skip to main content
10.1145/2556288.2557421acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Leakiness and creepiness in app space: perceptions of privacy and mobile app use

Published:26 April 2014Publication History

ABSTRACT

Mobile devices are playing an increasingly intimate role in everyday life. However, users can be surprised when informed of the data collection and distribution activities of apps they install. We report on two studies of smartphone users in western European countries, in which users were confronted with app behaviors and their reactions assessed. Users felt their personal space had been violated in "creepy" ways. Using Altman's notions of personal space and territoriality, and Nissenbaum's theory of contextual integrity, we account for these emotional reactions and suggest that they point to important underlying issues, even when users continue using apps they find creepy.

References

  1. Abramson, L., Seligman, M. & Teasdale, J. (1978) Learned helplessness in humans: critique and reformulation. Journal of abnormal psychology, 87, 1, 49--74.Google ScholarGoogle ScholarCross RefCross Ref
  2. Acquisti, A., & Grossklags, J. (2005). Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy, 26--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Altman, I. (1975). The Environment and Social Behavior. Belmont, California, USA: Wadsworth Publishing company, Inc.Google ScholarGoogle Scholar
  4. Barkhuus, L. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of CHI 2012 (Austin, Texas, 2012). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Barkhuus, L., & Polichar, V. E. (2011). Empowerment through seamfulness: smart phones in everyday life. Personal and Ubiquitous Computing, 629--639. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Benford, S., Greenhalgh, C., Giannachi, G., Walker, B., Marshall, J., & Rodden, T. (2013). Uncomfortable user experience. Communications of the ACM, 56(9), 66--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Braunstein, A., Granka, L., & Staddon, J. (2011). Indirect content privacy surveys: measuring privacy without asking about it. SOUPS '11. NY, USA: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Collins English dictionary. HarperCollins Publishers, City, 2009.Google ScholarGoogle Scholar
  9. Felt, A., Egelman, S., & Wagner, D. (2012). I've got 99 problems, but vibration ain't one: A survey of smart-phone users' concerns. SPSM '12 (pp. 33--44) NY: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., & Wagner, D. (2012). Android Permissions: User Attention, Comprehension & Behavior. SOUPS '12 NY: ACM Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Flurry. (2013). Retrieved April 12, 2013, from Big Data: http://www.flurry.com/big-data.htmlGoogle ScholarGoogle Scholar
  12. Fortunati, L. (2001). The mobile phone: an identity on the move. In Personal & Ubiquitous Computing: Springer-Verlag London. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Friedman, B. (1997) Human values and the design of computer technology. CSLI Publications, Stanford, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Futuresight. (2011). Retrieved from User perspectives on mobile privacy: http://goo.gl/9sgZXRGoogle ScholarGoogle Scholar
  15. Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., et al. (2005). Stopping spyware at the gate: a user study of privacy, notice and spyware. SOUPS '05 (pp. 43--52). NY: ACM Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Häkkilä, J. & Chatfield, C. 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication. Proceedings of MobileHCI (Salzburg, Austria, 2005). ACM Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Karlson, A., Brush, A. J. & Schechter, S. Can I borrow your phone': understanding concerns when sharing mobile phones. In Proceedings of CHI 2009 (Boston, MA, 2009). ACM Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. In Proceedings of FCDS12 (pp. 68--79). Berlin: Springer- Verlag, Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Kelley, P., Cranor, F., & Sadeh, N. (2013). Privacy as part of the app decision-making process. In Proceedings of CHI 13 (pp. 3393--3402). NY: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Knobel, C. & Bowker, G. (2011) Values in design. Communications of the ACM, 54, 7, 26--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Le Dantec, C., Poole, E. & Wyche, S. Values as lived experience: evolving value sensitive design in support of value discovery. Proceedings of CHI 2009 (Boston, MA, 2009). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lederer, S., Mankoff, J., & Dey, A. (2003). Who wants to know what when' Privacy preference determinants in ubiquitous computing. CHI EA '03. NY: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Lenhart, A., Ling, R., Campbell, S., & Purcell. K. Teens and Mobile Phones. Pew Internet and American Life Project. (2010).Google ScholarGoogle Scholar
  24. Lin, D., & Loui, M. (1998). Taking the byte out of cookies: Privacy, consent and the Web. Computers and Society, 28 (1), 39--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J., & Zhang, J. (2012). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp '12 (pp. 501--510). NY: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Ling, R. (2008). New tech, new ties: How mobile communication is reshaping social cohesion. Cambridge, MA: MIT. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Maier, S., & Seligman, M. (1976). Learned helplessness: Theory and evidence. Journal of Experimental Psychology: General, 105(1), 3--46.Google ScholarGoogle ScholarCross RefCross Ref
  28. Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., & Beznosov, K. (2012). Understanding users' requirements for data protection in smartphones. In ICDE Workshops, 2012. Washington, DC, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Nafus, D. & Tracey, K. (2002) Mobile phone consumption & concepts of personhood. In J. Katz & M. Aakhus (Ed). Perpetual contact: Mobile communication, private talk, public performance. University Press, Cambridge. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Nippert-Eng, C. E. (2010). Islands of privacy. Chicago; London: The University of Chicago Press.Google ScholarGoogle Scholar
  31. Nissenbaum, H. F. (2010) Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books, Stanford, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Norberg, P., Horne, D. & Horne, D. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--127.Google ScholarGoogle Scholar
  33. Oksman, V. & Rautiainen, P. (2003) "Perhaps it is a Body Part": How the Mobile Phone Became an Organic Part of the Everyday Lives of Finnish Children and Teenagers. In J. E. Katz (Ed). Machines that become us: The social context of personal communication technology. Transaction Publishers, New Brunswick, N.J.Google ScholarGoogle Scholar
  34. Palen, L. & Dourish, P. Unpacking "privacy" for a networked world. In Proceedings of the CHI 2003 (Ft. Lauderdale, FL, 2003). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Peterson, C., Maier, S., & Seligman, M. (1993). Learned helplessness: A theory for the age of personal control. NY: Oxford University Press.Google ScholarGoogle Scholar
  36. Rose, N. (1999) Powers of Freedom: Reframing Political Thought, NY: Cambridge University Press.Google ScholarGoogle Scholar
  37. Seligman, M. E. (1972) Learned Helplessness. Annual Review of Medicine, 23, 1, 407--412.Google ScholarGoogle ScholarCross RefCross Ref
  38. Sundar, S., Kang, H., Wu, M., Go, E., & Zhang, B. (2013). Unlocking the privacy paradox: do cognitive heuristics hold the key' In CHI '13 Extended Abstracts, Paris, France: ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Vijayan, J. Flashlight app vendor settles with FTC over privacy violations. Computerworld.com, IDG Network, Dec 6, 2013, http://goo.gl/OJ7P8PGoogle ScholarGoogle Scholar
  40. Xu, H., Luo, X., Carroll, J., & Rosson, M. (2011). The personalization privacy paradox: An exploratory study of decision-making process for location-aware marketing. Decision Support Systems, 51(1), 42--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Zhou, Y., Zhang, X., Jiang, X., & Freeh, W. (2011). Taming information-stealing smartphone applications (on Android). TRUST'11 (pp. 93--107), Heidelberg: Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Zafeiropoulou, A., Millard, D., Webber, C., & O'Hara, K. (2013). Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions' WebSci, Paris, France. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Leakiness and creepiness in app space: perceptions of privacy and mobile app use

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2014
      4206 pages
      ISBN:9781450324731
      DOI:10.1145/2556288

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 April 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '14 Paper Acceptance Rate465of2,043submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader