” How Come I'm Allowing Strangers To Go Through My. King, J. In Proceedings of the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM), 7. abstract bibtex This study examines the privacy expectations of
smartphone users by exploring two specific dimensions to
smartphone privacy: participants' concerns with other
people accessing the personal information stored on their
smartphones, and applications accessing this information
via platform APIs. We interviewed 24 Apple iPhone and
Google Android users about their smartphone usage, using
Altman's theory of boundary regulation and Nissenbaum's
theory of contextual integrity to guide our inquiry. Our
contribution is a contextually-situated examination of
smartphone users' privacy preferences and expectations
based upon real world usage. Overall, we found that the
default flows of smartphone APIs defy users' privacy
expectations. In contradiction to the assumptions made by
many mobile privacy studies, we found that our participants
were far less concerned with sharing their location
compared to other types of information available through
the platforms' APIs. Further, we found that not only did
some of our participants not understand the capabilities of
applications, they also relied upon a number of assurance
structures (sometimes inaccurately) to assuage their privacy
concerns when selecting applications. We conclude with
suggestions for platforms and application developers to
make smartphone APIs and applications function in a
manner that supports users' privacy expectations, as well as
a call to use theoretically grounded methods for mobile
privacy research.
@inProceedings{
title = {” How Come I'm Allowing Strangers To Go Through My},
type = {inProceedings},
month = {7},
id = {d1365a7c-d7a3-367c-8e50-2298e7ca0174},
created = {2018-07-12T21:32:22.690Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:22.690Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {king:expectations},
source_type = {inproceedings},
notes = {Pdf in the link is a draft. Please contact author for latest draft.},
private_publication = {false},
abstract = {This study examines the privacy expectations of
smartphone users by exploring two specific dimensions to
smartphone privacy: participants' concerns with other
people accessing the personal information stored on their
smartphones, and applications accessing this information
via platform APIs. We interviewed 24 Apple iPhone and
Google Android users about their smartphone usage, using
Altman's theory of boundary regulation and Nissenbaum's
theory of contextual integrity to guide our inquiry. Our
contribution is a contextually-situated examination of
smartphone users' privacy preferences and expectations
based upon real world usage. Overall, we found that the
default flows of smartphone APIs defy users' privacy
expectations. In contradiction to the assumptions made by
many mobile privacy studies, we found that our participants
were far less concerned with sharing their location
compared to other types of information available through
the platforms' APIs. Further, we found that not only did
some of our participants not understand the capabilities of
applications, they also relied upon a number of assurance
structures (sometimes inaccurately) to assuage their privacy
concerns when selecting applications. We conclude with
suggestions for platforms and application developers to
make smartphone APIs and applications function in a
manner that supports users' privacy expectations, as well as
a call to use theoretically grounded methods for mobile
privacy research.},
bibtype = {inProceedings},
author = {King, Jennifer},
booktitle = {Proceedings of the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM)}
}
Downloads: 0
{"_id":"xgRAWHTqQgwqJPomM","bibbaseid":"king-howcomeimallowingstrangerstogothroughmy","downloads":0,"creationDate":"2019-02-15T15:15:01.432Z","title":"” How Come I'm Allowing Strangers To Go Through My","author_short":["King, J."],"year":null,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"” How Come I'm Allowing Strangers To Go Through My","type":"inProceedings","month":"7","id":"d1365a7c-d7a3-367c-8e50-2298e7ca0174","created":"2018-07-12T21:32:22.690Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:22.690Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"king:expectations","source_type":"inproceedings","notes":"Pdf in the link is a draft. Please contact author for latest draft.","private_publication":false,"abstract":"This study examines the privacy expectations of \nsmartphone users by exploring two specific dimensions to \nsmartphone privacy: participants' concerns with other \npeople accessing the personal information stored on their \nsmartphones, and applications accessing this information \nvia platform APIs. We interviewed 24 Apple iPhone and \nGoogle Android users about their smartphone usage, using \nAltman's theory of boundary regulation and Nissenbaum's \ntheory of contextual integrity to guide our inquiry. Our \ncontribution is a contextually-situated examination of \nsmartphone users' privacy preferences and expectations \nbased upon real world usage. Overall, we found that the \ndefault flows of smartphone APIs defy users' privacy \nexpectations. In contradiction to the assumptions made by \nmany mobile privacy studies, we found that our participants \nwere far less concerned with sharing their location \ncompared to other types of information available through \nthe platforms' APIs. Further, we found that not only did \nsome of our participants not understand the capabilities of \napplications, they also relied upon a number of assurance \nstructures (sometimes inaccurately) to assuage their privacy \nconcerns when selecting applications. We conclude with \nsuggestions for platforms and application developers to \nmake smartphone APIs and applications function in a \nmanner that supports users' privacy expectations, as well as \na call to use theoretically grounded methods for mobile \nprivacy research.","bibtype":"inProceedings","author":"King, Jennifer","booktitle":"Proceedings of the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM)","bibtex":"@inProceedings{\n title = {” How Come I'm Allowing Strangers To Go Through My},\n type = {inProceedings},\n month = {7},\n id = {d1365a7c-d7a3-367c-8e50-2298e7ca0174},\n created = {2018-07-12T21:32:22.690Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:22.690Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {king:expectations},\n source_type = {inproceedings},\n notes = {Pdf in the link is a draft. Please contact author for latest draft.},\n private_publication = {false},\n abstract = {This study examines the privacy expectations of \nsmartphone users by exploring two specific dimensions to \nsmartphone privacy: participants' concerns with other \npeople accessing the personal information stored on their \nsmartphones, and applications accessing this information \nvia platform APIs. We interviewed 24 Apple iPhone and \nGoogle Android users about their smartphone usage, using \nAltman's theory of boundary regulation and Nissenbaum's \ntheory of contextual integrity to guide our inquiry. Our \ncontribution is a contextually-situated examination of \nsmartphone users' privacy preferences and expectations \nbased upon real world usage. Overall, we found that the \ndefault flows of smartphone APIs defy users' privacy \nexpectations. In contradiction to the assumptions made by \nmany mobile privacy studies, we found that our participants \nwere far less concerned with sharing their location \ncompared to other types of information available through \nthe platforms' APIs. Further, we found that not only did \nsome of our participants not understand the capabilities of \napplications, they also relied upon a number of assurance \nstructures (sometimes inaccurately) to assuage their privacy \nconcerns when selecting applications. We conclude with \nsuggestions for platforms and application developers to \nmake smartphone APIs and applications function in a \nmanner that supports users' privacy expectations, as well as \na call to use theoretically grounded methods for mobile \nprivacy research.},\n bibtype = {inProceedings},\n author = {King, Jennifer},\n booktitle = {Proceedings of the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM)}\n}","author_short":["King, J."],"bibbaseid":"king-howcomeimallowingstrangerstogothroughmy","role":"author","urls":{},"downloads":0},"search_terms":["come","allowing","strangers","through","king"],"keywords":[],"authorIDs":[]}