Advertisement

Analyzing Impact Factors for Smartphone Sharing Decisions Using Decision Tree

  • Tao Xu
  • Yun Zhou
  • Alexander Raake
  • Xuyun Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10902)

Abstract

The sharing activities of smart devices have been proved to occur commonly among users and discussed by many studies. In contrast to sharing behaviors of personal computer, smartphone sharing is impromptu. It occurs pervasively like on the street between strangers or at home between family members. The variety of sharing behaviors requires the investigation of the most impact factors for smartphone sharing, which underlies the design of usable privacy user interface. This work investigates and analyzes the influencing factors of smartphone users sharing decisions based on CART algorithm of Decision Tree. The data for analyzing is based on a survey involving 165 participants’ responses. Results indicated the features belonging to the sharing attitudes and behaviors impacted users’ sharing decisions mostly.

Keywords

User study Sharing Smartphone Decision tree 

Notes

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61702417, 61703259), the Shaanxi Natural Science Foundation (2017JM6097, 2017JQ6077), and the Opening Project of State Key Laboratory for Manufacturing Systems Engineering (sklm s2016001).

References

  1. 1.
    Hang, A., Von Zezschwitz, E., De Luca, A., Hussmann, H.: Too much information! User attitudes towards smartphone sharing. In: Nordic Conference on Human-Computer Interaction: Making Sense Through Design, pp. 284–287 (2012)Google Scholar
  2. 2.
    Hayashi, E., Riva, O., Strauss, K., Bernheim Brush, A.J., Schechter, S.: Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device’s applications. In: Eighth Symposium on Usable Privacy and Security, p. 2 (2012)Google Scholar
  3. 3.
    Karimi, K., Hamilton, H.J.: Generation and interpretation of temporal decision rules. Int. J. Comput. Inf. Syst. Ind. Manag. Appl. 3(1), 314–323 (2010)Google Scholar
  4. 4.
    Karlson, A.K., Bernheim Brush, A.J., Schechter, S.: Can i borrow your phone? Understanding concerns when sharing mobile phones. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 1647–1650 (2009)Google Scholar
  5. 5.
    King, J.: How come i’m allowing strangers to go through my phone? Smartphones and privacy expectations. SSRN Electron. J. (2014)Google Scholar
  6. 6.
    Matthews, T., Liao, K., Turner, A., Berkovich, M., Reeder, R., Consolvo, S.: “She’ll just grab any device that’s closer”: a study of everyday device & account sharing in households. In: CHI Conference on Human Factors in Computing Systems, pp. 5921–5932 (2016)Google Scholar
  7. 7.
    Mazurek, M.L., Arsenault, J.P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B.: Access control for home data sharing: attitudes, needs and practices. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 645–654 (2010)Google Scholar
  8. 8.
    Quinlan, J.R.: Simplifying Decision Trees. Academic Press Ltd., London (1987)Google Scholar
  9. 9.
    Smetters, D.K., Good, N.: How users use access control. In: Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 2009, pp. 1–12 (2009)Google Scholar
  10. 10.
    Zhou, Y., Piekarska, M., Raake, A., Tao, X., Xiaojun, W., Dong, B.: Control yourself: on user control of privacy settings using personalization and privacy panel on smartphones. Procedia Comput. Sci. 109, 100–107 (2017)CrossRefGoogle Scholar
  11. 11.
    Zhou, Y., Raake, A., Xu, T., Zhang, X.: Users’ perceived control, trust and expectation on privacy settings of smartphone. In: Wen, S., Wu, W., Castiglione, A. (eds.) CSS 2017. LNCS, vol. 10581, pp. 427–441. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-69471-9_31CrossRefGoogle Scholar
  12. 12.
    Zhou, Y., Xu, T., Raake, A., Cai, Y.: Access control is not enough: how owner and guest set limits to protect privacy when sharing smartphone. In: Stephanidis, C. (ed.) HCI 2016. CCIS, vol. 617, pp. 494–499. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-40548-3_82CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Tao Xu
    • 1
    • 2
  • Yun Zhou
    • 3
  • Alexander Raake
    • 4
  • Xuyun Zhang
    • 5
  1. 1.School of Software and MicroelectronicsNorthwestern Polytechnical UniversityXi’anPeople’s Republic of China
  2. 2.State Key Laboratory for Manufacturing Systems EngineeringXi’an Jiaotong UniversityXi’anPeople’s Republic of China
  3. 3.School of EducationShaanxi Normal UniversityXi’anPeople’s Republic of China
  4. 4.Audiovisual Technology Group, Institute for Media TechnologyUniversity of Technology IlmenauIlmenauGermany
  5. 5.Department of Electrical and Computer EngineeringUniversity of AucklandAucklandNew Zealand

Personalised recommendations