Abstract
With the increasing usage of smartphones, there is a corresponding increase in the phone metadata generated by individuals using these devices. Managing the privacy of personal information on these devices can be a complex task. Recent research has suggested the use of social and behavioral data for automatically recommending privacy settings. This paper is the first effort to connect users’ phone use metadata with their privacy attitudes. Based on a 10-week long field study involving phone metadata collection via an app, and a survey on privacy attitudes, we report that an analysis of cell phone metadata may reveal vital clues to a person’s privacy attitudes. Specifically, a predictive model based on phone usage metadata significantly outperforms a comparable personality features-based model in predicting individual privacy attitudes. The results motivate a newer direction of automatically inferring a user’s privacy attitudes by looking at their phone usage characteristics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)
Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 165–178. Springer, Heidelberg (2004)
Beale, R.: Supporting social interaction with smart phones. IEEE Pervasive Comput. 4(2), 35–41 (2005)
Bourdieu, P., Wacquant, L.: Classification struggles and the dialectic of social and mental structures. In: An Invitation to Reflexive Sociology, p. 14. University of Chicago Press, Chicago (1992)
Boyd, D.: Friends, friendsters, and myspace top 8: Writing community into being on social network sites (2006)
Boyd, D., Ellison, N.: Social network sites: definition, history, and scholarship. J. Comput.-Mediated Commun. 13(1), 210–230 (2007)
Buchanan, T., Paine, C., Joinson, A.N.: Internet Privacy Scales. Journal of the American Society for Information Science and Technology (2007)
Burke, M., Kraut, R., Marlow, C.: Social capital on Facebook: Differentiating uses and users. In: Conference on Human Factors in Computing Systems, CHI 2011. ACM (2011)
Chawla, N.V.: Data mining for imbalanced datasets: An overview. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 853–867. Springer, Heidelberg (2005)
Coleman, J.: Social capital in the creation of human capital. In: Knowledge and Social Capital, vol. 94, pp. 17–41 (1988)
Donath, J., Boyd, D.: Public displays of connection. BT Technol. J. 22(4), 71–82 (2004)
Dwyer, C., Hiltz, S.R., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: Proceedings of the Americas Conference on Information Systems AIS 2007, Keystone (2007)
Ellison, N., Steinfield, C., Lampe, C.: The benefits of Facebook “friends”: exploring the relationship between college students’ use of online social networks and social capital. J. Comput. Mediated Commun. 12, 1143–1168 (2007)
Egelman, S., Oates, A., Krishnamurthi, S.: Oops, I did it again: mitigating repeated access control errors on facebook. In: Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pp. 2295–2304. ACM (2011)
Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351–360 (2010)
Fogel, J., Nehmad, E.: Internet social network communities: Risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25(1), 153–160 (2009). doi:10.1016/j.chb.2008.08.006
Hang, A., Von Zezschwitz, E., De Luca, A., Hussmann, H.: Too much information! User attitudes towards smartphone sharing (2012)
Introna, L., Pouloudi, A.: Privacy in the information age: Stakeholders, interests and values. J. Bus. Ethics 22(1), 27–38 (1999)
Junglas, I.A., Johnson, N.A., Spitzmüller, C.: Personality traits and concern for privacy: an empirical study in the context of location-based services. Eur. J. Inf. Syst. 17(4), 387–402 (2008)
John, O.P., Naumann, L.P., Soto, C.J.: Paradigm shift to the integrative big five trait taxonomy. In: Handbook of Personality: Theory and Research, 3rd edn., pp. 114–158 (2008)
Karlson, A., Brush, A., Schcchter, S.: Can I borrow your phone?: understanding concerns when sharing mobile phones. In: CHI, pp. 1647–1650 (2009). doi:10.1145/1518701.1518953
Nordichi 2012: Making sense through design. In: Proceedings Of The 7th Nordic Conference On Human-Computer Interaction, pp. 284–287. doi:10.1145/2399016.2399061
Reeder, R.W., Karat, C.-M., Karat, J., Brodie, C.: Usability challenges in security and privacy policy-authoring interfaces. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol. 4663, pp. 141–155. Springer, Heidelberg (2007)
Schlegel, R., Kapadia, A., Lee, A.: Eyeing your exposure: Quantifying and controlling information sharing for improved privacy. In: Proceedings of the 7th Symposium on Usable Privacy and Security, SOUPS 2011 (2011). doi:10.1145/2078827.2078846
Squicciarini, A.C., Sundareswaran, S., Lin, D., Wede, J.: A3P: adaptive policy prediction for shared images over popular content sharing sites. In: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia, pp. 261–270. ACM (2011)
Steinfield, C., Ellison, N.B., Lampe, C.: Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. J. Appl. Dev. Psychol. 29(2008), 434–445 (2008)
Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Int. Digit. Media Arts J. 3(1), 10–18 (2006)
Rosenbaum, B.L.: Attitude toward invasion of privacy in the personnel selection process and job applicant demographic and personality correlates. J. Appl. Psychol. 58(3), 333–338 (1973)
Tufekci, Z.: Can you see me now? Audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Stud. 11, 544–564 (2008)
Wang, Z., Liu, Y.: Identifying key factors affecting information disclosure intention in online shopping. Int. J. Smart Home 8(4), 47–58 (2014)
Watson, J., Besmer, A., Lipford, H.R.: + Your circles: sharing behavior on Google+ . In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 12. ACM, July 2012
Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)
Westin, A., Harris Louis & Associates: Harris-Equifax Consumer Privacy Survey (1991)
Westin, A., Harris Louis & Associates: Equifax-Harris Consumer Privacy Survey (1996)
Westin, A., Harris Louis & Associates: E-Commerce & Privacy: What Net Users Want 1998
Westin, A.: Freebies and Privacy: What Net Users Think (1999) http://www.pandab.org/sr990714.html
Westin, A., Harris Interactive: IBM-Harris Multi-National Consumer Privacy Survey (1999)
Westin, A.: Consumer, Privacy and Survey Research (2003). http://www.harrisinteractive.com/advantages/pubs/DNC_AlanWestinConsumersPrivacyandSurveyResearch.pdf
Acknowledgements
We would like to thank Cecilia Gal, Padampriya Subramnian, Ariana Blake, Suril Dalal, Sneha Dasari, and Christin Jose, for help with conducting the study and processing the data.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ghosh, I., Singh, V.K. (2016). Predicting Privacy Attitudes Using Phone Metadata. In: Xu, K., Reitter, D., Lee, D., Osgood, N. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2016. Lecture Notes in Computer Science(), vol 9708. Springer, Cham. https://doi.org/10.1007/978-3-319-39931-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-39931-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-39930-0
Online ISBN: 978-3-319-39931-7
eBook Packages: Computer ScienceComputer Science (R0)