ABSTRACT
Mobile devices are playing an increasingly intimate role in everyday life. However, users can be surprised when informed of the data collection and distribution activities of apps they install. We report on two studies of smartphone users in western European countries, in which users were confronted with app behaviors and their reactions assessed. Users felt their personal space had been violated in "creepy" ways. Using Altman's notions of personal space and territoriality, and Nissenbaum's theory of contextual integrity, we account for these emotional reactions and suggest that they point to important underlying issues, even when users continue using apps they find creepy.
- Abramson, L., Seligman, M. & Teasdale, J. (1978) Learned helplessness in humans: critique and reformulation. Journal of abnormal psychology, 87, 1, 49--74.Google ScholarCross Ref
- Acquisti, A., & Grossklags, J. (2005). Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy, 26--33. Google ScholarDigital Library
- Altman, I. (1975). The Environment and Social Behavior. Belmont, California, USA: Wadsworth Publishing company, Inc.Google Scholar
- Barkhuus, L. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In Proceedings of CHI 2012 (Austin, Texas, 2012). ACM. Google ScholarDigital Library
- Barkhuus, L., & Polichar, V. E. (2011). Empowerment through seamfulness: smart phones in everyday life. Personal and Ubiquitous Computing, 629--639. Google ScholarDigital Library
- Benford, S., Greenhalgh, C., Giannachi, G., Walker, B., Marshall, J., & Rodden, T. (2013). Uncomfortable user experience. Communications of the ACM, 56(9), 66--73. Google ScholarDigital Library
- Braunstein, A., Granka, L., & Staddon, J. (2011). Indirect content privacy surveys: measuring privacy without asking about it. SOUPS '11. NY, USA: ACM. Google ScholarDigital Library
- Collins English dictionary. HarperCollins Publishers, City, 2009.Google Scholar
- Felt, A., Egelman, S., & Wagner, D. (2012). I've got 99 problems, but vibration ain't one: A survey of smart-phone users' concerns. SPSM '12 (pp. 33--44) NY: ACM. Google ScholarDigital Library
- Felt, A., Ha, E., Egelman, S., Haney, A., Chin, E., & Wagner, D. (2012). Android Permissions: User Attention, Comprehension & Behavior. SOUPS '12 NY: ACM Google ScholarDigital Library
- Flurry. (2013). Retrieved April 12, 2013, from Big Data: http://www.flurry.com/big-data.htmlGoogle Scholar
- Fortunati, L. (2001). The mobile phone: an identity on the move. In Personal & Ubiquitous Computing: Springer-Verlag London. Google ScholarDigital Library
- Friedman, B. (1997) Human values and the design of computer technology. CSLI Publications, Stanford, CA. Google ScholarDigital Library
- Futuresight. (2011). Retrieved from User perspectives on mobile privacy: http://goo.gl/9sgZXRGoogle Scholar
- Good, N., Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., et al. (2005). Stopping spyware at the gate: a user study of privacy, notice and spyware. SOUPS '05 (pp. 43--52). NY: ACM Google ScholarDigital Library
- Häkkilä, J. & Chatfield, C. 'It's like if you opened someone else's letter': user perceived privacy and social practices with SMS communication. Proceedings of MobileHCI (Salzburg, Austria, 2005). ACM Google ScholarDigital Library
- Karlson, A., Brush, A. J. & Schechter, S. Can I borrow your phone': understanding concerns when sharing mobile phones. In Proceedings of CHI 2009 (Boston, MA, 2009). ACM Google ScholarDigital Library
- Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N., & Wetherall, D. (2012). A conundrum of permissions: installing applications on an android smartphone. In Proceedings of FCDS12 (pp. 68--79). Berlin: Springer- Verlag, Heidelberg. Google ScholarDigital Library
- Kelley, P., Cranor, F., & Sadeh, N. (2013). Privacy as part of the app decision-making process. In Proceedings of CHI 13 (pp. 3393--3402). NY: ACM. Google ScholarDigital Library
- Knobel, C. & Bowker, G. (2011) Values in design. Communications of the ACM, 54, 7, 26--28. Google ScholarDigital Library
- Le Dantec, C., Poole, E. & Wyche, S. Values as lived experience: evolving value sensitive design in support of value discovery. Proceedings of CHI 2009 (Boston, MA, 2009). ACM. Google ScholarDigital Library
- Lederer, S., Mankoff, J., & Dey, A. (2003). Who wants to know what when' Privacy preference determinants in ubiquitous computing. CHI EA '03. NY: ACM. Google ScholarDigital Library
