[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

Evaluating the Privacy Valuation of Personal Data on Smartphones

Published: 09 September 2024 Publication History

Abstract

Smartphones hold a great variety of personal data during usage, which at the same time poses privacy risks. In this paper, we used the selling price to reflect users' privacy valuation of their personal data on smartphones. In a 7-day auction, they sold their data as commodities and earn money. We first designed a total of 49 commodities with 8 attributes, covering 14 common types of personal data on smartphones. Then, through a large-scale reverse second price auction (N=181), we examined students' valuation of 15 representative commodities. The average bid-price was 62.8 CNY (8.68 USD) and a regression model with 14 independent variables found the most influential factors for bid-price to be privacy risk, ethnic and gender. When validating our results on non-students (N=34), we found that despite they gave significantly higher prices (M=109.8 CNY, 15.17 USD), "privacy risk" was still one of the most influential factors among the 17 independent variables in the regression model. We recommended that stakeholders should provide 8 attributes of data when selling or managing it.

References

[1]
GOODMAN LA. 1961. Snowball sampling. Annals of Mathematical Statistics 32, 1 (1961), 148--170.
[2]
Alessandro Acquisti and Jens Grossklags. 2005. Privacy and Rationality in Individual Decision Making. 3, 1 (jan 2005), 26--33. https://doi.org/10.1109/MSP.2005.22
[3]
E. Adar and B. A. Huberman. 2001. A market for secrets. First Monday 6, 8 (2001), 200--1.
[4]
Vinitzky G Amichai-Hamburger Y. 2010. Social network use and personality. Computers in Human Behavior 26(6) (2010), 1289--1295.
[5]
Ian Ayres and Matthew Funk. 2003. Marketing privacy. Yale J. on Reg. 20 (2003), 77.
[6]
Michael Bailey, David Dittrich, Erin Kenneally, and Doug Maughan. 2012. The menlo report. IEEE Security & Privacy 10, 2 (2012), 71--75.
[7]
BankMyCell 2022. HOW MANY SMARTPHONES ARE IN THE WORLD? BankMyCell. https://www.bankmycell.com/blog/how-many-phones-are-in-the-world.
[8]
Tom L Beauchamp et al. 2008. The belmont report. The Oxford textbook of clinical research ethics (2008), 149--155.
[9]
Volker Benndorf and Hans-Theo Normann. 2018. The Willingness to Sell Personal Data. The Scandinavian Journal of Economics 120, 4 (2018), 1260--1278. https://doi.org/10.1111/sjoe.12247 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1111/sjoe.12247
[10]
Jaspreet Bhatia and Travis D Breaux. 2018. Empirical measurement of perceived privacy risk. ACM Transactions on Computer-Human Interaction (TOCHI) 25, 6 (2018), 1--47.
[11]
Ryan Calo. 2015. Privacy and markets: a love story. Notre Dame L. Rev. 91 (2015), 649.
[12]
J. P. Carrascal, C. Riederer, V. Erramilli, M. Cherubini, and R. D. Oliveira. 2013. Your browsing behavior for a Big Mac: Economics of Personal Information Online. In the 22nd international conference.
[13]
Raul Castro Fernandez. 2023. Data-sharing markets: model, protocol, and algorithms to incentivize the formation of data-sharing consortia. Proceedings of the ACM on Management of Data 1, 2 (2023), 1--25.
[14]
Delphine Christin, Andreas Reinhardt, Salil S. Kanhere, and Matthias Hollick. 2011. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84, 11 (2011), 1928--1946. https://doi.org/10.1016/j.jss.2011.06.073
[15]
Janis Cloos, Björn Frank, Lukas Kampenhuber, Stephany Karam, Nhat Luong, Daniel Möller, Maria Monge-Larrain, Nguyen Tan Dat, Marco Nilgen, and Christoph Rössler. 2019. Is Your Privacy for Sale? An Experiment on the Willingness to Reveal Sensitive Information. Games 10, 3 (2019). https://doi.org/10.3390/g10030028
[16]
Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony Lamarca, and Pauline Powledge. 2005. Location disclosure to social relations: Why, when, & what people want to share. In Conference on Human Factors in Computing Systems.
