Analyzing Impact Factors for Smartphone Sharing Decisions Using Decision Tree
The sharing activities of smart devices have been proved to occur commonly among users and discussed by many studies. In contrast to sharing behaviors of personal computer, smartphone sharing is impromptu. It occurs pervasively like on the street between strangers or at home between family members. The variety of sharing behaviors requires the investigation of the most impact factors for smartphone sharing, which underlies the design of usable privacy user interface. This work investigates and analyzes the influencing factors of smartphone users sharing decisions based on CART algorithm of Decision Tree. The data for analyzing is based on a survey involving 165 participants’ responses. Results indicated the features belonging to the sharing attitudes and behaviors impacted users’ sharing decisions mostly.
KeywordsUser study Sharing Smartphone Decision tree
This work was supported by the National Natural Science Foundation of China (61702417, 61703259), the Shaanxi Natural Science Foundation (2017JM6097, 2017JQ6077), and the Opening Project of State Key Laboratory for Manufacturing Systems Engineering (sklm s2016001).
- 1.Hang, A., Von Zezschwitz, E., De Luca, A., Hussmann, H.: Too much information! User attitudes towards smartphone sharing. In: Nordic Conference on Human-Computer Interaction: Making Sense Through Design, pp. 284–287 (2012)Google Scholar
- 2.Hayashi, E., Riva, O., Strauss, K., Bernheim Brush, A.J., Schechter, S.: Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device’s applications. In: Eighth Symposium on Usable Privacy and Security, p. 2 (2012)Google Scholar
- 3.Karimi, K., Hamilton, H.J.: Generation and interpretation of temporal decision rules. Int. J. Comput. Inf. Syst. Ind. Manag. Appl. 3(1), 314–323 (2010)Google Scholar
- 4.Karlson, A.K., Bernheim Brush, A.J., Schechter, S.: Can i borrow your phone? Understanding concerns when sharing mobile phones. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 1647–1650 (2009)Google Scholar
- 5.King, J.: How come i’m allowing strangers to go through my phone? Smartphones and privacy expectations. SSRN Electron. J. (2014)Google Scholar
- 6.Matthews, T., Liao, K., Turner, A., Berkovich, M., Reeder, R., Consolvo, S.: “She’ll just grab any device that’s closer”: a study of everyday device & account sharing in households. In: CHI Conference on Human Factors in Computing Systems, pp. 5921–5932 (2016)Google Scholar
- 7.Mazurek, M.L., Arsenault, J.P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B.: Access control for home data sharing: attitudes, needs and practices. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 645–654 (2010)Google Scholar
- 8.Quinlan, J.R.: Simplifying Decision Trees. Academic Press Ltd., London (1987)Google Scholar
- 9.Smetters, D.K., Good, N.: How users use access control. In: Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 2009, pp. 1–12 (2009)Google Scholar