[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Investigating university student desires and use of smartphone privacy settings

Published: 01 April 2019 Publication History

Abstract

Smartphones provide an abundance of settings to help users control how their data is used. In this paper, we explore what the expressed privacy desires are for college-age smartphone users and whether these are achieved by their settings. To accomplish this, we use a survey and in-person interviews to learn how people feel about their data being shared and how they make decisions about their settings. We find that, in general, people are very concerned with microphone and photo data and less concerned with location data. However, user actions indicate a higher concern with location data than microphones or photo data.

References

[1]
World's most admired companies for 2018. http://fortune.com/worlds-most-admired-companies/. Accessed: 2018-05-24.
[2]
Fact book, 2015.
[3]
Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. It's a hard lock life: A field study of smartphone (un)locking behavior and risk perception. Symposium on Usable Privacy and Security, 2014.
[4]
Giovanni Iachello and Jason Hong. End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction, 1, 2007.
[5]
Rensis Likert. A technique for the measurement of attitudes. Archives of Psychology, 1932.
[6]
Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. Modeling users' mobile app privacy preferences: Restoring usability in a sea of permission settings. Symposium on Usable Privacy and Security, 2014.
[7]
Alina Selyukh. The FBI has successfully unlocked the iPhone without apple's help. NPR, 2016.
[8]
Vincent Taylor, Alastair Beresford, and Ivan Martinovic. There are many apps for that: Quantifying the availability of privacy-preserving apps. WiSec, 2017.
[9]
Omer Tene and Jules Polonetsky. Big data for all: Privacy and user control in the age of analytics. NW Journal of Technology and Intellectual Property, 2012.
[10]
Allison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, and Alessandro Acquisti. Would a privacy fundamentalist sell their dna for $1000... if nothing bad happened as a result? the westin categories, behavioral intentions, and consequences. Symposium on Usable Privacy and Security, 2014.

Cited By

View all
  • (2023)Mobile learning: research context, methodologies and future works towards middle-aged adults – a systematic literature reviewMultimedia Tools and Applications10.1007/s11042-022-13698-y82:7(11117-11143)Online publication date: 1-Mar-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Computing Sciences in Colleges
Journal of Computing Sciences in Colleges  Volume 34, Issue 4
April 2019
131 pages
ISSN:1937-4771
EISSN:1937-4763
Issue’s Table of Contents

Publisher

Consortium for Computing Sciences in Colleges

Evansville, IN, United States

Publication History

Published: 01 April 2019
Published in JCSC Volume 34, Issue 4

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Mobile learning: research context, methodologies and future works towards middle-aged adults – a systematic literature reviewMultimedia Tools and Applications10.1007/s11042-022-13698-y82:7(11117-11143)Online publication date: 1-Mar-2023

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media