[17]
D. Cvrcek, M. Kumpost, V. Matyas, and G. Danezis. 2006. A Study on the Price of Location Privacy. Proceedings of Acm Workshop on Privacy in the Electronic Society (2006), 109--118.
[18]
George Danezis, Stephen Lewis, and Ross Anderson. 2005. How much is location privacy worth. Proceedings of the Workshop on the Economics of Information Security (2005).
[19]
EU Directive. 1995. 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the EC 23, 6 (1995).
[20]
Justin Drake, Karl Schulz, Radek Bukowski, and Kelly Gaither. 2021. Collecting and analyzing smartphone sensor data for health. In Practice and Experience in Advanced Research Computing. 1--4.
[21]
Serge Egelman, Adrienne Porter Felt, and David Wagner. 2013. Choice Architecture and Smartphone Privacy: There's a Price for That. Springer Berlin Heidelberg, Berlin, Heidelberg, 211--236. https://doi.org/10.1007/978-3-642-39498-0_10
[22]
Hany Fahmy. 2014. Modelling nonlinearities in commodity prices using smooth transition regression models with exogenous transition variables. Statistical Methods & Applications 23, 4 (2014), 577--600.
[23]
Wei Fan. 2017. New Approaches of Personal Data Protection in A World of Big Data--- ---Concept of Contextual and Risk-based Approaches inU S and EU's data protection regulatory reform. Journal of Cyber and Information Law (2017), 248--286, 393-39.
[24]
Ben Fehnert and Alessia Kosagowsky. 2008. Measuring user experience: complementing qualitative and quantitative assessment. In Proceedings of the 10th international conference on Human computer interaction with mobile devices and services. 383--386.
[25]
Denzil Ferreira, Vassilis Kostakos, and Anind K Dey. 2015. AWARE: mobile context instrumentation framework. Frontiers in ICT 2 (2015), 6.
[26]
Piers Fleming, Andrew P. Bayliss, S. Gareth Edwards, and Charles R. Seger. 2021. The role of personal data value, culture and self-construal in online privacy behaviour. PLoS ONE 16, 7 (2021), 1 - 20. https://search.ebscohost.com/login.aspx?direct=true&db=asn&AN=151434525&lang=zh-cn&site=ehost-live
[27]
World Economic Forum. 2014. Rethinking Personal Data: Trust and Context in User-Centred Data Ecosystems. (2014).
[28]
Euna Han and Lisa M. Powell. 2013. FAST FOOD PRICES AND ADULT BODY WEIGHT OUTCOMES: EVIDENCE BASED ON LONGITUDINAL QUANTILE REGRESSION MODELS. Contemporary Economic Policy (2013).
[29]
Gabriella M. Harari, Nicholas D. Lane, Rui Wang, Benjamin S. Crosier, Andrew T. Campbell, and Samuel D. Gosling. 2016. Using Smartphones to Collect Behavioral Data in Psychological Science: Opportunities, Practical Considerations, and Challenges. Perspectives on Psychological Science 11, 6 (2016), 838--854. https://doi.org/10.1177/1745691616650285 arXiv:https://doi.org/10.1177/1745691616650285 27899727.
[30]
Nissenbaum Helen. 2004. Privacy As Contextual Integrity. Washington Law Review 79 (05 2004).
[31]
S. Hermes, [email protected], M. Schreieck, and H. Krcmar. 2020. Who Quits Privacy-Invasive Online Platform Operators? A Segmentation Study with Implications for the Privacy Paradox. In 54th Hawaii International Conference on Systems Sciences.
[32]
J. K. Horowitz and K. E. Mcconnell. 2000. A Review of WTA/WTP Studies. 3 (2000).
[33]
Simo Hosio, Denzil Ferreira, Jorge Goncalves, Niels Van Berkel, and Vassilis Kostakos. 2016. Monetary Assessment of Battery Life on Smartphones. ACM (2016).
[34]
White House. 2012. Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy. White House, Washington, DC (2012), 1--62.
[35]
Ahmad Jamal. 2003. Marketing in a multicultural world: The interplay of marketing, ethnicity and consumption. European journal of marketing 37, 11/12 (2003), 1599--1620.
[36]
C. Jensen, C. Potts, and C. Jensen. 2005. Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human - Computer Studies 63, 1--2 (2005), 203--227.
[37]