- Lenhart, A., Ling, R., Campbell, S., & Purcell. K. Teens and Mobile Phones. Pew Internet and American Life Project. (2010).Google Scholar
- Lin, D., & Loui, M. (1998). Taking the byte out of cookies: Privacy, consent and the Web. Computers and Society, 28 (1), 39--51. Google ScholarDigital Library
- Lin, J., Sadeh, N., Amini, S., Lindqvist, J., Hong, J., & Zhang, J. (2012). Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp '12 (pp. 501--510). NY: ACM. Google ScholarDigital Library
- Ling, R. (2008). New tech, new ties: How mobile communication is reshaping social cohesion. Cambridge, MA: MIT. Google ScholarDigital Library
- Maier, S., & Seligman, M. (1976). Learned helplessness: Theory and evidence. Journal of Experimental Psychology: General, 105(1), 3--46.Google ScholarCross Ref
- Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., & Beznosov, K. (2012). Understanding users' requirements for data protection in smartphones. In ICDE Workshops, 2012. Washington, DC, USA. Google ScholarDigital Library
- Nafus, D. & Tracey, K. (2002) Mobile phone consumption & concepts of personhood. In J. Katz & M. Aakhus (Ed). Perpetual contact: Mobile communication, private talk, public performance. University Press, Cambridge. Google ScholarDigital Library
- Nippert-Eng, C. E. (2010). Islands of privacy. Chicago; London: The University of Chicago Press.Google Scholar
- Nissenbaum, H. F. (2010) Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books, Stanford, CA. Google ScholarDigital Library
- Norberg, P., Horne, D. & Horne, D. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--127.Google Scholar
- Oksman, V. & Rautiainen, P. (2003) "Perhaps it is a Body Part": How the Mobile Phone Became an Organic Part of the Everyday Lives of Finnish Children and Teenagers. In J. E. Katz (Ed). Machines that become us: The social context of personal communication technology. Transaction Publishers, New Brunswick, N.J.Google Scholar
- Palen, L. & Dourish, P. Unpacking "privacy" for a networked world. In Proceedings of the CHI 2003 (Ft. Lauderdale, FL, 2003). ACM. Google ScholarDigital Library
- Peterson, C., Maier, S., & Seligman, M. (1993). Learned helplessness: A theory for the age of personal control. NY: Oxford University Press.Google Scholar
- Rose, N. (1999) Powers of Freedom: Reframing Political Thought, NY: Cambridge University Press.Google Scholar
- Seligman, M. E. (1972) Learned Helplessness. Annual Review of Medicine, 23, 1, 407--412.Google ScholarCross Ref
- Sundar, S., Kang, H., Wu, M., Go, E., & Zhang, B. (2013). Unlocking the privacy paradox: do cognitive heuristics hold the key' In CHI '13 Extended Abstracts, Paris, France: ACM. Google ScholarDigital Library
- Vijayan, J. Flashlight app vendor settles with FTC over privacy violations. Computerworld.com, IDG Network, Dec 6, 2013, http://goo.gl/OJ7P8PGoogle Scholar
- Xu, H., Luo, X., Carroll, J., & Rosson, M. (2011). The personalization privacy paradox: An exploratory study of decision-making process for location-aware marketing. Decision Support Systems, 51(1), 42--52. Google ScholarDigital Library
- Zhou, Y., Zhang, X., Jiang, X., & Freeh, W. (2011). Taming information-stealing smartphone applications (on Android). TRUST'11 (pp. 93--107), Heidelberg: Springer-Verlag. Google ScholarDigital Library
- Zafeiropoulou, A., Millard, D., Webber, C., & O'Hara, K. (2013). Unpicking the privacy paradox: can structuration theory help to explain location-based privacy decisions' WebSci, Paris, France. Google ScholarDigital Library
Index Terms
- Leakiness and creepiness in app space: perceptions of privacy and mobile app use
Recommendations
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
WWW '17: Proceedings of the 26th International Conference on World Wide WebWith the prevalence of smartphones, app markets such as Apple App Store and Google Play has become the center stage in the mobile app ecosystem, with millions of apps developed by tens of thousands of app developers in each major market. This paper ...
Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsIt is not well understood why people continue to use privacy-invasive apps they consider creepy. We conducted a scenario-based study (n = 751) to investigate how the intention to use an app is influenced by affective perceptions and privacy concerns. We ...
Comments