Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems 2015
DOI: 10.1145/2702123.2702404
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Tipping Points in Smartphones Privacy Preferences

Abstract: The aim of this research was to understand what affects people's privacy preferences in smartphone apps. We ran a fourweek study in the wild with 34 participants. Participants were asked to answer questions, which were used to gather information about their personal context and to measure their privacy preferences, by varying app name and the purpose of data collection.Our results show that participants shared the most when no information about data access or purpose was given, and shared the least when both o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(35 citation statements)
references
References 28 publications
0
35
0
Order By: Relevance
“…Finally, the decision, contextual information, and whether the decision was manual or automatic are recorded in the SmarPer database (9). Optionally, the user can review recent automatic decisions and correct them if they are wrong (10). This user feedback is also incorporated in the model (11 and 12).…”
Section: System Flowmentioning
confidence: 99%
See 3 more Smart Citations
“…Finally, the decision, contextual information, and whether the decision was manual or automatic are recorded in the SmarPer database (9). Optionally, the user can review recent automatic decisions and correct them if they are wrong (10). This user feedback is also incorporated in the model (11 and 12).…”
Section: System Flowmentioning
confidence: 99%
“…For example, they do not include runtime permission decisions [8], [30]. Other data sets include runtime decisions but were collected in non-realistic scenarios [2], [10]. Initially, we considered using the data set from Wijesekera et al [2], as it seemed to match our requirements.…”
Section: Collecting Permission Decisionsmentioning
confidence: 99%
See 2 more Smart Citations
“…There is a great deal of research on designing for privacy in technical systems [14], such as ubiquitous computing systems [10], mobile apps [26], location-based services [28], and more. Work related to privacy and web browsing primarily focus on restricting tracking or alerting users [7], or on how to share browsing data, but only to researchers [21].…”
Section: Privacy Surveillance and The Webmentioning
confidence: 99%