Iris A Junglas, Norman A Johnson, and Christiane Spitzmüller. 2008. Personality traits and concern for privacy: an empirical study in the context of location-based services. European Journal of Information Systems 17(4) (2008), 387--402.
[38]
L. H. Kai, H. H. Teo, and Syt Lee. 2007. The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly 31, 1 (2007), 19--33.
[39]
T Tony Ke and K Sudhir. 2023. Privacy rights and data security: GDPR and personal data markets. Management Science 69, 8 (2023), 4389--4412.
[40]
Lindah Kotut, Timothy L. Stelter, Michael Horning, and D. Scott McCrickard. 2020. Willing Buyer, Willing Seller: Personal Data Trade as a Service. In Companion of the 2020 ACM International Conference on Supporting Group Work (Sanibel Island, Florida, USA) (GROUP '20). Association for Computing Machinery, New York, NY, USA, 59--68. https://doi.org/10.1145/3323994.3369899
[41]
Murat Koyuncu, Tolga Pusatli, et al. 2019. Security awareness level of smartphone users: An exploratory case study. Mobile Information Systems 2019 (2019).
[42]
Frauke Kreuter, Georg-Christoph Haas, Florian Keusch, Sebastian Bähr, and Mark Trappmann. 2020. Collecting survey and smartphone sensor data with an app: Opportunities and challenges around privacy and informed consent. Social Science Computer Review 38, 5 (2020), 533--549.
[43]
Maria Kuecken. 2013. Book review: a tale of two cultures: qualitative and quantitative research in the social sciences. lse review of books (2013).
[44]
Abhishek Kumar, Tristan Braud, Young D Kwon, and Pan Hui. 2020. Aquilis: Using contextual integrity for privacy protection on mobile devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 4 (2020), 1--28.
[45]
P. Kumaraguru and L. F. Cranor. 2005. Privacy Indexes: A Survey of Westin's Studies. (2005).
[46]
Liron Lamash, Tsameret Ricon, and Sara Rosenblum. 2022. Time Organization Patterns of Adolescents: Agreement between Self-Report and Parent Report. Physical & Occupational Therapy In Pediatrics 42, 3 (2022), 319--332.
[47]
Kenneth Laudon. 1995. Markets and Privacy. Academic Press, Inc., USA, 697--726.
[48]
Hyunsoo Lee, Soowon Kang, and Uichin Lee. 2022. Understanding Privacy Risks and Perceived Benefits in Open Dataset Collection for Mobile Affective Computing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6, 2, Article 61 (jul 2022), 26 pages. https://doi.org/10.1145/3534623
[49]
Pedro Giovanni Leon, Blase Ur, Wang Yang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What Matters to Users? Factors That Affect Users' Willingness to Share Information with Online Advertisers. In Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS '13). Association for Computing Machinery, New York, NY, USA, Article 7, 12 pages. https://doi.org/10.1145/2501604.2501611
[50]
Xiao-Bai Li, Xiaoping Liu, and Luvai Motiwalla. 2021. Valuing Personal Data with Privacy Consideration. Decision Sciences 52, 2 (2021), 393--426. https://doi.org/10.1111/deci.12442 arXiv:https://onlinelibrary.wiley.com/doi/pdf/10.1111/deci.12442
[51]
John A List and Craig A Gallet. 2001. What experimental protocol influence disparities between actual and hypothetical stated values? Environmental and resource economics 20 (2001), 241--254.
[52]
Jayson L Lusk, Corinne Alexander, and Matthew C Rousu. 2007. Designing experimental auctions for marketing research: The effect of values, distributions, and mechanisms on incentives for truthful bidding. Review of Marketing Science 5, 1 (2007), 0000102202154656161059.
[53]
Aurel Ruben Mäder, Lakmal Meegahapola, and Daniel Gatica-Perez. 2024. Learning About Social Context from Smartphone Data: Generalization Across Countries and Daily Life Moments. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1--18.
[54]
N. K. Malhotra, S. S. Kim, and J. Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC). Information Systems Research (2004).
[55]
Juha Matero and Ashley Colley. 2012. Identifying Unintentional Touches on Handheld Touch Screen Devices. In Proceedings of the Designing Interactive Systems Conference (Newcastle Upon Tyne, United Kingdom) (DIS '12). Association for Computing Machinery, New York, NY, USA, 506--509. https://doi.org/10.1145/2317956.2318031
[56]
Lakmal Meegahapola, Florian Labhart, Thanh-Trung Phan, and Daniel Gatica-Perez. 2021. Examining the social context of alcohol drinking in young adults with smartphone sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, 3 (2021), 1--26.
[57]
Jun-Ki Min, Afsaneh Doryab, Jason Wiese, Shahriyar Amini, John Zimmerman, and Jason I. Hong. 2014. Toss 'n' Turn: Smartphone as Sleep and Sleep Quality Detector. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI '14). Association for Computing Machinery, New York, NY, USA, 477--486. https://doi.org/10.1145/2556288.2557220
[58]
Ngoc Thi Nguyen, Maria Zubair, Agustin Zuniga, Sasu Tarkoma, Pan Hui, Hyowon Lee, Simon Tangi Perrault, Mostafa H Ammar, Huber Flores, and Petteri Nurmi. 2023. Is the Price Right? The Economic Value of Sharing Sensors. IEEE Transactions on Computational Social Systems (2023).
[59]
Jianmo Ni, Larry Muhlstein, and Julian McAuley. 2019. Modeling Heart Rate and Activity Data for Personalized Fitness Recommendation. In The World Wide Web Conference (San Francisco, CA, USA) (WWW '19). Association for Computing Machinery, New York, NY, USA, 1343--1353. https://doi.org/10.1145/3308558.3313643
[60]
H Nissenbaum. 2018. Respecting Context to Protect Privacy: Why Meaning Matters. Sci Eng Ethics 24 (2018), 831--852.
[61]
Apthorpe Noah, Shvartzshnaider Yan, Mathur Arunesh, Reisman Dillon, and Feamster Nick. 2018. Discovering Smart Home Internet of Things Privacy Norms Using Contextual Integrity.
[62]
OCDE. 2002. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data / OCDE. (2002).
[63]
Fabian Okeke, Michael Sobolev, and Deborah Estrin. 2018. Towards A Framework for Mobile Behavior Change Research (TechMindSociety '18). Association for Computing Machinery, New York, NY, USA, Article 27, 6 pages. https://doi.org/10.1145/3183654.3183706
[64]
Omer Rashid, Paul Coulton, and Reuben Edwards. 2008. Providing Location Based Information/Advertising for Existing Mobile Phone Users. Personal Ubiquitous Comput. 12, 1 (Jan. 2008), 3--10. https://doi.org/10.1007/s00779-006-0121-4
[65]
Marc Rotenberg, Jeramie Scott, and Julia Horwitz. 2015. Privacy in the modern age: The search for solutions. New Press.
[66]
Vera Schmitt, Zhenni Li, Maija Poikela, Robert P Spang, and Sebastian Möller. 2023. What is your location privacy worth? Monetary valuation of different location types and privacy influencing factors. In Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 19--29.
[67]
Seven Wheat Data 2022. White Paper on Mobile Internet Industry in 2021 - Seven Wheat Data. Seven Wheat Data. https://www.sohu.com/a/518965750_120855974.
[68]
Cornelia Sindermann, Helena Sophia Schmitt, Frank Kargl, Cornelia Herbert, and Christian Montag. 2021. Online privacy literacy and online privacy behavior-the role of crystallized intelligence and personality. International Journal of Human-Computer Interaction 37, 15 (2021), 1455--1466.
[69]
Anya Skatova, Rebecca McDonald, Sinong Ma, and Carsten Maple. 2023. Unpacking privacy: Valuation of personal data protection. Plos one 18, 5 (2023), e0284581.
[70]
Smith, H. Jeff, Milberg, J. Sandra, and Burke. 1996. Information Privacy: Measuring Individuals' Concerns About Organizational Practices. MIS Quarterly (1996).
[71]
Jacopo Staiano, Nuria Oliver, Bruno Lepri, Rodrigo De Oliveira, Michele Caraviello, and Nicu Sebe. 2014. Money walks: a human-centric study on the economics of personal mobile data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 583--594.
[72]
Bella Struminskaya, Vera Toepoel, Peter Lugtig, Marieke Haan, Annemieke Luiten, and Barry Schouten. 2020. Understanding willingness to share smartphone-sensor data. Public Opinion Quarterly 84, 3 (2020), 725--759.
[73]
Joshua Tan, Mahmood Sharif, Sruti Bhagavatula, Matthias Beckerle, Michelle L Mazurek, and Lujo Bauer. 2018. Comparing hypothetical and realistic privacy valuations. In Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 168--182.
[74]
Tsai, S. Egelman, L. F. Cranor, and A. Acquisti. 2011. The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research (2011), 254--268. https://ssrn.com/abstract=3305347
[75]
Amos Tversky and Daniel Kahneman. 1974. Judgment under Uncertainty: Heuristics and Biases: Biases in judgments reveal some heuristics of thinking under uncertainty. science 185, 4157 (1974), 1124--1131.
[76]
Michele Vescovi, Christos Perentis, Chiara Leonardi, Bruno Lepri, and Corrado Moiso. 2014. My Data Store: Toward User Awareness and Control on Personal Data. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (Seattle, Washington) (UbiComp '14 Adjunct). Association for Computing Machinery, New York, NY, USA, 179--182. https://doi.org/10.1145/2638728.2638745
[77]
A. Wagner, N. Wessels, P. Buxmann, and H. Krasnova. 2018. Putting a Price Tag on Personal Information - A Literature Review. publications of darmstadt technical university institute for business studies (2018).
[78]
Mengcheng Wang, Xiaoyang Dai, and Shuqiao Yao. 2011. Preliminary development of the Chinese Big Five Personality Inventory III: Development of the short form version and reliability testing. Chinese Journal of Clinical Psychology 19, 4 (2011), 4.
[79]
Zhixian Yan, Jun Yang, and Emmanuel Munguia Tapia. 2013. Smartphone Bluetooth Based Social Sensing. In Proceedings of the 2013 ACM Conference on Pervasive and Ubiquitous Computing Adjunct Publication (Zurich, Switzerland) (UbiComp '13 Adjunct). Association for Computing Machinery, New York, NY, USA, 95--98. https://doi.org/10.1145/2494091.2494118
[80]
Razieh Nokhbeh Zaeem and K Suzanne Barber. 2020. The effect of the GDPR on privacy policies: Recent progress and future promise. ACM Transactions on Management Information Systems (TMIS) 12, 1 (2020), 1--20.
[81]
Bo Zhang, Yi Ming Li, Jian Li, Jing Luo, and Oliver P John. 2021. The Big Five Inventory-2 in China: A Comprehensive Psychometric Evaluation in Four Diverse Samples. Assessment 4 (2021).
[82]
Sicheng Zhao, Hongxun Yao, Xiaoshuai Sun, Pengfei Xu, Xianming Liu, and Rongrong Ji. 2011. Video Indexing and Recommendation Based on Affective Analysis of Viewers. In Proceedings of the 19th ACM International Conference on Multimedia (Scottsdale, Arizona, USA) (MM '11). Association for Computing Machinery, New York, NY, USA, 1473--1476. https://doi.org/10.1145/2072298.2072043
[83]
Xiao Zheng. 2020. Data trading with differential privacy in data market. In Proceedings of 2020 6th International Conference on Computing and Data Engineering. 112--115.
[84]
Pengfei Zhou, Mo Li, and Guobin Shen. 2014. Use It Free: Instantly Knowing Your Phone Attitude. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking (Maui, Hawaii, USA) (MobiCom '14). Association for Computing Machinery, New York, NY, USA, 605--616. https://doi.org/10.1145/2639108.2639110

Index Terms

  1. Evaluating the Privacy Valuation of Personal Data on Smartphones
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 8, Issue 3
      August 2024
      1782 pages
      EISSN:2474-9567
      DOI:10.1145/3695755
      Issue’s Table of Contents
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 September 2024
      Published in IMWUT Volume 8, Issue 3

      Check for updates

      Author Tags

      1. auction
      2. context
      3. monetary benefits
      4. price model
      5. privacy risk
      6. selling
      7. smartphone personal data

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 291
        Total Downloads
      • Downloads (Last 12 months)291
      • Downloads (Last 6 weeks)85
      Reflects downloads up to 11 Dec 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media