshed Android Distribution Numbers." Available: http://www.twylah.com/surfingislander/tweets/177040176181288960Google ScholarGoogle Scholar
  38. R. Wash, "Folk models of home computer security," In Proc. SOUPS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Y. Zhou, et al., "Taming Information-Stealing Smartphone Applications (on Android)," In Proc. TRUST, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      UbiComp '12: Proceedings of the 2012 ACM Conference on Ubiquitous Computing
      September 2012
      1268 pages
      ISBN:9781450312240
      DOI:10.1145/2370216

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 September 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      UbiComp '12 Paper Acceptance Rate58of301submissions,19%Overall Acceptance Rate764of2,912submissions,26%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader